Webinar
ITGLOBAL.COM events
Cisco ASA

Cisco ASA or Adaptive Security Appliance is the most important line of Cisco security devices designed to protect networks from various threats. ASA series devices were launched on the market in May 2005, since then they have become an integral part of small and medium-sized business networks.

History and evolution from PIX to ASA

Cisco ASA became the successor to three significant Cisco products: PIX, IPS 4200 series and VPN hubs 3000 series. PIX was a popular firewall and network address translation (NAT) device, and the IPS 4200 series functioned as an intrusion prevention system. The VPN 3000 series hubs were designed to create virtual private networks (VPNs).

Functions and architecture

Unified threat management. Cisco ASA devices are known for their Unified Threat Management (UTM) capabilities, combining multiple security features in a single device. This allows organizations to optimize their security infrastructure and increase its efficiency.

Software architecture. ASA software is based on Linux, it runs the program “lina”, which schedules internal processes. The software interface is similar to Cisco IOS, which is used on routers. This provides a familiar environment for network administrators.

Models and options

A variety of models. Cisco ASA devices are available in various models that meet different business needs: from the desktop model 5505, introduced in 2010, to the powerful model 5585-X, designed for data centers. Each model has different bandwidth, connection limits, and VPN session capabilities.

Additional options and licenses. Some ASA models allow the installation of additional interface cards and Security Service Processors (SSPs). The functions of the younger models can be unlocked using the Security Plus License, which allows you to use a larger number of virtual local area networks, VPN addresses and high availability options.

Reviews and criticism

Over the years, Cisco ASA devices have received positive reviews due to their firewall and VPN capabilities, although early versions were criticized for the user interface. Over time, various security flaws have been identified and eliminated, which has increased the reliability and security of these devices.

We use cookies to optimise website functionality and improve our services. To find out more, please read our Privacy Policy.
Cookies settings
Strictly necessary cookies
Analytics cookies