117

Cisco ASA Interface Card - expansion module - 6 ports

Mfg. Part: ASA-IC-6GE-SFP-B= | CDW Part: 2645561 | UNSPSC: 43201404
$7,000.00SAVE $2,005.53
$4,994.47Advertised Price
Lease Option ($147.34 /month) Lease Availability
Close

Have leasing questions? Let us know how can we help.

Note: Leasing is available to organizations only. Leasing is not available to individuals.
800.808.4239
Mon-Fri 7am-7:30pm CT
Availability:In Stock
Ships today if ordered within 6 hrs 13 mins
  • Expansion module
  • GigE
  • 6 ports
  • for ASA 5525-X Firewall Edition
  • 5525-X IPS Edition
View More

Recommended Warranties and Services

View All Warranties and Services
Product Overview
Main Features
  • Expansion module
  • GigE
  • 6 ports
  • for ASA 5525-X Firewall Edition
  • 5525-X IPS Edition
Expand the functionality of your Cisco firewall systems with the Cisco ASA Interface Card. Featuring six SFP GE data ports, this expansion module provides safe and efficient connectivity. Working on the Gigabit Ethernet data link protocol, it offers a data transfer rate of 1 Gb/s for quick transfer. This Cisco interface card is designed for use with the ASA 5525-X Firewall Edition and 5525-X IPS Edition devices.
  • Cisco expansion module with AS/NZS 60950, CISPR 22 Class A and other compliance standards for safety
  • Plug-in form factor allows easy and convenient installation
  • Made from quality components for durable use
Technical Specifications
Specifications are provided by the manufacturer. Refer to the manufacturer for an explanation of the print speed and other ratings.
Environmental Parameters
Humidity Range Operating: 5 - 95% (non-condensing)
Max Operating Temperature: 113 °F
Min Operating Temperature: 32 °F

Header
Brand: Cisco
Compatibility: PC
Manufacturer: Cisco Systems
Model: ASA Interface Card
Packaged Quantity: 1
Product Line: Cisco

Interface Provided
Connector Type: SFP (mini-GBIC)
Qty: 6
Type: Network

Miscellaneous
Compliant Standards: AS/NZS 60950 , CISPR 22 Class A , CSA 22.2 No. 60950 , EN 60950 , EN 61000-3-2 , EN 61000-3-3 , EN55022 Class A , FCC Part 15 A , IEC 60950 , UL 60950 , VCCI Class A ITE

Networking
Connectivity Technology: Wired
Data Link Protocol: Gigabit Ethernet
Data Transfer Rate: 1 Gbps
Features: Jumbo Frames support
Form Factor: Plug-in module
Ports Qty: 6
Type: Expansion module

Service
Support Details Full Contract Period: 90 days
Support Details Type: Limited warranty

