1) Limited ports & performance.
2) Complicated UI configuration and policy management.
3) Scalability limitation to correspond to organization
growth.
4) Unreliable network security, due to “Single Point of
Defense.
5) Insufficient capability to effectively manage
emerging internet applications hidden in HTTP traffic.
6) Passive security mechanism to respond network
threats including network worms, Trojans and cyberattacks