Cisco ASA with FirePOWER Services IPS, Apps and AMP - subscription license

Mfg. Part: L-ASA5506-TAM-3Y | CDW Part: 3640760 | UNSPSC: 43233204
$1,075.00SAVE $462.54
$612.46Advertised Price
Lease Option ($18.07 /month) Lease Availability

Have leasing questions? Let us know how can we help.

Note: Leasing is available to organizations only. Leasing is not available to individuals.
Mon-Fri 7am-7:30pm CT
Availability:In Stock
Ships same day if ordered before 4 PM CT
  • Subscription license (3 years)
  • 1 appliance
  • ESD
  • for ASA 5506-X
View More
Product Overview
Main Features
  • Subscription license (3 years)
  • 1 appliance
  • ESD
  • for ASA 5506-X
Cisco ASA with FirePOWER Services brings distinctive threat-focused next-generation security services to the Cisco ASA 5500-X series Next-Generation Firewalls and Cisco ASA 5585-X Adaptive Security Appliance firewall products. It provides comprehensive protection from known and advanced threats, including protection against targeted and persistent malware attacks.

Cisco ASA is the world's most widely deployed, enterprise-class stateful firewall with remote access VPN and advanced clustering for highly secure, high-performance access and high availability to help ensure business continuity.

Granular Application Visibility and Control (AVC) supports more than 3,000 application-layer and risk-based controls that can invoke tailored intrusion prevention system (IPS) threat detection policies to optimize security effectiveness.

The industry-leading Cisco ASA with FirePOWER next-generation IPS (NGIPS) provides highly effective threat prevention and full contextual awareness of users, infrastructure, applications, and content to detect multivector threats and automate defense response.

Reputation- and category-based URL filtering offers comprehensive alerting and control over suspect web traffic and enforces policies on hundreds of millions of URLs in more than 80 categories.

Advanced Malware Protection provides industry-leading breach detection effectiveness, a low TCO, and superior protection value that helps you discover, understand, and stop malware and emerging threats missed by other security layers.

Technical Specifications
Specifications are provided by the manufacturer. Refer to the manufacturer for an explanation of the print speed and other ratings.
License Category: Subscription license
License Qty: 1 appliance
License Type: Subscription license
License Validation Period: 3 years

Brand: Cisco
Compatibility: PC
Manufacturer: Cisco Systems
Model: IPS, Apps and AMP
Packaged Quantity: 1
Product Line: Cisco ASA with FirePOWER Services

Category: Online & appliance based services
Electronic Distribution: Yes
Installation Type: Locally installed
Subcategory: Online & appliance based services - adware & malware removal tools , Online & appliance based services - appliance software , Online & appliance based services - intrusion detection

