<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Traffic shaping and rate limit in ASA Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933362#M150563</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We have a server that we would like to dedicate a 2Mbps bandwidth to (out of 10Mbps dedicated link). We had configured the ASA firewall as following:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list Srvr permit ip host 172.x.x.x any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;class-map Server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; match access-list Srvr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list users permit ip any any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;class-map users&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; match access-list users&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;policy-map Traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; class Server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; police output 2000000 conform-action transmit exceed-action drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; class users&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; police output 10000000 conform-action transmit exceed-action drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;service-policy Traffic interface outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is to divide the bandwidth between the Server (2Mbps) and the rest of the network hosts (8Mbps), and after applying this, I can not see any difference in the server's speed.&lt;/P&gt;
&lt;P&gt;any ideas please.&lt;/P&gt;
&lt;P&gt;Help is highly appreciated.&lt;/P&gt;
&lt;P&gt;All the best.&lt;BR /&gt;Ahmed Eshtiwi.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:09:42 GMT</pubDate>
    <dc:creator>ahmedeshtiwi</dc:creator>
    <dc:date>2019-03-12T08:09:42Z</dc:date>
    <item>
      <title>Traffic shaping and rate limit in ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933362#M150563</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We have a server that we would like to dedicate a 2Mbps bandwidth to (out of 10Mbps dedicated link). We had configured the ASA firewall as following:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list Srvr permit ip host 172.x.x.x any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;class-map Server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; match access-list Srvr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list users permit ip any any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;class-map users&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; match access-list users&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;policy-map Traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; class Server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; police output 2000000 conform-action transmit exceed-action drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; class users&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; police output 10000000 conform-action transmit exceed-action drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;service-policy Traffic interface outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is to divide the bandwidth between the Server (2Mbps) and the rest of the network hosts (8Mbps), and after applying this, I can not see any difference in the server's speed.&lt;/P&gt;
&lt;P&gt;any ideas please.&lt;/P&gt;
&lt;P&gt;Help is highly appreciated.&lt;/P&gt;
&lt;P&gt;All the best.&lt;BR /&gt;Ahmed Eshtiwi.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:09:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933362#M150563</guid>
      <dc:creator>ahmedeshtiwi</dc:creator>
      <dc:date>2019-03-12T08:09:42Z</dc:date>
    </item>
    <item>
      <title>Are you sure that you applied</title>
      <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933363#M150564</link>
      <description>&lt;P&gt;Are you sure that you applied the policy in the right direction? The way you configured it, you limit the traffic from your internal network to the internet (upload), but not the traffic from the internet to your network.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Aug 2016 15:32:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933363#M150564</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-22T15:32:29Z</dc:date>
    </item>
    <item>
      <title>Hello ahmedeshtiwi. Maybe you</title>
      <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933364#M150565</link>
