Overview
Experience Cisco's industry leading Layer 3 and Layer 4 firewall in a virtualized form factor to protect your cloud environment. You can now take advantage of:
High performance security:
- Dynamically scale resilient remote access to meet demand with AWS Route 53
- Leverage site-to-site VPN, clientless remote access, and remote access VPN
- Integrate with AWS Transit Gateway for scalable inter-VPC traffic
Protection for your dynamic environments:
- Ingress and egress traffic protection across your cloud environments
- Advanced inspection, including voice and video protocols
- Micro-segmentation capabilities for east-west traffic
Cloud-delivered management:
- Consistently manage policies with our cloud-delivered management solution, Cisco Defense Orchestrator (CDO)
- Increase efficiency with low-touch provisioning for faster firewall deployments
- Supports REST API, an HTTP-based interface for appliance management, security policies, status monitoring, and enables multiple cloud management solutions
For supported AWS instances, please see the data sheet.
Highlights
- Deploy remote access in as little as 20 minutes with Cisco ASAv RA-VPN on AWS Quick Start guide.
- Ideal for remote worker and multi-tenant environments that require secure, scalable, and resilient remote access options.
- Consistent policy management in the cloud with Cisco Defense Orchestrator.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
|---|---|
c5.xlarge Recommended | $0.92 |
c5a.2xlarge | $1.93 |
c3.2xlarge | $1.93 |
c6a.4xlarge | $3.12 |
m4.large | $0.35 |
c6a.2xlarge | $1.93 |
m5zn.xlarge | $0.92 |
m5.large | $0.35 |
c5n.xlarge | $0.92 |
m5n.large | $0.35 |
Vendor refund policy
The Cisco ASAv instance can be terminated at any time to stop incurring charges.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Resources
Support
Vendor support
For all support queries, only Community Support is available for this product listing. Please visit the Cisco Security - Firewalling community using the link above and include "ASA-AWS" in the title of your community discussion for the fastest response. https://supportforums.cisco.com/community/firewalling For all support queries, only Community Support is available for this product listing. Please visit the Cisco Security - Firewalling community using the link above and include "ASA-AWS" in the
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Standard contract
Customer reviews
Comprehensive security has unified policy control and supports zero trust across clouds
What is our primary use case?
Cisco Secure Firewall can be used for perimeter security, IDS, IPS, and VPN purposes. When discussing secure access via Cisco Secure Firewall , it helps any roaming user, whether working from home, an airport, or in the office, to securely access any workload that could be located on a private cloud, public cloud, data center, or at the edge. It bypasses the on-premise firewall, but they offer firewall as a service, which is on the cloud and enables Secure Service Edge. Perimeter security is necessary and is part of their Secure Access offering, which is Firewall as a Service coming out of the cloud.
What is most valuable?
From Cisco Secure Firewall's security offering perspective, Cisco has a very comprehensive offering. Whether it is perimeter security in the form of firewall, user security for remote users for SASE , AI security, endpoint security, network security, or workload security, this fits very well into an overall security architecture proposed by Cisco, which is called a Security Reference Architecture. They have a very comprehensive range of products that integrate very well with their firewall. I do not view Cisco security offerings only from a firewall perspective, but from an overall offering perspective.
Cisco Secure Firewall includes something called Secure Cloud Control, which provides single management for consolidating policy across multiple pieces of equipment, whether it is a SASE policy, firewall policy, or otherwise. Centralized policy management is possible within that firewall, and if you want to orchestrate the same policy across multiple security products, you can use Cisco Secure Cloud Control.
What needs improvement?
Different models exist for Cisco Secure Firewall. Every on-premise model has a limit to the throughput it can support, and up to that limit, it scales fine. After reaching that limit, you are supposed to replace the model. For on-premise solutions, this is the case. However, Firewall as a Service can scale to a very large extent because it is a cloud-based offering that can scale up to a very large number, which is not a problem.
