<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA5510 Network Speed is half in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176113#M1075319</link>
    <description>&lt;P&gt;Thanks for the reply. WOW I did not realize this. According to this article&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-security/asa-5510-is-it-gigabit-capable/m-p/1584660" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/network-security/asa-5510-is-it-gigabit-capable/m-p/1584660&lt;/A&gt;. If you have the Security Plus License Eth0/0 and Eth0/1 should be gig though? Which I have. Output is at the bottom.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HT-HOMEASA# show activation-key&lt;BR /&gt;Serial Number: XXXXXXXXXXXX&lt;BR /&gt;Running Permanent Activation Key: XXXXXXXXXXXXXXXXXXXXXX&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 100 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Active perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Security Contexts : 2 perpetual&lt;BR /&gt;GTP/GPRS : Disabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 2 perpetual&lt;BR /&gt;AnyConnect Essentials : Disabled perpetual&lt;BR /&gt;Other VPN Peers : 250 perpetual&lt;BR /&gt;Total VPN Peers : 250 perpetual&lt;BR /&gt;Shared License : Disabled perpetual&lt;BR /&gt;AnyConnect for Mobile : Disabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Disabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Disabled perpetual&lt;BR /&gt;UC Phone Proxy Sessions : 2 perpetual&lt;BR /&gt;Total UC Proxy Sessions : 2 perpetual&lt;BR /&gt;Botnet Traffic Filter : Disabled perpetual&lt;BR /&gt;Intercompany Media Engine : Disabled perpetual&lt;BR /&gt;Cluster : Disabled perpetual&lt;BR /&gt;&lt;BR /&gt;This platform has an ASA 5510 Security Plus license.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The flash permanent activation key is the SAME as the running permanent key.&lt;BR /&gt;HT-HOMEASA#&lt;/P&gt;</description>
    <pubDate>Thu, 29 Oct 2020 20:25:38 GMT</pubDate>
    <dc:creator>fatNfurious01</dc:creator>
    <dc:date>2020-10-29T20:25:38Z</dc:date>
    <item>
      <title>Cisco ASA5510 Network Speed is half</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176037#M1075316</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone assist me with see why I only get half the Network Speed on my ASA. I have 1GIG Internet and I can only get 500 Mbps or less when using the ASA5510. Is this a license issue or something? I changed the speed to AUTO/AUTO or FULL/FULL that didn't work. The port should be able to handle 1GIG bc its giving me speeds more than 100 Mbps at the port.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CONFIG:&lt;/P&gt;&lt;P&gt;HT-HOMEASA# sho run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;: Serial Number:&lt;BR /&gt;: Hardware: ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1600 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(7)32&lt;BR /&gt;!&lt;BR /&gt;hostname HT-HOMEASA&lt;BR /&gt;enable password z2MeQrVsjStha93V encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa917-32-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -5&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;access-list OUTSIDE_access_in extended permit icmp any4 10.10.10.0 255.255.255.0 echo-reply&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any 10.10.10.0 255.255.255.0 eq https&lt;BR /&gt;access-list OUTSIDE_access_in extended deny object-group TCPUDP any 10.10.10.0 255.255.255.0 eq www&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-openjre-7131-101.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (INSIDE,OUTSIDE) dynamic interface&lt;BR /&gt;access-group OUTSIDE_access_in in interface OUTSIDE&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 X.X.X.X 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.10.10.0 255.255.255.0 INSIDE&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;enrollment terminal&lt;BR /&gt;subject-name CN=HT-HOMEASA&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 10.10.10.1 255.255.255.255 INSIDE&lt;BR /&gt;ssh timeout 10&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 10.10.10.11-10.10.10.254 INSIDE&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface INSIDE&lt;BR /&gt;dhcpd enable INSIDE&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 64.225.34.103 source OUTSIDE&lt;BR /&gt;username truongasa password .HQT.YZuDBCK3.On encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:e2051d803daef460a25d441f8f66ba7b&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Outside