      <description>&lt;P&gt;Hello &lt;SPAN class="fullname" itemprop="author"&gt;&lt;A href="https://supportforums.cisco.com/users/ahmedeshtiwi" title="View user profile." class="username" lang="" about="/users/ahmedeshtiwi" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;ahmedeshtiwi&lt;/A&gt;.&amp;nbsp;&lt;/SPAN&gt;Maybe you should check if addresses are ok.&lt;/P&gt;
&lt;P&gt;You can check with &lt;STRONG&gt;show service-policy police&lt;/STRONG&gt; and see if the traffic are matching with your configuration.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For example:&lt;/P&gt;
&lt;P&gt;Interface XXX:&lt;BR /&gt;Service-policy: XXX-policy&lt;BR /&gt;Class-map: XXX-class&lt;BR /&gt;Output police Interface XXX:&lt;BR /&gt;cir 2000000 bps, bc 1500 bytes&lt;BR /&gt;&lt;STRONG&gt;conformed 4512797 packets, 726754498 bytes; actions: transmit&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;exceeded 1192 packets, 1697677 bytes; actions: drop&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;conformed 0 bps, exceed 0 bps&lt;/STRONG&gt;&lt;BR /&gt;Input police Interface XXX:&lt;BR /&gt;cir 2000000 bps, bc 1500 bytes&lt;BR /&gt;&lt;STRONG&gt;conformed 1434714 packets, 1091100922 bytes; actions: transmit&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;exceeded 23008 packets, 29515174 bytes; actions: drop&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;conformed 0 bps, exceed 0 bps&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Regards.-&lt;/P&gt;</description>
      <pubDate>Mon, 22 Aug 2016 23:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933364#M150565</guid>
      <dc:creator>Matias Ortiz</dc:creator>
      <dc:date>2016-08-22T23:18:49Z</dc:date>
    </item>
    <item>
      <title>I have changed the</title>
      <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933365#M150566</link>
      <description>&lt;P&gt;I have changed the configurations to the following:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;policy-map Traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;class Server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp; police output 2000000&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp; police input 2000000&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;class users&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp; police output 8000000&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp; police input 8000000&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;So that it shapes both input and out put traffic, But failed as well!&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 07:04:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933365#M150566</guid>
      <dc:creator>ahmedeshtiwi</dc:creator>
      <dc:date>2016-08-23T07:04:51Z</dc:date>
    </item>
    <item>
      <title>I have also applied the</title>
      <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933366#M150567</link>
      <description>&lt;P&gt;I have also applied the policy on the inside interface as well:&lt;/P&gt;
&lt;P&gt;here is a&amp;nbsp;&lt;STRONG&gt;show service-policy police &lt;/STRONG&gt;command output:&lt;/P&gt;
&lt;P&gt;Interface outside:&lt;BR /&gt; Service-policy:&amp;nbsp;Traffic&lt;BR /&gt; Class-map: &lt;SPAN&gt;Server&lt;/SPAN&gt;&lt;BR /&gt; Output police Interface outside:&lt;BR /&gt; cir 2000000 bps, bc 62500 bytes&lt;BR /&gt; conformed 42 packets, 4893 bytes; actions: transmit&lt;BR /&gt; exceeded 0 packets, 0 bytes; actions: drop&lt;BR /&gt; conformed 0 bps, exceed 0 bps&lt;BR /&gt; Input police Interface outside:&lt;BR /&gt; cir 2000000 bps, bc 62500 bytes&lt;BR /&gt; conformed 0 packets, 0 bytes; actions: transmit&lt;BR /&gt; exceeded 0 packets, 0 bytes; actions: drop&lt;BR /&gt; conformed 0 bps, exceed 0 bps&lt;BR /&gt; Class-map: users&lt;BR /&gt; Output police Interface outside:&lt;BR /&gt; cir 8000000 bps, bc 250000 bytes&lt;BR /&gt; conformed 3491 packets, 459503 bytes; actions: transmit&lt;BR /&gt; exceeded 0 packets, 0 bytes; actions: drop&lt;BR /&gt; conformed 24 bps, exceed 0 bps&lt;BR /&gt; Input police Interface outside:&lt;BR /&gt; cir 8000000 bps, bc 250000 bytes&lt;BR /&gt; conformed 3029 packets, 2642867 bytes; actions: transmit&lt;BR /&gt; exceeded 0 packets, 0 bytes; actions: drop&lt;BR /&gt; conformed 136 bps, exceed 0 bps&lt;/P&gt;
