<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5516-x Maximum Thoroughput in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4675436#M1092964</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/296319"&gt;@ajc&lt;/a&gt; the cisco datasheet confirms the ASA 5516 supports up to 250Mbps IPSec VPN performance.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/datasheet-c78-742475.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/datasheet-c78-742475.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 25 Aug 2022 15:13:35 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-08-25T15:13:35Z</dc:date>
    <item>
      <title>ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/3827224#M28696</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are considering increasing our provider bandwidth to 1Gbps at one of our locations, but I'm not sure if our ASA 5516-x can even process that much. More specifically, I'm receiving conflicting reports about how much bandwidth an ASA 5516-x can handle. I see that it lists its max stateful inspection throughput as 1.8Gpbs, its Stateful inspection throughput (multiprotocol2) as 900 Mbps, its Maximum application visibility and control (AVC) throughput as 850 Mbps, its Maximum AVC and NGIPS throughput as 600Mbps, its Application control (AVC) or NGIPS sizing throughput [440 byte HTTP] as 500 Mbps, and its Maximum 3DES/AES VPN throughput as 250Mbps.&lt;/P&gt;&lt;P&gt;So which is it? What should be considered as the acceptable max capacity of an ASA 5516-x for an Internet circuit?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2019 15:49:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/3827224#M28696</guid>
      <dc:creator>macgyver0099_1</dc:creator>
      <dc:date>2019-03-27T15:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/3884989#M28698</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It depends what you will be using on the ASA. So for example, if your location will be using ASA as state-full firewall then you will be getting 900 Mbps - 1.8 Gbps which will be fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you enable IPS on all the traffic traversing the firewall then you can get throughput upto 600 Mbps overall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And lets say, you are using Statefull inspection + IPS/AVC and decided to configure IPSEC VPNs, then your non-VPN traffic will be having maximum throughput support upto 600 and VPN users will be 250 Mbps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 00:22:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/3884989#M28698</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2019-07-05T00:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/3885020#M28699</link>
      <description>&lt;P&gt;A 5516-X is at or beyond its ability to transfer traffic when you are expecting 1 Gbps throughput. Yes, you may attain it under certain conditions and without certain features active, but you probably will be frustrated if you expect that level of throughput consistently.&lt;/P&gt;
&lt;P&gt;If you were my customer I'd recommend you to a higher performing appliance. If you're able to wait a bit then the just-released Firepower 1120 would be a good option. It's FTD-only right now and ASA software support will be coming in the fall. 1.5 Gbps of throughput with all of the NGFW/NGIPS features active.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/firepower-1000-series/datasheet-c78-742469.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/firepower-1000-series/datasheet-c78-742469.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;That said, the 5516-X will work OK - it just won't give you the maximum ability to fill your upgraded circuit.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 02:30:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/3885020#M28699</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-05T02:30:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4675429#M1092962</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;Is it correct to say that we have a max throughput of 250 Mbps for a site to site VPN tunnel when using 5516-X?&lt;/P&gt;&lt;P&gt;thanks in advance for your response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 15:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4675429#M1092962</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2022-08-25T15:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4675436#M1092964</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/296319"&gt;@ajc&lt;/a&gt; the cisco datasheet confirms the ASA 5516 supports up to 250Mbps IPSec VPN performance.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/datasheet-c78-742475.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/datasheet-c78-742475.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 15:13:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4675436#M1092964</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-25T15:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4770819#M1097588</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;it is my understanding that SNORT tech only applies to appliances running firepower software NOT ASA. We are running IPerf which is considered an elephant flow so a firepower device would not apply all the snort processes to that flow (meaning all the CPU of the apppliance each one running 1 snort process). So if the appliance is rated at 10 Gbps and it has 20 instances of snort (CPU's) then there is a max throughput of 500 Mbps x snort/cpu. In my case, IPerf would only use 1 snort/cpu with a throughput of 500 Mbps which is not enough.&lt;/P&gt;&lt;P&gt;Based on the previous, IF i configure a FTDv50 or FTDv100 VMware, can I use IAB or Access Control trust rules&amp;nbsp;&lt;SPAN&gt;allowing those elephant flows to pass uninspected, and not to be limited by the single snort instance behavior?. I also understand that this option does not apply to traffic over a Site to Site IPSEC VPN tunnel using FTDv on both sides, please correct me, thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 01:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4770819#M1097588</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2023-02-08T01:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4771373#M1097607</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/296319"&gt;@ajc&lt;/a&gt; not exactly. While you do bypass the Snort limitation when you use a prefilter rule (or potentially IAB), there is still an (unpublished) single flow speed limit that any given firewall has. The published throughput specification generally assume an aggregate of traffic across multiple flows.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 13:51:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4771373#M1097607</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-02-08T13:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4771413#M1097612</link>
      <description>&lt;P&gt;Thanks Marvin, the following link explain our situation and we thought that access control rules or IAB would allow us to overcome the single flow speed limit (one snort-cpu correlation) however based in your reply it is not the case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/200420-Processing-of-Single-Stream-Large-Sessio.html" target="_blank" rel="noopener"&gt;Process Single Stream Large Session (Elephant Flow) by Firepower Services - Cisco&lt;/A&gt;&lt;/H3&gt;&lt;H3&gt;Identify and Trust Large Flows&lt;/H3&gt;&lt;P&gt;Large flows (IPerf included) are often related to high use low inspection value traffic for example, &lt;EM&gt;&lt;STRONG&gt;backups, database replication&lt;/STRONG&gt;&lt;/EM&gt;, etc. Many of these applications&amp;nbsp;can not be benefited from inspection. In order to avoid issues with large flows, &lt;EM&gt;&lt;STRONG&gt;y&lt;/STRONG&gt;&lt;STRONG&gt;ou can identify the large flows and create Access Control trust rules for them. These rules are able to uniquely identify large flows, allow those flows to pass uninspected, and not to be limited by the single snort instance behavior.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 14:55:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4771413#M1097612</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2023-02-08T14:55:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4771420#M1097614</link>
      <description>&lt;P&gt;You do indeed bypass the Snort single instance limitation as the document you cited describes.&lt;/P&gt;
&lt;P&gt;But, even for a legacy ASA with no Snort at all, the throughput of a single flow does not equal the published throughput of the appliance. The same applies to an FTD appliance when Snort is altogether bypassed by a prefilter rule with Fastpath action. In that case it uses strictly the LINA subsystem (Linux on ASA) to process the flow.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 15:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4771420#M1097614</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-02-08T15:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4771425#M1097616</link>
      <description>&lt;P&gt;thanks for the clarification.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 15:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4771425#M1097616</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2023-02-08T15:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4774476#M1097742</link>
      <description>&lt;P&gt;Hi Marvin,&amp;nbsp;&lt;/P&gt;&lt;P&gt;For a legacy ASA with no snort, what would be the throughput of a single flow? thanks in advance for your reply.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Feb 2023 21:16:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4774476#M1097742</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2023-02-13T21:16:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-x Maximum Thoroughput</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4775255#M1097776</link>
      <description>&lt;P&gt;Single flow throughput is not published by Cisco (nor by any firewall vendors as far as I know). If they did so, the competition would seize that figure to demonstrate their superiority (despite not publishing the figure themselves).&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 12:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-maximum-thoroughput/m-p/4775255#M1097776</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-02-14T12:56:34Z</dc:date>
    </item>
  </channel>
</rss>

