Overall Satisfaction with Cisco ASA 5500-X with FirePOWER Services
We utilize the 5500-X with FirePower services for our everyday use to monitor traffic coming in and going out of our network. We set up many network address translations for web pages that need to be reached externally and also have internal resources being accessed that still need protected. We've setup all of our access control lists and constantly keep them up to date so we don't have to worry about being attacked as easily as other companies who don't put forth the additional effort for their security and safety. We also utilize URL filtering and a couple of other security features that allow us to stay notified of issues on our network, so we can take specific actions being to keep our company safe.
- Creating ACLs to grant/restrict specific access
- Creating NATs to allow specific access
- Creating Objects that can be greatly detailed
- Monitor traffic and activity on the network
- URL Filtering feature could be easier to utilize for beginners
- I'd like to see a visual of VPN networks setup and show the functioning or malfunctioning status to assist in making troubleshooting easier
- Recommendations on ACLs for beginners based on their account creation date
Do you think Cisco ASA 5500-X with FirePOWER Services delivers good value for the price?
Yes
Are you happy with Cisco ASA 5500-X with FirePOWER Services's feature set?
Yes
Did Cisco ASA 5500-X with FirePOWER Services live up to sales and marketing promises?
I wasn't involved with the selection/purchase process
Did implementation of Cisco ASA 5500-X with FirePOWER Services go as expected?
I wasn't involved with the implementation phase
Would you buy Cisco ASA 5500-X with FirePOWER Services again?
Yes
- Saved from the worst of an attacker
- Site-to-site VPNs have been a lifesaver
- Keeps all of our users and data safe
- Cisco AnyConnect
- Cisco Duo
- Cisco Firepower Management Console
We have integrated the ASA with the Cisco AnyConnect VPN client. This has helped many users to connect to our internal resources from wherever they're accessing from. This has been a great help due to the covid pandemic. We utilize Cisco Duo for MFA so we can keep even the firewall safe from an easy password that could be broken. We also utilize the Cisco Firepower Management Console to give us a greater visibility into network traffic flows.
I like how everything is separated within the Cisco ASA vs the Meraki MX. The Meraki MX doesn't allow for specific network objects or ACLs to be manually created like the Cisco ASA does. The Cisco ASA is easier to configure new network routes to an existing network compared to the Meraki MX as well.