Slot Required
Total Qty: 1
Type: Expansion slot

Dimensions & Weight
Depth: 9.1 in
Height: 1.6 in
Weight: 15.87 oz
Width: 5.3 in

Service & Support
Type: 90 days warranty

Product Reviews
Cisco ASA Interface Card - expansion module - 6 ports is rated 3.8 out of 5 by 36.
Rated 4 out of 5 by from One of the features that should be improved is the URL filtering engine, but the stability of this product is one of the key functionalities in our deployment. Valuable Features:The ability to intercept unwanted traffic, and prevent attacks without interrupting everyday work, and the stability of this product are the key functionalities in our deployment.Improvements to My Organization:This product, and our implementation, are not directly correlated with the core business of our company. It is designed to protect our company from outside threats and reduce impact on other network elements, such as the backend firewall, DMZ zone and VPN concentrators.Room for Improvement:Cisco ASA lacks some functionalities, when compared with other vendors’ products. Cisco need to implement some more functionalities, like client-less VPN (HTML5), but I expect that Cisco will continue to add, and improve, features of the product. One of the features that should be improved is the URL filtering engine, as currently it has limited functionality. For full functionality, you will need an external URL filtering server, like Websense.Use of Solution:We have used it for more than five years, and have implemented it for perimeter network protection. It is designed for basic network protection for our corporate environment.Deployment Issues:No issues during the deployment, as we had good planning.Stability Issues:No issues with stability. The device is designed for hard work 24/7. I never have a lack of resources like RAM or CPU. The only reason I need to restart the device is during a software upgrade.Scalability Issues:In our deployment, we did not have a scalability issue.Customer Service:It is very high.Technical Support:We did not have any technical problems with this product, so we have not had need of technical supportPrevious Solutions:We implemented ASA after a complete redesign of our network, and we believe that Cisco ASA is the right solution for our needs.Initial Setup:The initial setup is straightforward, as there is a lot of documentation available on the Cisco site, and other sites, which makes planning and deployment pass without any problems. However, the ASA is a complex device, with a lot of features and further tuning is complex and you must have the right knowledge to do it. Configuration can be done through a Java based application called ASDM or through the CLI interface. Using ASDM is much more simple and easy, but ASDM is not compatible with the newer Java version, so before implementation you must read the compatibility notes. Also, keep in mind that when upgrading ASA software, you must also upgrade the ASDM package.Implementation Team:Initial implementation was through a vendor. I would rate their experience and expertise as 9/10.ROI:Calculating the ROI for network security or IT security is complex and dependent on many factors, like the implementation, role, expectation etc. IT security cannot be compromised, but on the other hand, we must ask how much is enough. In our case, we do not have a defined ROI for this product.Cost and Licensing Advice:The cost of the setup was only the product price, local vendor support for the implementation, and employee training. This product is set it and forget it, so we do not have day to day costs.Other Solutions Considered:We did not evaluate other products. One reason was that we believe that the ASA is a reliable product and fits our needs. Another reason, was the lack of local support for other solutions.Other Advice:Unfortunately, the ASA 5500 is EoS and EoL, and I hope that Cisco’s NGF 5500-X series will be a worthy successor. This does not mean that Cisco will stop software support and will continue to release new software versions with new and improved features for the ASA 5500 series.As with any other product, the main things for a successful implementation are to decide what you want to achieve, and what your main goal is, and then, you need good planning, not only for your current needs, but you also need to keep in mind further grow and needs. Good planning is, at least, 80% of successful implementation.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-03-20
Rated 4 out of 5 by from Site to site VPN is easy, but it's very expensive. Valuable Features:* VPN* ASDM configurationFor FirePOWER:* IPS* AMP* URL filteringImprovements to My Organization:It's pretty easy to connect between different branches using site to site VPN.Room for Improvement:Cost, it's very expensive. To migrate from a Cisco ASA 5550 and not drop in performance, you have to go to a Cisco ASA 5555-X with FirePOWER. To fully use the Cisco FirePOWER IPS, AMP and URL filtering, you are forced to (MUST) buy the Cisco FireSIGHT management centre. You also have to buy licensing for Cisco AnyConnect VPN clientUse of Solution:I've been using it since October 2004, so for 10 years.Deployment Issues:Due to the cost, I am still waiting for more funds to deploy the final phase, FirePOWER