Product Reviews
Cisco ASA with FirePOWER Services IPS, Apps and AMP - subscription license is rated 3.8 out of 5 by 36.
Rated 4 out of 5 by from One of the features that should be improved is the URL filtering engine, but the stability of this product is one of the key functionalities in our deployment. Valuable Features:The ability to intercept unwanted traffic, and prevent attacks without interrupting everyday work, and the stability of this product are the key functionalities in our deployment.Improvements to My Organization:This product, and our implementation, are not directly correlated with the core business of our company. It is designed to protect our company from outside threats and reduce impact on other network elements, such as the backend firewall, DMZ zone and VPN concentrators.Room for Improvement:Cisco ASA lacks some functionalities, when compared with other vendors’ products. Cisco need to implement some more functionalities, like client-less VPN (HTML5), but I expect that Cisco will continue to add, and improve, features of the product. One of the features that should be improved is the URL filtering engine, as currently it has limited functionality. For full functionality, you will need an external URL filtering server, like Websense.Use of Solution:We have used it for more than five years, and have implemented it for perimeter network protection. It is designed for basic network protection for our corporate environment.Deployment Issues:No issues during the deployment, as we had good planning.Stability Issues:No issues with stability. The device is designed for hard work 24/7. I never have a lack of resources like RAM or CPU. The only reason I need to restart the device is during a software upgrade.Scalability Issues:In our deployment, we did not have a scalability issue.Customer Service:It is very high.Technical Support:We did not have any technical problems with this product, so we have not had need of technical supportPrevious Solutions:We implemented ASA after a complete redesign of our network, and we believe that Cisco ASA is the right solution for our needs.Initial Setup:The initial setup is straightforward, as there is a lot of documentation available on the Cisco site, and other sites, which makes planning and deployment pass without any problems. However, the ASA is a complex device, with a lot of features and further tuning is complex and you must have the right knowledge to do it. Configuration can be done through a Java based application called ASDM or through the CLI interface. Using ASDM is much more simple and easy, but ASDM is not compatible with the newer Java version, so before implementation you must read the compatibility notes. Also, keep in mind that when upgrading ASA software, you must also upgrade the ASDM package.Implementation Team:Initial implementation was through a vendor. I would rate their experience and expertise as 9/10.ROI:Calculating the ROI for network security or IT security is complex and dependent on many factors, like the implementation, role, expectation etc. IT security cannot be compromised, but on the other hand, we must ask how much is enough. In our case, we do not have a defined ROI for this product.Cost and Licensing Advice:The cost of the setup was only the product price, local vendor support for the implementation, and employee training. This product is set it and forget it, so we do not have day to day costs.Other Solutions Considered:We did not evaluate other products. One reason was that we believe that the ASA is a reliable product and fits our needs. Another reason, was the lack of local support for other solutions.Other Advice:Unfortunately, the ASA 5500 is EoS and EoL, and I hope that Cisco’s NGF 5500-X series will be a worthy successor. This does not mean that Cisco will stop software support and will continue to release new software versions with new and improved features for the ASA 5500 series.As with any other product, the main things for a successful implementation are to decide what you want to achieve, and what your main goal is, and then, you need good planning, not only for your current needs, but you also need to keep in mind further grow and needs. Good planning is, at least, 80% of successful implementation.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-03-20
Rated 4 out of 5 by from Site to site VPN is easy, but it's very expensive. Valuable Features:* VPN* ASDM configurationFor FirePOWER:* IPS* AMP* URL filteringImprovements to My Organization:It's pretty easy to connect between different branches using site to site VPN.Room for Improvement:Cost, it's very expensive. To migrate from a Cisco ASA 5550 and not drop in performance, you have to go to a Cisco ASA 5555-X with FirePOWER. To fully use the Cisco FirePOWER IPS, AMP and URL filtering, you are forced to (MUST) buy the Cisco FireSIGHT management centre. You also have to buy licensing for Cisco AnyConnect VPN clientUse of Solution:I've been using it since October 2004, so for 10 years.Deployment Issues:Due to the cost, I am still waiting for more funds to deploy the final phase, FirePOWER IPS, AMP and URL filtering.Cisco did an upgrade from v8.2 to v8.3 of the migration system. NAT configuration