INTERFACE:&lt;/P&gt;&lt;P&gt;HT-HOMEASA# sho int Ethernet0/0&lt;BR /&gt;Interface Ethernet0/0 "OUTSIDE", is up, line protocol is up&lt;BR /&gt;Hardware is i82546GB rev03, BW 1000 Mbps, DLY 10 usec&lt;BR /&gt;Auto-Duplex(Full-duplex), Auto-Speed(1000 Mbps)&lt;BR /&gt;Input flow control is unsupported, output flow control is off&lt;BR /&gt;MAC address f0f7.55f3.31f0, MTU 1500&lt;BR /&gt;IP address 192.168.182.124, subnet mask 255.255.255.0&lt;BR /&gt;3 packets input, 886 bytes, 0 no buffer&lt;BR /&gt;Received 1 broadcasts, 0 runts, 0 giants&lt;BR /&gt;0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;0 pause input, 0 resume input&lt;BR /&gt;0 L2 decode drops&lt;BR /&gt;3 packets output, 1252 bytes, 0 underruns&lt;BR /&gt;0 pause output, 0 resume output&lt;BR /&gt;0 output errors, 0 collisions, 1 interface resets&lt;BR /&gt;0 late collisions, 0 deferred&lt;BR /&gt;0 input reset drops, 0 output reset drops, 0 tx hangs&lt;BR /&gt;input queue (blocks free curr/low): hardware (255/254)&lt;BR /&gt;output queue (blocks free curr/low): hardware (255/254)&lt;BR /&gt;Traffic Statistics for "OUTSIDE":&lt;BR /&gt;3 packets input, 832 bytes&lt;BR /&gt;3 packets output, 1180 bytes&lt;BR /&gt;1 packets dropped&lt;BR /&gt;1 minute input rate 0 pkts/sec, 0 bytes/sec&lt;BR /&gt;1 minute output rate 0 pkts/sec, 0 bytes/sec&lt;BR /&gt;1 minute drop rate, 0 pkts/sec&lt;BR /&gt;5 minute input rate 0 pkts/sec, 0 bytes/sec&lt;BR /&gt;5 minute output rate 0 pkts/sec, 0 bytes/sec&lt;BR /&gt;5 minute drop rate, 0 pkts/sec&lt;BR /&gt;HT-HOMEASA#&lt;BR /&gt;HT-HOMEASA# sho run int Ethernet0/0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Inside INTERFACE:&lt;/P&gt;&lt;P&gt;HT-HOMEASA# sho int Ethernet0/1&lt;BR /&gt;Interface Ethernet0/1 "INSIDE", is up, line protocol is up&lt;BR /&gt;Hardware is i82546GB rev03, BW 1000 Mbps, DLY 10 usec&lt;BR /&gt;Auto-Duplex(Full-duplex), Auto-Speed(1000 Mbps)&lt;BR /&gt;Input flow control is unsupported, output flow control is off&lt;BR /&gt;MAC address f0f7.55f3.31f1, MTU 1500&lt;BR /&gt;IP address 10.10.10.1, subnet mask 255.255.255.0&lt;BR /&gt;197679 packets input, 101499316 bytes, 0 no buffer&lt;BR /&gt;Received 190 broadcasts, 0 runts, 0 giants&lt;BR /&gt;0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;0 pause input, 0 resume input&lt;BR /&gt;0 L2 decode drops&lt;BR /&gt;557063 packets output, 715318523 bytes, 2615 underruns&lt;BR /&gt;0 pause output, 0 resume output&lt;BR /&gt;0 output errors, 0 collisions, 2 interface resets&lt;BR /&gt;0 late collisions, 0 deferred&lt;BR /&gt;0 input reset drops, 0 output reset drops, 0 tx hangs&lt;BR /&gt;input queue (blocks free curr/low): hardware (255/233)&lt;BR /&gt;output queue (blocks free curr/low): hardware (255/0)&lt;BR /&gt;Traffic Statistics for "INSIDE":&lt;BR /&gt;197679 packets input, 97316941 bytes&lt;BR /&gt;559678 packets output, 708693351 bytes&lt;BR /&gt;180 packets dropped&lt;BR /&gt;1 minute input rate 0 pkts/sec, 18 bytes/sec&lt;BR /&gt;1 minute output rate 0 pkts/sec, 5 bytes/sec&lt;BR /&gt;1 minute drop rate, 0 pkts/sec&lt;BR /&gt;5 minute input rate 78 pkts/sec, 3993 bytes/sec&lt;BR /&gt;5 minute output rate 303 pkts/sec, 426171 bytes/sec&lt;BR /&gt;5 minute drop rate, 0 pkts/sec&lt;BR /&gt;HT-HOMEASA#&lt;BR /&gt;HT-HOMEASA# sho run int Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 20:16:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176037#M1075316</guid>
      <dc:creator>fatNfurious01</dc:creator>
      <dc:date>2020-10-29T20:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5510 Network Speed is half</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176081#M1075318</link>
      <description>&lt;P&gt;Look at the spec of 5510&amp;nbsp;&lt;/P&gt;
&lt;TABLE border="1" width="100%" cellspacing="0" cellpadding="6"&gt;
&lt;TBODY&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;
&lt;P class="pChart_subheadCMT"&gt;Firewall Throughput&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P class="pChart_bodyCMT"&gt;&lt;A name="wp9000022" target="_blank"&gt;&lt;/A&gt;Up to 300 Mbps&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/security/asa-5500-series-next-generation-firewalls/data_sheet_c78-345385.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/security/asa-5500-series-next-generation-firewalls/data_sheet_c78-345385.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 19:42:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176081#M1075318</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-10-29T19:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5510 Network Speed is half</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176113#M1075319</link>
