Cisco ASA Interface Card - expansion module - 6 ports

Mfg.Part: ASA-IC-6GE-SFP-B= | CDW Part: 2645561 | UNSPSC: 43201404
Availability: In Stock Ships same day if ordered before 2 PM CT
Warranties
Was $7,000.00
$5,006.44 Advertised Price
Advertised Price
Lease Option ($140.63/month)
Note: Leasing is available to organizations only. Leasing is not available to individuals.
Product Details
  • Expansion module
  • GigE
  • 6 ports
  • for ASA 5525-X Firewall Edition
  • 5525-X IPS Edition
View Full Product Details
Better Together
Quick View
Total Price:

Product Overview

Main Features
  • Expansion module
  • GigE
  • 6 ports
  • for ASA 5525-X Firewall Edition
  • 5525-X IPS Edition
Expand the functionality of your Cisco firewall systems with the Cisco ASA Interface Card. Featuring six SFP GE data ports, this expansion module provides safe and efficient connectivity. Working on the Gigabit Ethernet data link protocol, it offers a data transfer rate of 1 Gb/s for quick transfer. This Cisco interface card is designed for use with the ASA 5525-X Firewall Edition and 5525-X IPS Edition devices.
  • Cisco expansion module with AS/NZS 60950, CISPR 22 Class A and other compliance standards for safety
  • Plug-in form factor allows easy and convenient installation
  • Made from quality components for durable use
Cisco ASA Interface Card - expansion module - 6 ports is rated 3.8 out of 5 by 44.
Rated 4 out of 5 by from One of the most valuable features is the correlation of events -- including the path that a file is taking in the network and its integration with the endpoint protection. Valuable FeaturesClassic ASA ( https://www.itcentralstation.com/products/cisco-asa ) features such as NAT, Stateful Firewall, and VPN are basic functions for average organizations, but next generation features such as the granular control of port hopping applications, IPs, and malware protection are mandatory, considering current advanced security threats.One of the most valuable features is the correlation of events, including the path that a file takes in the network and its integration with the endpoint protection. This gives you the chance to take some actions in the case a breach happens.Improvements to My OrganizationVisibility in the network traffic.Room for ImprovementManagement console – Firesight Management Center.When deploying Cisco FMC versions 6.0 and 6.1, some issues may appear when trying to register ASA sensors. The problem needs Cisco TAC involvement, adding more effort and time. I guess this will be fixed in version 6.2.Use of SolutionI've used this solution for three to five years.Stability IssuesSome releases of the unified image (FTD – Firepower Threat Defense ( https://www.itcentralstation.com/products/cisco-firepower-ngfw ) – Cisco ASA + Sourcefire IPS ( https://www.itcentralstation.com/products/cisco-sourcefire-firewalls )) are not very stable, but things are getting improved.Scalability IssuesSome clustering functions are not available in the unified image.Customer Service and Technical SupportExcellent.Previous SolutionsOld ASA 5500. Natural upgrade to next generation functions.Initial SetupInitial setup is pretty straightforward.Pricing, Setup Cost and LicensingThe licensing model has been simplified and is easy to understand. The price is higher compared to UTM solutions, such as Fortinet ( https://www.itcentralstation.com/products/fortinet-fortigate ), but in the same range as Checkpoint ( https://www.itcentralstation.com/products/check-point-utm-1 ) and Palo Alto ( https://www.itcentralstation.com/products/palo-alto-networks-wildfire ).Other Solutions ConsideredWe also work with Palo Alto Networks, Fortinet, FireEye ( https://www.itcentralstation.com/vendors/fireeye ), and some other vendors.Other AdviceTake a look at the features included in the unified image. Some classic ASA functionality has not been integrated yet, go for non-unified image if the deployment requires something that is not available – classic ASA iOS plus Sourcefire code.Disclaimer: My company has a business relationship with this vendor other than being a customer:
Date published: 2018-01-24
Rated 3 out of 5 by from The best features are NAT, transport-layer inspections, and VPN Valuable FeaturesCisco ASAs are great network firewalls and they can work for years after being configured. The best features are NAT, transport-layer inspections, and VPN.Improvements to My OrganizationWith ASAs, we can keep operational expenses as low as possible. Disaster risks should be observed as usual, but this is definitely not the weak point.Room for ImprovementI would like to see new SW versions being more stable and HW performance increase. However, the new 2000 series has high performance, but it is not shipped widely so far.Use of SolutionI started using Cisco firewalls when old PIX models were produced. I then observed all model changes. This makes about 10 years of continuous experience.Stability IssuesThere are no real stability issues, if upgrades are done carefully.Scalability IssuesI believe scalability issues are caused by poor design.Customer Service and Technical SupportCisco technical support makes a good impression most of the time.Previous SolutionsSome of my customers switched from ZyXel to Cisco and this is an obvious decision for me. It will be much harder to imagine a customer replacing Check Point ( https://www.itcentralstation.com/vendors/check-point ) or Fortinet ( https://www.itcentralstation.com/vendors/fortinet ) with Cisco.Initial SetupThe initial setup should not be left to the customer. The best way to do this is to make a basic setup and integration along with cabling and power-up, then verifying requirements and adjusting the configuration.Pricing, Setup Cost and LicensingBasic features and IPs can work without subscriptions. All next-generation features require per-year payments. Enterprise customers usually agree with price and license fees, so I don't see any painful issues with pricing and licensing.Other Solutions ConsideredI compared Cisco with Fortinet, Checkpoint, and DIY solutions.Other AdviceAll you need to succeed is careful design, professional setup, and a support contract.Disclaimer: My company has a business relationship with this vendor other than being a customer:We have been Cisco channel partners for over 15 years.