IPS, AMP and URL filtering.Cisco did an upgrade from v8.2 to v8.3 of the migration system. NAT configuration is different from 8.2 to 8.3. It's not easy to upgrade to 8.3 and above leading to running different software versions.Stability Issues:V8.2 is very stable. With the latest versions it's still early to tell.Scalability Issues:Upgrading from v8.2 to v8.3 is a nightmare. The risks of down time are so high that I am forced to run different versions. Stay with 8.2 on all NAT dependent on your ASA, but again it's all about the cost.Customer Service:Excellent customer service. Cisco listens to their customers.Technical Support:Excellent customer service and documentation.Previous Solutions:We previously used Checkpoint, and I switched because Checkpoint was expensive but now it looks like Cisco is following the same route.Initial Setup:It was not that complex because I was using Cisco routers and switches five years prior.Implementation Team:It was an in-house implementation.ROI:I can't tell right now as I am still investing.Cost and Licensing Advice:The initial investment on the Cisco ASAs was around one million South African Rand and there's a R200,000 annual maintenance cost with Cisco's partners.Other Solutions Considered:No. I went straight to Cisco because of my experience with their CUCM IPT solutions, routers and switches.Other Advice:Budget a lot of money, especially on the initial setup and the annual licensing and maintenance cost.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-01-26
Rated 3 out of 5 by from SourceFIRE has improved the IPS functionality, however, it could use better troubleshooting capabilities. Valuable Features:With the ASA there are multiple products depending on your needs based on the two generations of the ASA. Roughly split-up there are 4 products.* 5500 Series basic/standard firewall - This I would rate as 7/10 due to the fact that it's easy to use, manage and deploy. Its scalable SSL, and IPSec VPN options, and is lacking throughput* 5500-X Series basic/standard firewall - This I would rate as 8/10 due to the fact that it's easy to use, manage and deploy. Its scalable SSL, and IPSec VPN options, and it has high throughput* ASA5500 Series with firewall and CX - This I would rate as 5/10 due to fact that even though the firewall and VPN part is easy to manage and deploy, the CX is lacking in stability, and features. Also, it is rather complex to deploy. Add to this the CX lowers the throughput even further* 5500-X Series with firewall and Sourcefire - This I would rate as 9/10 because it's easy to use, manage and deploy the firewall, VPN, and also the SourceFIRE. SourceFIRE works rather well and is by far the most advanced IPS system available. But it decreases the throughput more than you´d likeIn general, I like both the SSL VPN and SourceFIRE. Firstly, for the VPN, both the client and client-less versions are very scalable, flexible, and dynamic in configuration and probably the best SSL VPN solution available in the marked. Secondly, SourceFIRE has improved the IPS functionality and stability of the ASA to a point where you can begin to enjoy the fruits of your solution and root out the bad seed in you network.Improvements to My Organization:For many of my customers, the SourceFIRE solution has been an eye opener of exactly what their users are generating of traffic. Some customers, after reviewing the traffic application usage reports are astounded by the amount of traffic used, for example by Facebook and YouTube. My customers like the visibility into their network usage, and not necessarily wanting to block it, but just to know that they can control the network traffic and utilization if needed.Room for Improvement:Definitely the throughput could use an upgrade when running the SourceFIRE/AMP with the ASA. Also, it could use better troubleshooting capabilities. You are, most of the time, bound to have access to TAC for troubleshooting advanced problems.Use of Solution:Customers where I have deployed these solutions have had them forthree plus years, and most of them have, at the present moment havefirst generation solutions, or are planning an upgrade to the secondgeneration ones (NGFW or NGIPS),Deployment Issues:There are always issues when implementing key equipment like firewalls, especially if you are converting from an unfamiliar platform, activating SourceFIRE, or doing a general maintenance rule clear-up. If you don’t follow best practice, you can seriously impact network performance or unintentionally shut-down services.Stability Issues:In general the ASA has a great software stability reputation, and even though SourceFIRE for ASA is still young, the stability seems to be rather good. Of course you can’t avoid all issues, and you might have to reinstall the SourceFIRE software on the modules. If you're upgrading the ASA from pre code 8.3, you will need to redo the NAT and access rules of the ASA.Scalability Issues:License scalability for SourceFIRE is really not good if you have an ASA in HA as you need two licenses of everything, which is really bad as you wont get double SourceFIRE other than that you need to remember to buy your ASA based on the SourceFIRE's throughput and not the inspection throughput.Customer Service:If