is different from 8.2 to 8.3. It's not easy to upgrade to 8.3 and above leading to running different software versions.Stability Issues:V8.2 is very stable. With the latest versions it's still early to tell.Scalability Issues:Upgrading from v8.2 to v8.3 is a nightmare. The risks of down time are so high that I am forced to run different versions. Stay with 8.2 on all NAT dependent on your ASA, but again it's all about the cost.Customer Service:Excellent customer service. Cisco listens to their customers.Technical Support:Excellent customer service and documentation.Previous Solutions:We previously used Checkpoint, and I switched because Checkpoint was expensive but now it looks like Cisco is following the same route.Initial Setup:It was not that complex because I was using Cisco routers and switches five years prior.Implementation Team:It was an in-house implementation.ROI:I can't tell right now as I am still investing.Cost and Licensing Advice:The initial investment on the Cisco ASAs was around one million South African Rand and there's a R200,000 annual maintenance cost with Cisco's partners.Other Solutions Considered:No. I went straight to Cisco because of my experience with their CUCM IPT solutions, routers and switches.Other Advice:Budget a lot of money, especially on the initial setup and the annual licensing and maintenance cost.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-01-26
Rated 3 out of 5 by from SourceFIRE has improved the IPS functionality, however, it could use better troubleshooting capabilities. Valuable Features:With the ASA there are multiple products depending on your needs based on the two generations of the ASA. Roughly split-up there are 4 products.* 5500 Series basic/standard firewall - This I would rate as 7/10 due to the fact that it's easy to use, manage and deploy. Its scalable SSL, and IPSec VPN options, and is lacking throughput* 5500-X Series basic/standard firewall - This I would rate as 8/10 due to the fact that it's easy to use, manage and deploy. Its scalable SSL, and IPSec VPN options, and it has high throughput* ASA5500 Series with firewall and CX - This I would rate as 5/10 due to fact that even though the firewall and VPN part is easy to manage and deploy, the CX is lacking in stability, and features. Also, it is rather complex to deploy. Add to this the CX lowers the throughput even further* 5500-X Series with firewall and Sourcefire - This I would rate as 9/10 because it's easy to use, manage and deploy the firewall, VPN, and also the SourceFIRE. SourceFIRE works rather well and is by far the most advanced IPS system available. But it decreases the throughput more than you´d likeIn general, I like both the SSL VPN and SourceFIRE. Firstly, for the VPN, both the client and client-less versions are very scalable, flexible, and dynamic in configuration and probably the best SSL VPN solution available in the marked. Secondly, SourceFIRE has improved the IPS functionality and stability of the ASA to a point where you can begin to enjoy the fruits of your solution and root out the bad seed in you network.Improvements to My Organization:For many of my customers, the SourceFIRE solution has been an eye opener of exactly what their users are generating of traffic. Some customers, after reviewing the traffic application usage reports are astounded by the amount of traffic used, for example by Facebook and YouTube. My customers like the visibility into their network usage, and not necessarily wanting to block it, but just to know that they can control the network traffic and utilization if needed.Room for Improvement:Definitely the throughput could use an upgrade when running the SourceFIRE/AMP with the ASA. Also, it could use better troubleshooting capabilities. You are, most of the time, bound to have access to TAC for troubleshooting advanced problems.Use of Solution:Customers where I have deployed these solutions have had them forthree plus years, and most of them have, at the present moment havefirst generation solutions, or are planning an upgrade to the secondgeneration ones (NGFW or NGIPS),Deployment Issues:There are always issues when implementing key equipment like firewalls, especially if you are converting from an unfamiliar platform, activating SourceFIRE, or doing a general maintenance rule clear-up. If you don’t follow best practice, you can seriously impact network performance or unintentionally shut-down services.Stability Issues:In general the ASA has a great software stability reputation, and even though SourceFIRE for ASA is still young, the stability seems to be rather good. Of course you can’t avoid all issues, and you might have to reinstall the SourceFIRE software on the modules. If you're upgrading the ASA from pre code 8.3, you will need to redo the NAT and access rules of the ASA.Scalability Issues:License scalability for SourceFIRE is really not good if you have an ASA in HA as you need two licenses of everything, which is really bad as you wont get double SourceFIRE other than that you need to remember to buy your ASA based on the SourceFIRE's throughput and not the inspection throughput.Customer Service:If you have a service contract with Cisco you can have TAC