<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi;  Use this example: http:/ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751354#M192889</link>
    <description>&lt;P&gt;Hi;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use this example:&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/82310-qos-voip-vpn.html#anc19&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Instead of using the ports for H232 and SIP, change to the ports 1495 and 2598, that should do it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It has to be under the tunnel-flow, if you do the regular one it would not work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 14 Aug 2015 17:33:11 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2015-08-14T17:33:11Z</dc:date>
    <item>
      <title>QoS for Citrix traffic over over traffic in ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751353#M192888</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have about 140 sites in the field that use ASA 5505's to VPN back to my&amp;nbsp;data center for all services. &amp;nbsp;Among those services are Citrix Published desktops. &amp;nbsp;However, some of these sites had limited bandwidth, and when the lines are saturated, the Citrix expierience suffers. &amp;nbsp;I am being asked by the Citrix team if there is a way to apply QoS in the ASA but only for Citrix traffic?&lt;/P&gt;&lt;P&gt;Our Citrix traffic rides on the same subnet at each site as all other data services (centralized internet, e-mail, etc....). What differentiates it is that it uses TCP port 1495 &amp;amp; 2598.&lt;/P&gt;&lt;P&gt;Is there any way I can set up QoS to prioritize only&amp;nbsp;the flows using those ports?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:25:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751353#M192888</guid>
      <dc:creator>Dean Romanelli</dc:creator>
      <dc:date>2019-03-12T06:25:08Z</dc:date>
    </item>
    <item>
      <title>Hi;  Use this example: http:/</title>
      <link>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751354#M192889</link>
      <description>&lt;P&gt;Hi;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use this example:&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/82310-qos-voip-vpn.html#anc19&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Instead of using the ports for H232 and SIP, change to the ports 1495 and 2598, that should do it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It has to be under the tunnel-flow, if you do the regular one it would not work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 17:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751354#M192889</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2015-08-14T17:33:11Z</dc:date>
    </item>
    <item>
      <title>Thanks Mike.Question for you:</title>
      <link>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751355#M192891</link>
      <description>&lt;P&gt;Thanks Mike.&lt;/P&gt;&lt;P&gt;Question for you: Once I drop in the configs from the example, how can I configure it on when I want the prioritization to trigger? For example: If I want it to prioritize Citrix traffic only if link saturation is at 1.1Mbps, for example? Or will it always prioritize Citrix, regardless of the environment conditions at any given time (i.e. whether the link bandwidth is at 1% or 99%).&lt;/P&gt;&lt;P&gt;Also, in the example on Cisco's site, I see that access-list 100 is applied to the outside interface. &amp;nbsp;Is this step required? I only ask because right now I have another ACL applied to the outside interface (outside_access_in), so I can't apply another one to that same interface. &amp;nbsp;I suppose I could roll up those rules into the new QOS access list but won't that give priority for those flows as well?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2015 14:57:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751355#M192891</guid>
      <dc:creator>Dean Romanelli</dc:creator>
      <dc:date>2015-08-18T14:57:42Z</dc:date>
    </item>
    <item>
      <title>Hello;  Unfortunately it</title>
      <link>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751356#M192893</link>
      <description>&lt;P&gt;Hello;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately it cannot be on demand, it is always on. You can easily have every aspect of it on configured and then you can apply the service policy, but this would require for you to be adding config (on ASDM would be a single click)&amp;nbsp;and clearing the conn table on the firewall (this can be service impacting)&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding the ACL, no, you dont need to use it on the interface, but you will need it on the inbound class map.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have any questions, let me know.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2015 19:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751356#M192893</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2015-08-18T19:49:18Z</dc:date>
    </item>
    <item>
      <title>Thanks Mike. Actually after</title>
      <link>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751357#M192895</link>
      <description>&lt;P&gt;Thanks Mike. Actually after re-reading the example, they are saying to apply the ACL:&lt;/P&gt;

&lt;PRE&gt;
!--- Apply the ACL 100 for the inbound traffic of the outside interface.

ciscoasa(config)#access-group 100 in interface outside
&lt;/PRE&gt;

&lt;P&gt;Just want to double confirm that this step is OK to skip and the QOS will still work without it. ACL 100 is also the Voice-IN ACL match in the class map in the example.&lt;/P&gt;
&lt;P&gt;One more question: Your statement above: &lt;EM&gt;"It has to be under the tunnel-flow, if you do the regular one it would not work."&amp;nbsp; &lt;/EM&gt;---&amp;gt; So my crypto ACL for the VPN tunnel is &lt;EM&gt;"permit ip 192.168.186.0 255.255.255.0 any4."&lt;/EM&gt;&amp;nbsp; It is going to any4 because both internet &amp;amp; citrix come from the same data center.&amp;nbsp; However, the Citrix traffic is only going to come from 192.168.120.0/24.&amp;nbsp; Given that, are you saying that if my crypto ACL is &lt;EM&gt;"permit ip 192.168.186.0 255.255.255.0 any4"&lt;/EM&gt; that my QOS ACL needs to also be that exact flow (&lt;EM&gt;permit tcp 192.168.186.0 255.255.255.0 any4 eq 1494&lt;/EM&gt;)? Or can I be more specific and do &lt;EM&gt;"permit tcp 192.168.186.0 255.255.255.0 192.168.120.0 255.255.255.0 eq 1494?"&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 12:30:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751357#M192895</guid>
      <dc:creator>Dean Romanelli</dc:creator>
      <dc:date>2015-08-19T12:30:35Z</dc:date>
    </item>
    <item>
      <title>No issues, I think the reason</title>
      <link>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751358#M192897</link>
      <description>&lt;P&gt;No issues, I think the reason why that ACL 100 is configured on the interface is due to the fact that the document assume that the "sysopt connection permit-vpn" is not configured. Check if you have it (sh run all | inc sysopt).&amp;nbsp;&lt;/P&gt;&lt;P&gt;With the ACL for QoS, you can be as specific as you want, it does not have to be the same as the tunnel ACL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 17:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751358#M192897</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2015-08-19T17:31:33Z</dc:date>
    </item>
    <item>
      <title>Hi Mike,Yes it is in there.</title>
      <link>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751359#M192898</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;Yes it is in there. &amp;nbsp;Thanks so much for all your help.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 11:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-for-citrix-traffic-over-over-traffic-in-asa-5505/m-p/2751359#M192898</guid>
      <dc:creator>Dean Romanelli</dc:creator>
      <dc:date>2015-08-20T11:44:04Z</dc:date>
    </item>
  </channel>
</rss>