For how long have I used the solution?
Cisco Secure Firewall has been used and sold for at least three to four years.
What do I think about the stability of the solution?
Cisco Secure Firewall is quite stable. If I had to rate stability from zero to ten points for Cisco Secure Firewall, I would give it an eight.
What do I think about the scalability of the solution?
Cloud-delivered firewall provides much better flexibility for an organization via Cisco Secure Firewall. First, you can ensure that any users coming from outside securely access any workload that the organization may be running either in a private cloud or public cloud on a hyperscaler. Second, it provides what is called local internet breakout, where any services not supposed to go through the firewall can do a local internet breakout. With Firewall as a Service, you can consume capacity as you grow, rather than trying to put one firewall for your peak load. This gives tremendous flexibility similar to the flexibility that exists in cloud consumption.
How are customer service and support?
If I had to give points for technical support from Cisco, I would give it an eight. It is pretty good, and we do not face a challenge. The reason is that our own team is pretty capable technically, so we do not go back to Cisco for much support. Whenever we have requested support, they have been pretty responsive.
How would you rate customer service and support?
Positive
What other advice do I have?
I do not view Cisco security offerings only from a firewall perspective, but from an overall offering perspective. Cisco Secure Firewall helps with the Zero Trust Security Model. ZTNA is a concept that has to be implemented at every tier, including the firewall. You cannot implement zero trust without a firewall also supporting it. It is an important piece in building a zero trust architecture. The review rating for this product is an eight out of ten.
Unified security has protected mixed IT-OT environments and simplifies remote industrial access
What is our primary use case?
Cisco Secure Firewall provides intelligent devices that can manage security issues between IT and OT environments. IT is an information technology environment consisting of servers and data centers, while OT environment is operational technology related to PLC cabinets and machines. When integrating both to work in business processes, security issues between IT and OT must be managed, and Cisco provides excellent devices for managing this challenge.
I primarily use Cisco Secure Firewall in manufacturing fields rather than applications. In a small area, I integrated Cisco with RADIUS for authentication purposes and TACACS, applying security rules to external access for suppliers from Europe and the USA to our environments.
I use cloud-delivered firewall in parts of our business because we have multiple locations distributed across Egypt and Germany. I needed to use a firewall in the cloud to publish security policies remotely and manage separate locations with the same vendor like Cisco.
What is most valuable?
The biggest benefit of Cisco Secure Firewall and the features that stand out to me are its excellent integration with PLC and manufacturing devices. This option cannot be found on other devices such as Sophos or FortiGate.
The unification of policies is very important to me because without unified communication between devices with the same rule and security policy, managing everything with separate technology and separate vendors would be very difficult. Cisco excels at this.
The deployment of Cisco Secure Firewall was completed in-house.
What needs improvement?
Regarding implementing a zero-trust security model, I did not pursue this option because zero-trust is new technology with significant human impact on business operations. I use multi-factor authentication instead, with devices such as YubiKey , which is a USB device for trusting device authentication with hardware, but I have not implemented zero-trust at this time.
I do see some drawbacks with the authentication portions of Cisco, which are very legacy and have not been improved for a long time, such as using 802.1X switches. These aspects must be improved.
For how long have I used the solution?
I have been using Cisco Secure Firewall for ten years.
Which solution did I use previously and why did I switch?
For some period of time, we were a partner with Cisco, and after that, we began working as a customer.
What was our ROI?
I see some ROI through savings, including time and money savings. When evaluating Cisco over a longer period, I save money because the service renewal costs are substantial compared to alternatives. If I consider FortiGate, each module costs money and each renewal costs money. When comparing Cisco with other vendors, I believe Cisco's licensing is better.
Which other solutions did I evaluate?
Some differences from a technical standpoint are that Cisco is more professional in creating and applying rules on devices and integrating with other infrastructure, particularly routers. If I wanted to integrate access points and switches with Sophos or FortiGate, I would have to purchase the same brand name from those vendors and not integrate with others. This is a significant limitation. With Cisco, I do not have to purchase everything from a single partner and can mix between providers to take advantage of each product's benefits.
