How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We are using Cisco ASA NGFW as an Edge firewall and additionally also using it as a VPN aggregator in HUB-SPOKE architecture for Branch-HO connection. We have implemented all the policies as per the IT guidelines in the ASA.
Access the Cisco ASA or ASDM.
I have tried and added the following command and then test:
ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1
Then the problem has been fixed.
Our business requirements are URL filtering and threat protection. We're using the Cisco 5525 and 5510 series. We have eight to 10 firewalls. Our company is looking for vendors who can protect from the current, advanced technologies. We are looking for any technology that protects from the most threats, and that covers things like DDoS protection, spyware, and SSL.
My primary use case is to have as VPN hardware. I have 2,000 providers. I am a reseller and as such, I am connected to telcos. I use ASA because our providers use Cisco in their core network as well.
We use them for perimeter defense and for VPN, and we also do web filtering. We're using ASAs at the moment. Going forward, we'll probably look at the FirePOWERs. We currently have anywhere from low end to the mid-range, starting with 5506s all the way up to 5555s. Everything is on-prem. We have a total of five different security tools in our organization. A couple of them complement each other so that's one of the reasons that we have so many, instead of just having one. For an organization like ours, it works out pretty well. We are a utility owned by a municipality, with a little over 200 employees in multiple locations.
We use them to block or allow traffic out to the internet and to control a handful of DMZs. Overall, they're for access control. We do IPS and IDS as well. We have the FMC (FirePOWER Management Center) which manages the 4110s and we have 5516s and the ASA5545-Xs. It's an ASA running the Next Generation Firewall code. We're using all of the FMC with 6.4.04, so they're all running the Next Generation Firewall code. We deploy the software on-prem.
We had legacy Sourcefire Sensors and ASA state full firewalls. Cisco offered the FTD NGFW solution, but the implementation of the two systems was not successful.
The primary use case is to have full visibility over our Web & Application behavior on the local network and over the internet. On the other hand, reporting is one of the main needs so that we can monitor and evaluate our consumption and according to that, build up our policies and security.
The primary use case is to protect our departments. We have sub-departments or sites categorized by the number of users and types of applications. We categorize the latter in terms of small, medium, or large. Based on that, we select a firewall in terms of throughput and the number of concurrent sessions it can handle. We then deploy the firewall with a predefined set of rules which we require for inbound and outbound traffic. We are in operations delivery and we need to support multiple clients. We have different departments where our primary responsibility is to protect our organization's assets and data and to store them in a centralized data center. Apart from that, we have responsibility to support our clients in terms of infrastructure. All the devices are on-premise. Nothing is on the cloud or is virtualized.
Our primary use case for this solution is to protect data from unauthorized access.
This solution is running behind the infrastructure and behind the hypervisor itself. We have two firewalls and two nodes in the cluster environment. This solution is suitable for both cloud and hybrid-cloud deployments. I have implemented a cloud project, and one hybrid as well. The hybrid was between a public and a local cloud.
Our primary use case of this program is network protection.
We primarily use the solution for internet access firewalls.
Our primary use case is to protect our network from external threats. We need to keep our portal safe. We use the public cloud model of this solution.
Our primary use for the solution is as a firewall. We implemented it as an IT tech solution for our accesses through Sourcefire. It provides security.
I worked for a Telecom provider, and we gave this solution to our customers.
We primarily use this solution for network security.
We use this solution as a firewall and for the segregation of our servers from the rest of the environment.
We use this solution to join our private network to the customer's network. In our business, we don't have to be on the customer's network, so a lot of people will install cheap equipment. We're trying to push it to where we can standardize the equipment, although the cost of Cisco products would have to come down a little bit in order for us to be more competitive.
Our primary use for the solution is for checking on and verifying the security of our customer data.
I primarily use it for my small company to protect 5-10 users.
We performed an in-house evaluation of Cisco ASA NGFW for use as an Internet Gateway Firewall and internal East-West traffic firewall between security zones. We are historically a Cisco shop and were planning on it being the top contender for our NGFW solution.
Our primary use case for this solution is to protect the Internet Edge, and our VPN (Virtual Private Network).
We are using the Cisco ASA NGFW as a next-generation firewall. We are using the 5516-X version. Our primary use case of this is as an X firewall for external connections.
I have been using the Cisco ASA NGFW for about four months. Everything works fine right now. We have only been using this device for a very short period of time. * We have about 500 registered users and about 400-600 static users. * For 400 to 600 users with wireless devices, we use Cisco ASA NGFW to control device traffic. We're using the new web filters. * We use Cisco ASA NGFW as the bit application. Thus far, we are using it as a web filter to filter the data against incoming traffic. We are an educational organization, so there is no gambling allowed. We don't want to allow students access to gambling sites or adult sites, etc. We use lots of web filters. That's the primary reason I installed the Cisco firewall. We are also happy with the Cisco ASA NGFW router firewall. It protects your small server infrastructure, but it's not complete. We purchased the Cisco ASA NGFW for the web filter. That's why we moved to the firewall.