&lt;P&gt;Interface inside:&lt;BR /&gt; Service-policy:&amp;nbsp;Traffic&lt;BR /&gt; Class-map: &lt;SPAN&gt;Server&lt;/SPAN&gt;&lt;BR /&gt; Output police Interface inside:&lt;BR /&gt; cir 2000000 bps, bc 62500 bytes&lt;BR /&gt; conformed 0 packets, 0 bytes; actions: transmit&lt;BR /&gt; exceeded 0 packets, 0 bytes; actions: drop&lt;BR /&gt; conformed 0 bps, exceed 0 bps&lt;BR /&gt; Input police Interface inside:&lt;BR /&gt; cir 2000000 bps, bc 62500 bytes&lt;BR /&gt; conformed 23194 packets, 7302249 bytes; actions: transmit&lt;BR /&gt; exceeded 677 packets, 964394 bytes; actions: drop&lt;BR /&gt; conformed 8536 bps, exceed 0 bps&lt;BR /&gt; Class-map: users&lt;BR /&gt; Output police Interface inside:&lt;BR /&gt; cir 8000000 bps, bc 250000 bytes&lt;BR /&gt; conformed 2856926 packets, 1655405052 bytes; actions: transmit&lt;BR /&gt; exceeded 309546 packets, 408742456 bytes; actions: drop&lt;BR /&gt; conformed 8001176 bps, exceed 2637592 bps&lt;BR /&gt; Input police Interface inside:&lt;BR /&gt; cir 8000000 bps, bc 250000 bytes&lt;BR /&gt; conformed 3086795 packets, 661302788 bytes; actions: transmit&lt;BR /&gt; exceeded 805 packets, 1143696 bytes; actions: drop&lt;BR /&gt; conformed 3092456 bps, exceed 0 bps&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 07:10:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933366#M150567</guid>
      <dc:creator>ahmedeshtiwi</dc:creator>
      <dc:date>2016-08-23T07:10:50Z</dc:date>
    </item>
    <item>
      <title>But when the policy is</title>
      <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933367#M150568</link>
      <description>&lt;P&gt;But when the policy is applied on the outside interface, your ACL&amp;nbsp;&lt;SPAN&gt;Srvr doesn't match the traffic for this policy any more. You need to change your ACL or also apply this policy to the inside interface.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 07:36:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933367#M150568</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-23T07:36:01Z</dc:date>
    </item>
    <item>
      <title>I have done that but failed</title>
      <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933368#M150569</link>
      <description>&lt;P&gt;I have done that but failed as well:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;service-policy Traffic&amp;nbsp;interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;service-policy Traffic&amp;nbsp;interface inside&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 09:28:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933368#M150569</guid>
      <dc:creator>ahmedeshtiwi</dc:creator>
      <dc:date>2016-08-23T09:28:45Z</dc:date>
    </item>
    <item>
      <title>How do you test it? You have</title>
      <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933369#M150570</link>
      <description>&lt;P&gt;How do you test it?&amp;nbsp;You have to transfer a big file to see it working.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 09:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933369#M150570</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-23T09:34:35Z</dc:date>
    </item>
    <item>
      <title>tested with speed test.</title>
      <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933370#M150572</link>
      <description>&lt;P&gt;tested with speed test.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the server spikes to more than 5Mbps sometimes, and terribly slow when browsing and downloading some other times.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;as if it is not getting its dedicated share of BW!&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 10:28:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933370#M150572</guid>
      <dc:creator>ahmedeshtiwi</dc:creator>
      <dc:date>2016-08-23T10:28:47Z</dc:date>
    </item>
    <item>
      <title>The server is allowed to</title>
      <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933371#M150575</link>
      <description>&lt;P&gt;The server is allowed to burst traffic over the rate of 2MBit/s. Thats normal. But if the traffic keeps being over 2 MBit, the excess traffic is dropped and has to be retransmitted which can slow down some operations. So what you describe can be normal operation on the ASA. Keep in mind that the ASA is quite limited with&amp;nbsp;QoS.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 10:53:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933371#M150575</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-23T10:53:47Z</dc:date>
    </item>
    <item>
      <title>Hi ahmedeshtiwi, it's looks</title>
      <link>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933372#M150577</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/ahmedeshtiwi" title="View user profile." class="username" lang="" about="/users/ahmedeshtiwi" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;ahmedeshtiwi&lt;/A&gt;, it's looks like some work well but not all.&lt;/P&gt;
&lt;P&gt;If you're checking with speed test then you will need consider burst bytes on policy-map.&lt;/P&gt;