What other advice do I have?
We are currently using Cisco Secure Firewall ASA and are planning to use Cisco Vision. Cisco provides many tools to have visibility of packets moving on the network and enables capturing certain packets for analysis, which others cannot do.
Cisco Secure Firewall is very fair according to the benefits it provides. When comparing Sophos, FortiGate, and Cisco in terms of benefits and stability, Cisco is excellent.
Cisco Secure Firewall has a degree of complexity, but I believe it is more professional in deployment because it operates at the data link layer and network layer rather than only at the application and web levels. I rate this review as a nine out of ten.
Firewall has kept networks secure with frequent updates and supports practical zero-trust controls
What is our primary use case?
I am working with all of these vendors today, including F5, Cisco Umbrella , Cisco ASAs, Palo Alto Prismas, and Palo Alto Panoramas. I have been using all these tools currently.
I do work with Cisco Firewall and Cisco Secure Firewall .
I use Cisco SecureX with Cisco Secure Firewall in integration. SecureX is the VPN, or Secure Client.
What is most valuable?
The biggest benefit which I currently see in Cisco Secure Firewall is that it keeps getting up to date. The signatures or the vulnerabilities, and the remediation has been releasing every 24 hours. This makes our firewall or the network very secure. When we put the updates or patches on time on our firewalls, it keeps the network really secure.
Another thing is that it is user-friendly. Everything is within the help section. Everything is clearly mentioned, so if you do not remember anything or need to put a command, it can be accessible easily through the support website of Cisco. You will not face many challenges when you are applying any policies or creating any rules, or modification of any policies within the firewall.
The ability to unify policies across the environment depends on the customer's requirement, but the exact access required for their customers and users is what matters. Based on that, we can implement the policies within the network and we obviously require approvals from certain stakeholders. Once they allow it, we will move ahead and unify those policies.
Cisco Secure Firewall absolutely helps with the implementation of the zero-trust security model. Zero trust is basically what Cisco recommends, which is to not trust even your internal network. The internal employees sometimes are trusted because the 172 network is our internal network, and we basically allow access to everything and every subnet. However, Cisco suggests us to not trust anybody. Even if it is your internal users, you should put a check on their clients as well. Cisco gives us this feature. Every traffic passing through the firewall gets a check. It does not allow anybody to pass away without inspection.
What needs improvement?
If we talk about areas for improvement, when you look at the other competitors of Cisco, such as Palo Alto and Fortinet, they are moving much ahead from Cisco. That is one thing that Cisco has to really take as a challenge because Palo Alto has introduced a lot of new features. They have integrated with AI. You really do not have to run those commands manually. The basic things have already been taken care of by that integration of AI. That is one thing that Cisco has to jump ahead and compete with their partners.
I can speak about specific examples or features such as Prisma SASE , which has been introduced by Palo Alto. That similar feature or advantage is missing in Cisco Secure Firewall yet. They must be working on it, but as of now, Palo Alto is much ahead.
For how long have I used the solution?
I have been working with Cisco Secure Firewall for more than seven years and my overall experience in the field with firewalls is 10 years. Since 2015, I have been working with firewalls and endpoint security. With time I have upgraded my skills and with whatever the requirement is from the organization or from the client side, I put in my efforts and continue learning.
What do I think about the stability of the solution?
I would say it is reliable, but only when you have sufficient processing unit or when the CPU does not get high. There must be sufficient RAM on the devices and you must have purchased enough licenses and not put a lot of load on the firewall. Otherwise, it is sometimes not reliable, but that is your misconfiguration or when you have not purchased enough storage or the high-end processors for the data transfer and the packet. Then it sometimes gets unreliable. However, if you have sufficient space on your firewall and a good amount of processing unit, then I think it is good. It is reliable and stable as well. The only part is when you are putting a lot of pressure or data payload on the firewall, but the firewall does not have that capacity to handle that much traffic, then it gets stuck or sometimes gets crashed as well.