      <description>&lt;P&gt;Thanks for the reply. WOW I did not realize this. According to this article&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-security/asa-5510-is-it-gigabit-capable/m-p/1584660" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/network-security/asa-5510-is-it-gigabit-capable/m-p/1584660&lt;/A&gt;. If you have the Security Plus License Eth0/0 and Eth0/1 should be gig though? Which I have. Output is at the bottom.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HT-HOMEASA# show activation-key&lt;BR /&gt;Serial Number: XXXXXXXXXXXX&lt;BR /&gt;Running Permanent Activation Key: XXXXXXXXXXXXXXXXXXXXXX&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 100 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Active perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Security Contexts : 2 perpetual&lt;BR /&gt;GTP/GPRS : Disabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 2 perpetual&lt;BR /&gt;AnyConnect Essentials : Disabled perpetual&lt;BR /&gt;Other VPN Peers : 250 perpetual&lt;BR /&gt;Total VPN Peers : 250 perpetual&lt;BR /&gt;Shared License : Disabled perpetual&lt;BR /&gt;AnyConnect for Mobile : Disabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Disabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Disabled perpetual&lt;BR /&gt;UC Phone Proxy Sessions : 2 perpetual&lt;BR /&gt;Total UC Proxy Sessions : 2 perpetual&lt;BR /&gt;Botnet Traffic Filter : Disabled perpetual&lt;BR /&gt;Intercompany Media Engine : Disabled perpetual&lt;BR /&gt;Cluster : Disabled perpetual&lt;BR /&gt;&lt;BR /&gt;This platform has an ASA 5510 Security Plus license.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The flash permanent activation key is the SAME as the running permanent key.&lt;BR /&gt;HT-HOMEASA#&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 20:25:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176113#M1075319</guid>
      <dc:creator>fatNfurious01</dc:creator>
      <dc:date>2020-10-29T20:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5510 Network Speed is half</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176138#M1075323</link>
      <description>&lt;P&gt;Personally, I do not believe that model supports a maximum of 300MB, the thread mentioned only to use gigabit interface (not mentioned you get 1Gig throughput).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The 5510 only have functional 1Gbs ports if you enable the security plus license&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;correct me unless i am reading wrong...&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 21:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176138#M1075323</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-10-29T21:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5510 Network Speed is half</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176164#M1075328</link>
      <description>&lt;P&gt;That is correct, with the security plus license you can configure those two interfaces in Gig, however, that is the bandwidth not the throughput. This means that even if both inside and outside interfaces are in Gig, as in your case, the actual speed of processing and passing the traffic between the ingress and the egress interfaces is always subject to the device throughput. The device throughput depends on many factors, mainly it depends on the security features you enable, more you enable, less throughput you get. A huge impact on the throughput would be deep packet inspection and SSL decryption. Generally speaking the ASA devices have been always known with this caveat, however, it is a different story with Firepower appliances.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 22:15:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176164#M1075328</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-29T22:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5510 Network Speed is half</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176417#M1075339</link>
      <description>&lt;P&gt;Thanks everyone for your assistance!! I have a more understanding my ASA now.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 13:21:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-network-speed-is-half/m-p/4176417#M1075339</guid>
      <dc:creator>fatNfurious01</dc:creator>
      <dc:date>2020-10-30T13:21:22Z</dc:date>
    </item>
  </channel>
</rss>