Date published: 2018-01-18
Rated 3 out of 5 by from Valuable features are Cisco IPSec VPn , VPN Client, Port Restrictions .​ Valuable Features:* Cisco IPSec VPn* VPN Client* Port RestrictionsImprovements to My Organization:We could connect data securely from outside the company.Room for Improvement:I need application user-IP blocking, Intrusion Prevention, QoS; I can't do these with Cisco and have to change it.Use of Solution:Five years.Stability Issues:No.Scalability Issues:No.Technical Support:I have never needed support from Cisco.Previous Solutions:I couldn’t meet all my needs with the Cisco 5505 so I changed it with a next-generation firewall.Initial Setup:Actually it was simple, making port based policies more simple than PA.Pricing, Setup Cost and Licensing:Cisco price-performance is very successful.Other Solutions Considered:I evaluated Sophos UTM, Checkpoint, Cisco and PA. PA is the best fit for my company because Sophos acquired Cyberoam and their software wasn’t successful for domain user restrictions. Checkpoint was very slow for me and too many licences and it was complicated. Cisco acquired Sourcefire and they need to improve next-gen features. So I chose PA.Other Advice:I know that Cisco acquired Sourcefire and they re-introduced next-generation firewall features and I think they’ll improve NX features.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-09-27
Rated 4 out of 5 by from I love its CLI mode of working, it gives plenty of information with single line of command. Valuable Features:I love its CLI mode of working, it gives plenty of information with a single line of command.This feature allows its administrator to perform advanced level tasks with much ease.Improvements to My Organization:These products provide much stability which, in return, any organization demands to run its functions properly and smoothly.Room for Improvement:This product lacks in GUI format; that needs to be more mature and composed.Use of Solution:10 years +Deployment Issues:No issues.Stability Issues:Rarely, due to software issues.Scalability Issues:As of now, no.Technical Support:Excellent but if non-Indian engineer is assigned.Previous Solutions:We have almost 99% Cisco based infrastructure.Initial Setup:Pretty straightforward.Other Solutions Considered:Usually yes. We did like Huawei and Juniper.Other Advice:Cisco has done great job in introducing new features in their security product by acquiring specialized companies in the past. However, they still need to improve their unique feature products as they are in a challenger position, but not on top, at various product review portals.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-09-22
Rated 4 out of 5 by from It is supported on many platforms and helps us gain access to the network. Valuable Features:There are a lot of features which are good and can be implemented, especially in the latest IOS version of the product.They saved me a lot of time thinking how to solve different scenarios with other solutions.Cisco AnyConnect for remote access is one of them. It is supported on most of the platforms, which business users use. They can gain access to the network, via functions like PBR, Security groups, contexts, and DNS doctoring. This gives a lot of flexibility to the product.Improvements to My Organization:It gave us a more secure environment and a lot of flexibility to the business.Room for Improvement:The next generations part of these products need a better approach. A lot of vendors are definitely a step or two in front of them.Use of Solution:I have worked with these types of firewalls for more than 10 years.Stability Issues:I can say that this product is one of the most stable products I have ever worked with.Scalability Issues:In terms of scalability, this always depends on how the product was chosen and what purpose it will work for. I haven't experienced any issues with the scalability of the product.Technical Support:In terms of technical support, it depends on the different cases. I would surely give Cisco technical support a rating of 9/10.Previous Solutions:I used to work with open source solutions, but the support and complication behind them was definitely not OK. If you want to have flexibility and stability, you have to move on to something that receives more development in that specific area.Initial Setup:The initial setup was straightforward and there was a lot of documentation that can help out with specific cases.Pricing, Setup Cost and Licensing:This is definitely not a cheap solution, but I think it is worth the investment.Other Solutions Considered:We evaluated other solutions like Juniper, but we chose Cisco, since our network was becoming more and more Cisco oriented.Other Advice:I would recommend that you understand the needs of the business case before choosing the product and start implementing it. It is very important to choose the right licenses from the beginning.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-07-18