What do I think about the scalability of the solution?
I see that Cisco Secure Firewall is very easy to scale. They provide that feature. Whenever your organization gets bigger, it is easily scalable. Whenever your users are getting increased or you have to put up more firewalls, they provide that feature. There are no limitations on that.
How are customer service and support?
I do observe some ROI in Cisco Secure Firewall, such as some savings in terms of time-saving or money-saving. The support is really good. If we require a L3 level of TAC support from Cisco, they are easily available compared to other two vendors. Sometimes when we get stuck on something, if we reach out to Cisco support and their Cisco TAC technical team, they are easily available. You do not face many challenges to talk to them.
On a scale from zero to 10, I think they deserve nine points for support.
How would you rate customer service and support?
Positive
How was the initial setup?
I would say it is straightforward for experienced people; it is deployable. Without many challenges they can deploy it. However, for beginners, it might be challenging for them. It requires certain technicalities and awareness of the technical part.
Some challenges may happen during deployment. Initially when you set it up, it requires a console from the scratch itself. When you are deploying any firewall, what you need is physical access of that device, wherever it is. Once that part is covered, then the configuration is either you can do it through that tool or you can do it manually. Cisco provides both options. If you want to go with the manual or if you want to go with that integration tool, with the tool it is very straightforward. However, when you have to do it manually, it takes certain pre-checks and post-checks with that device.
Which other solutions did I evaluate?
I would say Cisco Secure Firewall is better than Fortinet any day.
What other advice do I have?
My clients' deployment model is usually on cloud. Right now, mostly devices have been moved to cloud. There are still one or two devices that are still there which I am managing. They are legacy devices. Mostly are on cloud.
I do say that visibility and control capabilities in the firewall do help to manage encrypted traffic. Mostly traffic gets encrypted. I provide that feature, SSL encryption. All the traffic that traverses through the firewall is encrypted. It cannot be readable by a third person or with any tools. Only peer-to-peer encryption is there. Only when they have the keys available, the specific users or destination, only they can decrypt it. The end-to-end encryption is there. I have that.
I would rate this review as an 8 out of 10 overall.
Unified industrial security has improved integration and supports fast rule migration and tuning
What is our primary use case?
I benefit from using Cisco Secure Firewall mainly because at least 99% of my customers have a Cisco environment, including switching and routing, making it easier to integrate with other Cisco components than with other vendors.
The impact of a cloud-delivered firewall on my organization's security posture depends on the environments I manage, which are primarily disconnected and focused more on industrial security rather than the cloud. While traditional IT recognizes that the delivery of cloud services is beneficial, comparing it to Azure Firewall , Google Firewall, or AWS Firewall shows that they are not true firewalls but rather sets of rules that do not work perfectly. From my perspective, it is better to add Cisco Secure Firewall for proper coverage.
What is most valuable?
The deployment for Cisco Secure Firewall takes no more than six to eight hours, but the fine-tuning of the solution typically takes four or five days.
Using Cisco Secure Firewall is financially beneficial as it provides clear settings for all members managing the solution, making it easy to teach the engineering team how it works and how to configure it, ultimately reducing the time needed to apply policies or make changes in the infrastructure.
What needs improvement?
I would assess Cisco Secure Firewall's ability to unify policies across environments as complex, since different customers have varying situations. Some wish to consolidate rules in the same place, while others prefer different rule sets in different locations.
For how long have I used the solution?
How are customer service and support?
I would rate Cisco's technical support a nine out of ten.
How would you rate customer service and support?
Positive
What about the implementation team?
What other advice do I have?
I am working with both on-premises and cloud deployment models.
I have not used any new features or functionalities recently in Cisco Secure Firewall, as it usually functions as a Layer 4 firewall without applying any filtering or inspection.
