Cisco offers the Firepower 2100 Series NGFW, designed to allow businesses to gain resiliency through superior security with sustained performance. The Firepower 2100 Series has a dual multicore CPU architecture that optimizes firewall, cryptographic, and threat inspection functions simultaneously, to achieve security doesn’t come at the expense of network performance.
N/A
SonicWall NSA Series
Score 8.8 out of 10
N/A
The SonicWall NSA Series is the company's mid-range next generation firewall (NGFW).
N/A
Pricing
Cisco Firepower 2100 Series
SonicWall NSA Series
Editions & Modules
Firepower 2100
3,000-20,000
per appliance
No answers on this topic
Offerings
Pricing Offerings
Cisco Firepower 2100 Series
SonicWall NSA Series
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
Cisco Firepower 2100 Series
SonicWall NSA Series
Features
Cisco Firepower 2100 Series
SonicWall NSA Series
Firewall
Comparison of Firewall features of Product A and Product B
Cisco Firepower 2100 Series
8.5
2 Ratings
2% below category average
SonicWall NSA Series
8.5
6 Ratings
2% below category average
Identification Technologies
9.02 Ratings
7.76 Ratings
Visualization Tools
6.01 Ratings
8.46 Ratings
Content Inspection
9.02 Ratings
6.65 Ratings
Policy-based Controls
9.02 Ratings
9.36 Ratings
Active Directory and LDAP
9.02 Ratings
8.25 Ratings
Firewall Management Console
8.02 Ratings
9.56 Ratings
Reporting and Logging
9.02 Ratings
8.36 Ratings
VPN
10.02 Ratings
9.96 Ratings
High Availability
10.02 Ratings
9.86 Ratings
Stateful Inspection
10.02 Ratings
8.65 Ratings
Proxy Server
5.02 Ratings
7.01 Ratings
Best Alternatives
Cisco Firepower 2100 Series
SonicWall NSA Series
Small Businesses
pfSense
Score 8.8 out of 10
pfSense
Score 8.8 out of 10
Medium-sized Companies
Quantum Firewalls and Security Gateways
Score 9.3 out of 10
Quantum Firewalls and Security Gateways
Score 9.3 out of 10
Enterprises
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Score 9.2 out of 10
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
The Cisco [Firepower] 2100 [Series] is an easy sell for anyone looking. You already know Cisco excels in the security department, but now that firepower lives right on the box and inline with the rest of the firewall data flow you can save yourself a lot of time and headaches. Unless you cant quite afford Cisco's 2100 line, there's not much reason to go with the competition.
This is a higher-end firewall, built for a medium to large business. It handles traffic and scanning and protection well but it would be a bit of a budget-buster and probably overkill for a small to (barely) medium sized business. SonicWall makes SoHo devices for those use cases and they would be more appropriate.
Career-wise very familiar with the ASAs, you know, the previous gen firewalls, Pyxis, ASAs, the CHA. As far as being intuitive, those seem to be far more intuitive to learn and figure out what the features and changes and config management, all that stuff is. With Firepower, it's a learning curve and I feel like I have quite a bit of experience with it, and so does my team, but feels like it's not as intuitive, and trying to make changes just always seems harder for some reason. We've gone to some Cisco security training and all that, but even then it's just harder to work with. The other big thing is, and this is a big gripe of mine, I suppose, that on any other firewall, when we have various different manufacturers, if you make a change, you know, a simple change object, object name gets changed or object is deleted or whatever the simplest of change is, it gets implemented instantly.
With the Firepower system, you have to deploy the change and it'll take about six or seven minutes for the change to actually take, which is insanely different than any other platform where that change is instantaneous. So let's say if I'm making seven different changes for a troubleshooting job I don't know which one of the seven is gonna fix it, I do one by one by one. I'm like, oh, let me try one change, one second, change, third change, four changes. It's going to take seven deploys. And seven deploys mean it's gonna take an hour of just deploy time. So that is a big, big gripe
There are three main problems with this platform: - short EoL time - it is really missery because this platform was overrated from cisco sales and after shor time they accepted on EoL - sometimes problems with upgrades paths, because of strange behaviour between FXOS and ASA image on the top of it - not good performance when comparing to newer 1k platform
There is room for improvement when it comes to learning the UI, but the UI is overall pretty good. It doesn't take long to learn if you are famaliar with firewalls.
Most of the time, calling SonicWall NSA Support, you get an expert who can help resolve your issues. RMAs are pretty easy once they determine there is an issue with the hardware. Support is available 24x7, which makes emergency calls easy. The only downside is the support engineers may have thick accents; however, their expertise more than makes up for any language barriers.
In the days of purchase of Cisco Firepower 2100 series it was new platform and Cisco aimed their sailsmains to force selling this platfrom. It was one of the first platform with FXOS with full support of ASA images. It was cheper then 4k series and would be better than ASA 5500-x series (but regarding all problems with upgrades and EoL , it is not).
We compared the FortiGate to Sonicwall and continued with Sonicwall as we were a mid-size school where the Sonicwall was performing adequately, and the learning curve was steep to switch platforms. The Sonicwall offered everything the FortiGate did, and was not as costly, both in the appliance and in licensing.