<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Canadian Bacon Cybersecurity Series: Are Virtual Firewalls the Same? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/canadian-bacon-cybersecurity-series-are-virtual-firewalls-the/m-p/5370445#M1124478</link>
    <description>&lt;H1&gt;&lt;SPAN&gt;Is Digital Resilience Impacted with Traditional Virtual Firewalls?&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN&gt;Most people in the industry are fully aware of virtual firewalling within the vendors’ hardware offerings, but do they stand up in today’s modern world? Let’s explore this in more detail but the short answer depends on how they are delivered. I know “it depends”! &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now, virtual firewalls provide multiple benefits such as supporting multiple lines of business, test environments, compliance and regulations, and other use cases. The question is whether they make a great choice when supporting the needs of today’s business?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Time to level set. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Virtual Firewalls are named differently across vendors from multi-context, virtual domains, to even just virtual firewalls and they all have lots of limitations. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Let me explain&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Most virtual firewalls are not isolated firewall instances within the hardware platform they reside. In fact, they have a variety of shared components making it difficult to support the needs of the business in today’s agile environment. One could argue that they impact the business environment more than they protect.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you leverage the old way of how these virtual firewalls are deployed you end up finding out that they are limited as they share many resources, they require the same version of code, you cannot patch one vs. another, if you need to reboot all virtual firewalls must reboot. This does not allow the business to be agile nor resilient. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Diagram 1: visualizes the shared hardware elements &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JasonMaynard_0-1771276144787.png" style="width: 933px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/259733iB69AB761DB6EFC55/image-dimensions/933x518?v=v2" width="933" height="518" role="button" title="JasonMaynard_0-1771276144787.png" alt="JasonMaynard_0-1771276144787.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now, let’s move to the modern era of virtual firewalling. Imagine having the ability to remove all shared services and expand that to ensure CPU and memory are allocated and assigned to the virtual instance. It has complete control over the assigned resources, and nothing can compete with it or monopolize that line of business or use case.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Diagram 2: visualizes the freedom of aligning physical resources to the respective virtual instance.&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JasonMaynard_1-1771276144791.png" style="width: 929px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/259734i994E15034F61BD8D/image-dimensions/929x517?v=v2" width="929" height="517" role="button" title="JasonMaynard_1-1771276144791.png" alt="JasonMaynard_1-1771276144791.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is that enough? No!&amp;nbsp; You need to be able to meet the business where they are going and be flexible enough to upgrade to features that matter most to line of business, patch when risk exposes one line of business vs. another or reboot the virtual instance at any point with impacting other virtual instance or lines of business. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Diagram: visualize the core differences that matter &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JasonMaynard_2-1771276144800.png" style="width: 933px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/259735i86A779EF84D4AC28/image-dimensions/933x520?v=v2" width="933" height="520" role="button" title="JasonMaynard_2-1771276144800.png" alt="JasonMaynard_2-1771276144800.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cisco Secure Firewall supports multi-instance the next generation of virtual firewalling that supports independent instances that can run different versions of code, different patch levels, dedicated hardware, and supports independent rebooting without impacting any other instance on the box. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This is the next generation virtual firewalling supporting the demands of the business with a core focus on digital resilience. It matters&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 16 Feb 2026 21:11:40 GMT</pubDate>
    <dc:creator>Jason Maynard</dc:creator>
    <dc:date>2026-02-16T21:11:40Z</dc:date>
    <item>
      <title>Canadian Bacon Cybersecurity Series: Are Virtual Firewalls the Same?</title>
      <link>https://community.cisco.com/t5/network-security/canadian-bacon-cybersecurity-series-are-virtual-firewalls-the/m-p/5370445#M1124478</link>
      <description>&lt;H1&gt;&lt;SPAN&gt;Is Digital Resilience Impacted with Traditional Virtual Firewalls?&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&lt;SPAN&gt;Most people in the industry are fully aware of virtual firewalling within the vendors’ hardware offerings, but do they stand up in today’s modern world? Let’s explore this in more detail but the short answer depends on how they are delivered. I know “it depends”! &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now, virtual firewalls provide multiple benefits such as supporting multiple lines of business, test environments, compliance and regulations, and other use cases. The question is whether they make a great choice when supporting the needs of today’s business?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Time to level set. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Virtual Firewalls are named differently across vendors from multi-context, virtual domains, to even just virtual firewalls and they all have lots of limitations. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Let me explain&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Most virtual firewalls are not isolated firewall instances within the hardware platform they reside. In fact, they have a variety of shared components making it difficult to support the needs of the business in today’s agile environment. One could argue that they impact the business environment more than they protect.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you leverage the old way of how these virtual firewalls are deployed you end up finding out that they are limited as they share many resources, they require the same version of code, you cannot patch one vs. another, if you need to reboot all virtual firewalls must reboot. This does not allow the business to be agile nor resilient. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Diagram 1: visualizes the shared hardware elements &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JasonMaynard_0-1771276144787.png" style="width: 933px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/259733iB69AB761DB6EFC55/image-dimensions/933x518?v=v2" width="933" height="518" role="button" title="JasonMaynard_0-1771276144787.png" alt="JasonMaynard_0-1771276144787.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now, let’s move to the modern era of virtual firewalling. Imagine having the ability to remove all shared services and expand that to ensure CPU and memory are allocated and assigned to the virtual instance. It has complete control over the assigned resources, and nothing can compete with it or monopolize that line of business or use case.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Diagram 2: visualizes the freedom of aligning physical resources to the respective virtual instance.&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JasonMaynard_1-1771276144791.png" style="width: 929px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/259734i994E15034F61BD8D/image-dimensions/929x517?v=v2" width="929" height="517" role="button" title="JasonMaynard_1-1771276144791.png" alt="JasonMaynard_1-1771276144791.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is that enough? No!&amp;nbsp; You need to be able to meet the business where they are going and be flexible enough to upgrade to features that matter most to line of business, patch when risk exposes one line of business vs. another or reboot the virtual instance at any point with impacting other virtual instance or lines of business. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Diagram: visualize the core differences that matter &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JasonMaynard_2-1771276144800.png" style="width: 933px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/259735i86A779EF84D4AC28/image-dimensions/933x520?v=v2" width="933" height="520" role="button" title="JasonMaynard_2-1771276144800.png" alt="JasonMaynard_2-1771276144800.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cisco Secure Firewall supports multi-instance the next generation of virtual firewalling that supports independent instances that can run different versions of code, different patch levels, dedicated hardware, and supports independent rebooting without impacting any other instance on the box. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This is the next generation virtual firewalling supporting the demands of the business with a core focus on digital resilience. It matters&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 21:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/canadian-bacon-cybersecurity-series-are-virtual-firewalls-the/m-p/5370445#M1124478</guid>
      <dc:creator>Jason Maynard</dc:creator>
      <dc:date>2026-02-16T21:11:40Z</dc:date>
    </item>
  </channel>
</rss>