My experience with the licensing model indicates that for a long time, I believed the price was reasonable, but currently, I am uncertain as all services I purchase are directly from the customer while I act as a consultant, not purchasing any components myself.
I would rate this product a nine out of ten overall.
Centralized protection across data center and edge has provided peace of mind and reliable security
What is our primary use case?
Our company's use case for Cisco Secure Firewall is to separate and protect the different server network ranges in our data center and to provide access to and from those services that sit in our data center to users and customers alike. We also use Cisco Secure Firewall on the edge to provide internet access to and from the internet for our business.
What is most valuable?
The most valuable aspect of Cisco Secure Firewall for me is not a specific feature but the fact that it is quite stable as a firewall overall. It is not too buggy or disruptive when performing our day-to-day operations, and that is the main thing about it.
Centralized management of Cisco Secure Firewall benefits our organization because we have multiple firewalls, but we go to one single page or use the Firewall Management Center to administer policies and make changes. This allows us to see what is going on from a visibility perspective, so all troubleshooting, configuration, and administration of the firewall happens at one single place, which is beneficial.
A single pane of glass for management is available.
What needs improvement?
One thing I would improve in Cisco Secure Firewall is somehow embedding the capability to use an asterisk-type of firewall rules in the access control policy. An example could be star.google.com; being able to use an asterisk for anything in the subdomain would be beneficial, as I know some of Cisco's competitors allow that on their firewalls, which eliminates the need for an additional appliance to facilitate that component.
For how long have I used the solution?
I have been using Cisco Secure Firewall for about five years.
What do I think about the stability of the solution?
Currently, Cisco Secure Firewall has been up and running for about three years since its last reboot, so it is quite stable.
What do I think about the scalability of the solution?
I find the solution to be scalable, especially with the other products that Cisco is developing. For instance, Cisco Secure Cloud now allows us to potentially take the management functions of Cisco Secure Firewall, move it into the cloud, and integrate it with other Cisco security products, managing everything from one single pane.
How are customer service and support?
I have worked with Cisco's customer support.
When it comes to customer support, referring to TAC, I find that Cisco's support stands out. It is very important for us as a business to have that support when needed, and Cisco has often never failed in providing that support.
If I were to rate the support overall from one to ten, I would give it a nine.
While I rate it a nine, to make it a ten, it could be improved based on individual cases. Some support people truly embody Cisco's values in responding and assisting, but there are times when some individuals may not be as helpful as others, leading to a disconnect in the support experience.
How would you rate customer service and support?
Positive
How was the initial setup?
Deploying Cisco Secure Firewalls is quite straightforward, as Cisco provides a lot of available documentation online, extensive support, and training, which makes it easy for engineers and customers to use Cisco products effectively.
The deployment time for Cisco Secure Firewalls varies. Currently, I am going through a refresh where we are replacing older Firepower systems with newer ones, but in the past, it has been relatively simple, typically taking within an hour or two to get everything up and running.
What about the implementation team?
I have been part of the deployment of Cisco Secure Firewalls.
What was our ROI?
From a return on investment perspective, I think Cisco Secure Firewalls keep our organization safe and protect the organization's image from a governance standpoint. With cybersecurity being a big issue in the world, Cisco Secure Firewalls protect data, the environment, organization, and keep things safe. It is always reassuring for customers to know that the organization I work for invests in products like Cisco Secure Firewall to protect ourselves.
What other advice do I have?
Cisco Secure Firewall is similar to insurance in that it provides peace of mind.
I rate Cisco Secure Firewalls a nine overall. While there are features I think could be added to achieve a perfect ten, I still regard it higher than its competitors. From both a technical and peace of mind perspective, Cisco Secure Firewall is the frontrunner.
I would tell someone considering purchasing Cisco Secure Firewalls that they will not be disappointed. My overall review rating for Cisco Secure Firewall is nine.