you have a service contract with Cisco you can have TAC assistance, software upgrades and next-business-day RMA (or faster) otherwise you are left to yourself or your Cisco partner. Basically without a Cisco service contract, you can't get any help or software from Cisco.Technical Support:Should you have a Cisco service contract, you get access to TAC that will provide you technical assistance towards solving your issue. The TAC experience can vary a lot. In general I would rate it as very good, 4/5.Previous Solutions:Mainly customers switch from other vendor because of VPN features, ease-of-management, and good consultant/partner relationship.Initial Setup:The initial setup is fairly easy and there are wizards for almost all the basic needs, including the initial setup and all types of VPN technologies that the ASA supports.Implementation Team:I am the vendor, and I am an expert with ASA.Other Advice:Make sure you get the right product/license to do the job you need done. If you are in doubt ask a consultant or a Cisco Partner. I have seen cases where a firewall wasn't the right hardware for the job and you can't just switch off the firewall/inspector for some interfaces or networks.Disclaimer: My company has a business relationship with this vendor other than being a customer:Cisco Gold Partner
Date published: 2017-01-25
Rated 4 out of 5 by from An excellent firewall, and one of the best available choices for big size companies. As usual excellence requires money. Valuable Features:ASA is a family of hardware based firewalls, stable and with a low level of work required on the maintenance side. It is a dedicated firewall, so you do not have to manage additional topics like spam, web sites filtering and so on.The routing part is high level as usual with Cisco products.Room for Improvement:You have to know the ASA command line very well because not all operations are available in the graphical interface (or let's say that sometimes it is better to operate with the ASA CLI).If you are searching for an "all in one product" it is not for youOther Advice:ASA is one of the the state-of-the-art firewall devices for security.It is affordable and not too complicated to use if you are doing standard operations (modifying ACLs, natting and so on) on an existing deployment.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-12-25
Rated 4 out of 5 by from Cisco has done a superior job at its next generation of firewall technology. Valuable Features:The user interface of the Prime Security Manager is, well, prime and one of the best pieces of software I have seen from them, and the features are on par if not better than what their competitors offer.Improvements to My Organization:Cisco has done a nice job of integrating global IP reputation management into the firewall with its Security Intelligence and Operations module for insights and malware collection.Room for Improvement:Prime manager is just for the CX line for now. CX features also add about a 30% overhead on throughput.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-10-26
Rated 4 out of 5 by from Reliable product which I'd like to see include a web filtering functionality. Valuable Features:It blocks all outside to inside traffic and only permits the specific internet traffic from the outside. VPN functionality is very useful, we can create remote access and tunnel VPN in the simplest way.Improvements to My Organization:It blocked all kinds of internet attacks from outside like DOS or DDOS and avoided any down time. We created a remote tunnel from head office to data center network for easy access of servers that make working fast and they are easily manageable.Room for Improvement:It would be great if they would add web filtering functionality to this product.Use of Solution:5 yearsDeployment Issues:NoStability Issues:NoScalability Issues:NoCustomer Service:ExcellentTechnical Support:GoodInitial Setup:It is a little difficult in newer IOS versions where the use of the NAT command is different. Otherwise its straightforward to configure.Implementation Team:I deployed it in-house with my team.ROI:This solution reduces any downtime therefore business continuity is not disturbed - that is ultimately ROI.Cost and Licensing Advice:It is one time cost of about $10,000 and there is no day to day cost.Other Solutions Considered:Yes, I evaluated Fortigate, SonicWall and Juniper but found Cisco ASA to be the best solution for us above all of the others.Other Advice:Cisco ASA is a reliable product and it benefits you a lot in your network.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-10-23