assistance, software upgrades and next-business-day RMA (or faster) otherwise you are left to yourself or your Cisco partner. Basically without a Cisco service contract, you can't get any help or software from Cisco.Technical Support:Should you have a Cisco service contract, you get access to TAC that will provide you technical assistance towards solving your issue. The TAC experience can vary a lot. In general I would rate it as very good, 4/5.Previous Solutions:Mainly customers switch from other vendor because of VPN features, ease-of-management, and good consultant/partner relationship.Initial Setup:The initial setup is fairly easy and there are wizards for almost all the basic needs, including the initial setup and all types of VPN technologies that the ASA supports.Implementation Team:I am the vendor, and I am an expert with ASA.Other Advice:Make sure you get the right product/license to do the job you need done. If you are in doubt ask a consultant or a Cisco Partner. I have seen cases where a firewall wasn't the right hardware for the job and you can't just switch off the firewall/inspector for some interfaces or networks.Disclaimer: My company has a business relationship with this vendor other than being a customer:Cisco Gold Partner
Date published: 2017-01-25
Rated 4 out of 5 by from An excellent firewall, and one of the best available choices for big size companies. As usual excellence requires money. Valuable Features:ASA is a family of hardware based firewalls, stable and with a low level of work required on the maintenance side. It is a dedicated firewall, so you do not have to manage additional topics like spam, web sites filtering and so on.The routing part is high level as usual with Cisco products.Room for Improvement:You have to know the ASA command line very well because not all operations are available in the graphical interface (or let's say that sometimes it is better to operate with the ASA CLI).If you are searching for an "all in one product" it is not for youOther Advice:ASA is one of the the state-of-the-art firewall devices for security.It is affordable and not too complicated to use if you are doing standard operations (modifying ACLs, natting and so on) on an existing deployment.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-12-25
Rated 4 out of 5 by from Cisco has done a superior job at its next generation of firewall technology. Valuable Features:The user interface of the Prime Security Manager is, well, prime and one of the best pieces of software I have seen from them, and the features are on par if not better than what their competitors offer.Improvements to My Organization:Cisco has done a nice job of integrating global IP reputation management into the firewall with its Security Intelligence and Operations module for insights and malware collection.Room for Improvement:Prime manager is just for the CX line for now. CX features also add about a 30% overhead on throughput.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-10-26
Rated 4 out of 5 by from Reliable product which I'd like to see include a web filtering functionality. Valuable Features:It blocks all outside to inside traffic and only permits the specific internet traffic from the outside. VPN functionality is very useful, we can create remote access and tunnel VPN in the simplest way.Improvements to My Organization:It blocked all kinds of internet attacks from outside like DOS or DDOS and avoided any down time. We created a remote tunnel from head office to data center network for easy access of servers that make working fast and they are easily manageable.Room for Improvement:It would be great if they would add web filtering functionality to this product.Use of Solution:5 yearsDeployment Issues:NoStability Issues:NoScalability Issues:NoCustomer Service:ExcellentTechnical Support:GoodInitial Setup:It is a little difficult in newer IOS versions where the use of the NAT command is different. Otherwise its straightforward to configure.Implementation Team:I deployed it in-house with my team.ROI:This solution reduces any downtime therefore business continuity is not disturbed - that is ultimately ROI.Cost and Licensing Advice:It is one time cost of about $10,000 and there is no day to day cost.Other Solutions Considered:Yes, I evaluated Fortigate, SonicWall and Juniper but found Cisco ASA to be the best solution for us above all of the others.Other Advice:Cisco ASA is a reliable product and it benefits you a lot in your network.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-10-23