Rated 4 out of 5 by from The simple access rule, Internet NAT and routing are valuable features. Valuable Features:The simple access rule, Internet NAT and routing are valuable features. It is very simple and the most reliable perimeter firewall.Improvements to My Organization:We were using Cisco Security Manager (CSM) to control and configure our all Cisco products, ASA worked very well on the CSM.Room for Improvement:The next-generation firewall could improve, still, they have NGFW 5525 but I haven’t tried it yet.Use of Solution:We have been using this solution for seven years.Stability Issues:We have never faced any stability issues.Scalability Issues:Sometimes, the throughput and CPU counter issues were faced, maybe because we started to use it a long time ago.Technical Support:Technical support is great, they are very responsible, know the bugs and workaround.Previous Solutions:We have used it from the beginning.Initial Setup:The initial setup is not simple and straightforward, because it is Cisco and you need to configure it by CLI.Cost and Licensing Advice:Obviously, Cisco products are not cheap.Other Advice:If you are looking for a stable run and it is easy to find someone to configure the service, then better go for Cisco; their support is very professional.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-07-12
Rated 4 out of 5 by from A standard rule based firewall that has solved many remote access problems. Valuable Features:It's a standard rule based firewall for us. The AnyConnect VPN has solved a lot of remote access problems. High availability is good. It will fall back to the other ASA without any disruptions.Improvements to My Organization:It has secured our DMZ.Room for Improvement:I would like to see the following made easier:* Objects* Removing objects* Correlating access rules and AnyConnect ACLsSometimes we suffer from older versions, such as objects, object groups, and aliases (name).Use of Solution:We have been using the solution for nine years.Stability Issues:We did not encounter any stability issues.Scalability Issues:We did not encounter any scalability issues.Technical Support:The technical support is good.Previous Solutions:We used Cisco PIX.Initial Setup:I can't really remember the setup. It was too long ago.Cost and Licensing Advice:We bought the solution, so there were no real recurring costs at that time.Other Solutions Considered:We didn't evaluate any alternative products.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-07-03
Rated 4 out of 5 by from Simplified the complexity of our security architecture. Valuable Features:Provides advanced malware capabilities.Improvements to My Organization:Simplified the complexity of our security architecture.Room for Improvement:Integration of advanced malware services with the firewall through Firepower services.Use of Solution:We have been using this solution for six months.Deployment Issues:There were no issues with deployment.Stability Issues:There were no issues with stability.Scalability Issues:There were no issues with scalability.Customer Service:I would give customer service a rating of 10/10.Technical Support:I would give technical support a rating of 10/10.Previous Solutions:We were looking to upgrade to a comprehensive firewall solution that integrated Next Generation Prevention System (NGIPS).Initial Setup:There were no issues with setup.Implementation Team:We implemented in-house.ROI:We calculated for the entire year, but the ROI seemed very decent from the first six months.Cost and Licensing Advice:Pricing: NegotiateLicensing: Buy the advanced Malware Protection license subscription for one year. It is worth the investment.Other Solutions Considered:We evaluated Juniper, Fortinet, and Huawei.Disclaimer: My company has a business relationship with this vendor other than being a customer:We are a CISCO Security Business partner
Date published: 2017-06-28
  • y_2018, m_7, d_20, h_18
  • bvseo_bulk, prod_bvrr, vn_bulk_2.0.8
  • cp_1, bvpage1
  • co_hasreviews, tv_0, tr_44
  • loc_en_US, sid_2645561, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING), SortEntry(order=FEATURED, direction=DESCENDING)]
  • clientName_cdwg