cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1776
Views
5
Helpful
1
Replies

Deference Between ASA+Firepower and FTD

amanverma
Level 1
Level 1

i have 5508-X which support both options ASA+Firepower and FTD. before proceeding to use IPS functionality i want to know the deference between both solution and limitations of each solutions ?

We use Remote Access VPN, Site to Site VPN, AAA, as of now with ASA 9.6

1 Accepted Solution

Accepted Solutions

Francesco Molino
VIP Alumni
VIP Alumni

Hi

 

There're multiple posts explaining the difference between those images:

https://supportforums.cisco.com/t5/firewalling/difference-between-asa-running-firepower-service-module-and-ftd/m-p/3312445#M165512

 

ASA and Firepower : 2 different configs while FTD is a unified image with 1 config.

FTD can be managed locally with embedded portal called FDM or by FMC (dedicated VM or appliance). FMC is used when you have multiple FTD to manage, you create policies and push them across your boxes.

You can do pretty much all features you had with ASA except for example multiple context.

 

Based on your input, you're using only VPN and AAA, those features are available in FTD.

 

It's a different logic of configuration and management. You won't have all ASA cli commands.

I would like to say that if you don't need multiple context, I'll recommend moving with FTD.


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

View solution in original post

1 Reply 1

Francesco Molino
VIP Alumni
VIP Alumni

Hi

 

There're multiple posts explaining the difference between those images:

https://supportforums.cisco.com/t5/firewalling/difference-between-asa-running-firepower-service-module-and-ftd/m-p/3312445#M165512

 

ASA and Firepower : 2 different configs while FTD is a unified image with 1 config.

FTD can be managed locally with embedded portal called FDM or by FMC (dedicated VM or appliance). FMC is used when you have multiple FTD to manage, you create policies and push them across your boxes.

You can do pretty much all features you had with ASA except for example multiple context.

 

Based on your input, you're using only VPN and AAA, those features are available in FTD.

 

It's a different logic of configuration and management. You won't have all ASA cli commands.

I would like to say that if you don't need multiple context, I'll recommend moving with FTD.


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question
Review Cisco Networking products for a $25 gift card