Rated 4 out of 5 by from The FirePower IPS, AMP and URL filtering add value to the firewall. Valuable Features:Cisco ASA has a well-written command-line interface. Cisco’s AnyConnect SSL VPN is by far the best client VPN technology I’ve ever had to deploy and manage. Upgrades are a breeze. Failovers between units are flawless. FirePower add-ons deepen security with intrusion prevention (IPS), anti-malware protection (AMP), and URL filtering. These particular services can run as a hardware or software module within the ASA. Unlike ASA with CSM, these modules are managed by FireSight, a single pane for all of your FirePower nodes. It’s intuitive and easy to use, but still lacks some automation capabilities (e.g., bulk edits, etc.).Improvements to My Organization:Cisco is a huge name in the networking world. Having a solution that includes their firewall technology adds value from an operability and support perspective. Cisco, although sometimes considered to be "behind the times" with firewall technology, continues to prove it has momentum in the industry through acquisitions such as Sourcefire and OpenDNS, with rapid integration into their systems. Additionally, ASA is synergistic with other security offerings from Cisco, such as ISE, remote tele-office workers, etc.Room for Improvement:When running multiple firewalls in your network, you need someone to manage them from a central point. Cisco’s answer is Cisco Security Manager (CSM). Unfortunately, this is a suite of applications that is in much need of an overhaul. It is riddled with bugs and lacks the intuitive experience found in competing vendor offerings. The counter-intuitive interface makes configuration management cumbersome and prone to mistakes. There are software defects within certain modules of the application, resulting in a frustrating experience. Reporting is almost useless. The best part about it is the logging component, but it still is lacking, compared to what you get from other competing vendors.Aside from management, I think Cisco needs to become more application-focused, something that a few of their competitors shine in.Use of Solution:I've deployed and managed Cisco ASA's for over a decade. I've used the X-series models for about three years now.Stability Issues:I have not encountered any stability issues; this is a solid firewall platform. Stability is where it shines.Scalability Issues:The newer clustering capabilities have introduced some solid scalability design options. From a cost perspective, scalability is quite intimidating.Technical Support:Cisco's TAC engineers are competent, responsive and typically resolve issues in a timely fashion. Do not use them for "best practice"; this is what channel partners are for.Previous Solutions:I previously used Check Point. Check Point relied on a thick, Windows-based client and, at the time, did not support transparent contexts. However, Check Point has a solid management platform, which is something Cisco should take some pointers from.Initial Setup:Initial setup is complex for a new user, straightforward for a seasoned user. Tons of documentation is available, but you can easily get lost for days if you've never touched one. Cisco offers ASDM, a GUI wizard that can help set up the firewalls. This is nice for newer folks.Cost and Licensing Advice:Work very closely with your channel partners to verify you have all the licensing you need (VPN, Firepower, etc.). Pricing is always a challenge. Buy closer to Cisco's EOY and you might save a few bucks.Other Solutions Considered:Before choosing this product, I also evaluated Palo Alto. I really liked their firewall platform, their Panorama management platform, and wildfire technology. Their SSL VPN was seriously lacking. This is a decent option to consider as well.Other Advice:Read the Cisco Validated Designs (CVDs) regarding ASAs. Find some decent blogs, discuss topologies and scenarios with a seasoned engineer, and get your final design validated by Cisco. Your Cisco SE should be able to assist with this. If you need assistance implementing, work with your channel partner.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-10-04
Rated 5 out of 5 by from Cisco firewalls can be difficult at first but once learned it's fine. Valuable Features:RobustnessImprovements to My Organization:ReliabilityRoom for Improvement:No idea -- I learn a lot from themUse of Solution:From 2000 until 2014Deployment Issues:Learning at the beginningStability Issues:Nope -- If well planed you should be alrightScalability Issues:Price maybe...Customer Service:ExcellentTechnical Support:ExcellentPrevious Solutions:Not reliable for long term -- seem inferior qualityInitial Setup:Depends on the product and the knowledge. Cisco firewalls can be difficult at first but once learned it's fine.Implementation Team:Me, I implemented the firewalls ( http://www.itcentralstation.com/category/firewalls ), Cisco switches and routers.ROI:100% in some installations it exceeded the time predicted to keep up with the work load.Other Solutions Considered:Netscreen, Netgear, Checkpoint, others..Other Advice:Plan well the hardware requirements for future growth and heavy usage.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-08-22
  • y_2017, m_4, d_29, h_18
  • bvseo_bulk, prod_bvrr, vn_bulk_1.0.0-hotfix-1
  • cp_1, bvpage1
  • co_hasreviews, tv_0, tr_36
  • loc_en_US, sid_3640760, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING), SortEntry(order=FEATURED, direction=DESCENDING)]
  • clientName_cdwg
Adding to Cart...
4/30/2017 2:24:53 AM
^ Back to Top

Maximum 300 characters
An account manager will email you within one business day to confirm your request.

Your Quote has been submitted

What Happens Next? A confirmation email is on its way. Within one business day, you will be contacted by an Account Manager to finalize your quote.


Something went wrong.

Please try again later.