I am a banker. I'm working in the bank and our equipment is mostly based on Cisco for the moment. We have some incoming projects to deploy from Fortigate to firewalls. Cisco ASA is that something I used when I was preparing for my CCNP exams. I've been using it on the incoming project that we want to do right now. It is easy to deploy Cisco ISP solution in the bank I'm working in, i.e. Cisco Identity Services Engine. We're already used Cisco ISSO. I have three Cisco ASA modules: * Security for perimeters * Security for data centers * Data center recovery I have been using Cisco ASA since I've been at the bank for more than two years now. The model is 5515X. I have two modules of 5515X and the third one is the old 55105. My primary use of Cisco ASA is to take advantage of all the features. I use it to enforce security policy and also to take advantage of the Firepower module. I have a firewall module on my two instances of 5515X. On the Firepower side, I use all features on Firepower modules that are included in the AMP.
We use Cisco ASA with Firepower. Currently, we have been implementing the solution for around four years. Our company has been around for a long time, more than ten years. We cover the solutions for Network Direct Turbo ATM at the moment, it's a lot of the security work.
We use remote desktop services from our data center. We can clean the client and the remote desktop server and from there we can establish a VPN channel.
Primarily, we are just using it as a firewall, mostly to protect our internal SQL network (our primary network). At the moment, we are not using Cisco Firepower for our services. We just use it as a firewall.
The primary use case for this solution is on the client side. PCS stands for Perfect Computer Systems. We are an integration company, we specialize in solution integration, bringing together component subsystems into a whole and ensuring that those subsystems function together.
We mainly use this solution for our firewall and it's one layer of our security. From the time that we've used it, the organization as a whole got a sense of security because Cisco is a known product. When we do need support locally or online, we get it instantaneously. We use this solution for a couple of things: for security, for their technical support, and in terms of the knowledge and skills of the team here that gave us a good grip and confidence in the use of the product.
Our primary use case is for security. We are a bank in India and the data is very important for us. We use ASA for our security and protection.
I have deployed Cisco ASA as a terminator firewall. Normally, I would have preferred to have a sandwich configuration for firewalls: One possible firewall that would make an internal firewall and another for an external firewall.
It is our firewall solution. We connect to other locations, as well as use programs in-house.
I have been using this product for over ten years. Most of the features fulfill my requirements. It protects our network.
It is primarily used as a firewall. I think that all firewalls basically work the same, but some have different configurations of the switches. Cisco ASA is very strong.
It was used for a remote office deployment connect back via VPN to the corporate office and services.
Our primary use case is to use it as a firewall.
We primarily use this product for networking. We are a Cisco shop, as far as networking goes.
Generally, it has highly productive platforms and it has good capabilities.
It helps the firewall in our network and the VPN (Virtual Private Network). It creates a secure tunnel for our network.
The primary use is that it manages all of our incoming and outgoing VOIP transmissions as well as data transmissions between our branches and our third-party bank processor. It has performed well.
* High-performance intrusion prevention * Malware protection * Multiple firewalls to control departments on a business by business level (security policies per department). * Allowed us to consolidating multiple security devices into a single appliance.
Firewall and VPN.
This solution is involved in the protection of the network perimeter and the VPN gateway.
We offer publishing services. It depends on our business, but we use this solution for security.
Some branches are joint through Cisco ASA 5500-X VPNs. Executives or employees are connected via AnyConnect.
We use it for our university department firewall. It replaced our 12-year-old Cisco ASA 5520, which used to protect web servers, mail servers, SVN repositories, office computers, research computers, and computer labs. It was used for blocking the internet for exams. It was not used for IPS, so we did not buy the new threat protection or malware license. We connected it to a Layer 3 switch for faster Inter-VLAN routing.
I am using Cisco ASA as the firewall for my business to guard the boundary of my business. It has been very helpful in my sector of media with my clients, essentially focusing on how secure their data is, especially when we are working on a few projects which involve multiple citations across Europe. Our content, which is the main asset for our firm, is pretty elusive behind the firewall of Cisco ASA.
Remote network access: We primarily use ASA for VPN, NAT, PAT routing, SLA, and multiple ISP providers.
The primary use case is for edge firewall at multiple locations and remote access VPN. We use these for security and have them integrated with Splunk/QRadar.
IT landscape is dynamic, requiring security policy, controls, and visibility to be better than ever. * 1Gbps * Multi-service * Beats sophisticated cyber attacks with a superior security appliance. * IT landscape is dynamic. * Requires security policy, controls, and visibility to be better than ever. This applies to all ASA-related Management/to-the-box traffic, like SNMP, SSH, etc., with Firepower services combined with our proven network firewall along with the industry’s most effective next-generation IPS and advanced malware protection. Therefore, you can get more visibility, be more flexible, save more, and protect better.