Rated 4 out of 5 by from The FirePower IPS, AMP and URL filtering add value to the firewall. Valuable Features:Cisco ASA has a well-written command-line interface. Cisco’s AnyConnect SSL VPN is by far the best client VPN technology I’ve ever had to deploy and manage. Upgrades are a breeze. Failovers between units are flawless. FirePower add-ons deepen security with intrusion prevention (IPS), anti-malware protection (AMP), and URL filtering. These particular services can run as a hardware or software module within the ASA. Unlike ASA with CSM, these modules are managed by FireSight, a single pane for all of your FirePower nodes. It’s intuitive and easy to use, but still lacks some automation capabilities (e.g., bulk edits, etc.).Improvements to My Organization:Cisco is a huge name in the networking world. Having a solution that includes their firewall technology adds value from an operability and support perspective. Cisco, although sometimes considered to be "behind the times" with firewall technology, continues to prove it has momentum in the industry through acquisitions such as Sourcefire and OpenDNS, with rapid integration into their systems. Additionally, ASA is synergistic with other security offerings from Cisco, such as ISE, remote tele-office workers, etc.Room for Improvement:When running multiple firewalls in your network, you need someone to manage them from a central point. Cisco’s answer is Cisco Security Manager (CSM). Unfortunately, this is a suite of applications that is in much need of an overhaul. It is riddled with bugs and lacks the intuitive experience found in competing vendor offerings. The counter-intuitive interface makes configuration management cumbersome and prone to mistakes. There are software defects within certain modules of the application, resulting in a frustrating experience. Reporting is almost useless. The best part about it is the logging component, but it still is lacking, compared to what you get from other competing vendors.Aside from management, I think Cisco needs to become more application-focused, something that a few of their competitors shine in.Use of Solution:I've deployed and managed Cisco ASA's for over a decade. I've used the X-series models for about three years now.Stability Issues:I have not encountered any stability issues; this is a solid firewall platform. Stability is where it shines.Scalability Issues:The newer clustering capabilities have introduced some solid scalability design options. From a cost perspective, scalability is quite intimidating.Technical Support:Cisco's TAC engineers are competent, responsive and typically resolve issues in a timely fashion. Do not use them for "best practice"; this is what channel partners are for.Previous Solutions:I previously used Check Point. Check Point relied on a thick, Windows-based client and, at the time, did not support transparent contexts. However, Check Point has a solid management platform, which is something Cisco should take some pointers from.Initial Setup:Initial setup is complex for a new user, straightforward for a seasoned user. Tons of documentation is available, but you can easily get lost for days if you've never touched one. Cisco offers ASDM, a GUI wizard that can help set up the firewalls. This is nice for newer folks.Cost and Licensing Advice:Work very closely with your channel partners to verify you have all the licensing you need (VPN, Firepower, etc.). Pricing is always a challenge. Buy closer to Cisco's EOY and you might save a few bucks.Other Solutions Considered:Before choosing this product, I also evaluated Palo Alto. I really liked their firewall platform, their Panorama management platform, and wildfire technology. Their SSL VPN was seriously lacking. This is a decent option to consider as well.Other Advice:Read the Cisco Validated Designs (CVDs) regarding ASAs. Find some decent blogs, discuss topologies and scenarios with a seasoned engineer, and get your final design validated by Cisco. Your Cisco SE should be able to assist with this. If you need assistance implementing, work with your channel partner.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-10-04
Rated 5 out of 5 by from Cisco firewalls can be difficult at first but once learned it's fine. Valuable Features:RobustnessImprovements to My Organization:ReliabilityRoom for Improvement:No idea -- I learn a lot from themUse of Solution:From 2000 until 2014Deployment Issues:Learning at the beginningStability Issues:Nope -- If well planed you should be alrightScalability Issues:Price maybe...Customer Service:ExcellentTechnical Support:ExcellentPrevious Solutions:Not reliable for long term -- seem inferior qualityInitial Setup:Depends on the product and the knowledge. Cisco firewalls can be difficult at first but once learned it's fine.Implementation Team:Me, I implemented the firewalls ( http://www.itcentralstation.com/category/firewalls ), Cisco switches and routers.ROI:100% in some installations it exceeded the time predicted to keep up with the work load.Other Solutions Considered:Netscreen, Netgear, Checkpoint, others..Other Advice:Plan well the hardware requirements for future growth and heavy usage.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-08-22
  • y_2017, m_4, d_24, h_13
  • bvseo_bulk, prod_bvrr, vn_bulk_1.0.0-hotfix-1
  • cp_1, bvpage1
  • co_hasreviews, tv_0, tr_36
  • loc_en_US, sid_2645561, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING), SortEntry(order=FEATURED, direction=DESCENDING)]
  • clientName_cdwg
 
Adding to Cart...
4/25/2017 7:47:56 AM
^ Back to Top

Maximum 300 characters
An account manager will email you within one business day to confirm your request.

Your Quote has been submitted

What Happens Next? A confirmation email is on its way. Within one business day, you will be contacted by an Account Manager to finalize your quote.

Error!

Something went wrong.

Please try again later.