&lt;P&gt;At the &lt;STRONG&gt;show service-policy police&lt;/STRONG&gt; you're seeing that Class-map: users is work fine on interface inside but not Class-map: Server.&lt;/P&gt;
&lt;P&gt;If you run now&amp;nbsp;&lt;STRONG&gt;access-list Srvr&lt;/STRONG&gt; and&lt;STRONG&gt; access-list users&lt;/STRONG&gt; you will see if ACL are matching or not, or you need add more lines.&lt;/P&gt;
&lt;P&gt;On the other hand, if you like QoS for Internet you can use only ACL with tcp/80 and tdp/443 instead all IP&lt;/P&gt;
&lt;P&gt;Interface &lt;STRONG&gt;outside&lt;/STRONG&gt;:&lt;BR /&gt;Service-policy:&amp;nbsp;&lt;STRONG&gt;Traffic&lt;/STRONG&gt;&lt;BR /&gt;Class-map: &lt;STRONG&gt;Server&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Output police Interface outside&lt;/STRONG&gt;:&lt;BR /&gt;cir 2000000 bps, bc 62500 bytes&lt;BR /&gt;conformed 42 packets, 4893 bytes; actions: transmit&lt;BR /&gt;&lt;STRONG&gt;exceeded 0 packets, 0 bytes&lt;/STRONG&gt;; actions: drop&lt;BR /&gt;&lt;STRONG&gt;conformed 0 bps, exceed 0 bps&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Input police Interface outside:&lt;/STRONG&gt;&lt;BR /&gt;cir 2000000 bps, bc 62500 bytes&lt;BR /&gt;conformed 0 packets, 0 bytes; actions: transmit&lt;BR /&gt;&lt;STRONG&gt;exceeded 0 packets, 0 bytes&lt;/STRONG&gt;; actions: drop&lt;BR /&gt;&lt;STRONG&gt;conformed 0 bps, exceed 0 bps&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Class-map: &lt;STRONG&gt;users&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Output&lt;/STRONG&gt; police Interface &lt;STRONG&gt;outside&lt;/STRONG&gt;:&lt;BR /&gt;cir 8000000 bps, bc 250000 bytes&lt;BR /&gt;conformed 3491 packets, 459503 bytes; actions: transmit&lt;BR /&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;exceeded 0 packets, 0 bytes;&lt;/STRONG&gt; &lt;/SPAN&gt;actions: drop&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt;conformed 24 bps, exceed 0 bps&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Input &lt;/STRONG&gt;police Interface &lt;STRONG&gt;outside&lt;/STRONG&gt;:&lt;BR /&gt;cir 8000000 bps, bc 250000 bytes&lt;BR /&gt;conformed 3029 packets, 2642867 bytes; actions: transmit&lt;BR /&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;exceeded 0 packets, 0 bytes;&lt;/STRONG&gt;&lt;/SPAN&gt; actions: drop&lt;BR /&gt;&lt;STRONG&gt;conformed 136 bps, exceed 0 bps&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Interface inside:&lt;/STRONG&gt;&lt;BR /&gt;Service-policy:&amp;nbsp;&lt;STRONG&gt;Traffic&lt;/STRONG&gt;&lt;BR /&gt;Class-map: &lt;STRONG&gt;Server&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Output police Interface inside:&lt;/STRONG&gt;&lt;BR /&gt;cir 2000000 bps, bc 62500 bytes&lt;BR /&gt;conformed 0 packets, 0 bytes; actions: transmit&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt;exceeded 0 packets, 0 bytes; &lt;/SPAN&gt;&lt;/STRONG&gt;actions: drop&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt;conformed 0 bps, exceed 0 bps&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Input police Interface inside&lt;/STRONG&gt;:&lt;BR /&gt;cir 2000000 bps, bc 62500 bytes&lt;BR /&gt;conformed 23194 packets, 7302249 bytes; actions: transmit&lt;BR /&gt;&lt;STRONG&gt;exceeded 677 packets, 964394 bytes&lt;/STRONG&gt;; actions: drop&lt;BR /&gt;&lt;STRONG&gt;conformed 8536 bps, exceed 0 bps&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Class-map: &lt;STRONG&gt;users&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Output police Interface inside:&lt;/STRONG&gt;&lt;BR /&gt;cir 8000000 bps, bc 250000 bytes&lt;BR /&gt;conformed 2856926 packets, 1655405052 bytes; actions: transmit&lt;BR /&gt;&lt;STRONG&gt;exceeded 309546 packets, 408742456 bytes&lt;/STRONG&gt;; actions: drop&lt;BR /&gt;&lt;STRONG&gt;conformed 8001176 bps, exceed 2637592 bps&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Input police Interface inside&lt;/STRONG&gt;:&lt;BR /&gt;cir 8000000 bps, bc 250000 bytes&lt;BR /&gt;conformed 3086795 packets, 661302788 bytes; actions: transmit&lt;BR /&gt;&lt;STRONG&gt;exceeded 805 packets, 1143696 bytes&lt;/STRONG&gt;; actions: drop&lt;BR /&gt;&lt;STRONG&gt;conformed 3092456 bps,&lt;/STRONG&gt; exceed 0 bps&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Other point, If you limit to 2 MB and 8 MB and you are not using all at the same time you will lost part of 10 mb of your link.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards.-&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 14:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-shaping-and-rate-limit-in-asa-firewall/m-p/2933372#M150577</guid>
      <dc:creator>Matias Ortiz</dc:creator>
      <dc:date>2016-08-23T14:12:57Z</dc:date>
    </item>
  </channel>
</rss>

