<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I got internal note from in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657704#M194608</link>
    <description>&lt;P&gt;I got internal note from Cisco Security SE, and 6.1 should include rate-limiting and other new features like SITE-TO-SITE VPN, Shared NAT...&lt;/P&gt;
&lt;P&gt;6.1 should be available July 2016.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dominic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 26 May 2016 13:03:56 GMT</pubDate>
    <dc:creator>dlongpre</dc:creator>
    <dc:date>2016-05-26T13:03:56Z</dc:date>
    <item>
      <title>cisco Asa firepower traffic rate limiting</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657691#M194595</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does cisco Asa firepower supports url filtering and traffic rate limiting ?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:50:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657691#M194595</guid>
      <dc:creator>susim</dc:creator>
      <dc:date>2019-03-12T05:50:37Z</dc:date>
    </item>
    <item>
      <title>URL Filtering is possible.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657692#M194596</link>
      <description>&lt;P&gt;URL Filtering is possible. Advanced features are enabled when you have the URL license. &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/AC-Rules-App-URL-Reputation.html#pgfId-1531028"&gt;Reference&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;You cannot rate limit outbound traffic using the FirePOWER module but you you can perform rate-based attack prevention. &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/Intrusion-Threat-Detection.html#pgfId-1531411"&gt;Reference&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2015 12:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657692#M194596</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-04-27T12:52:48Z</dc:date>
    </item>
    <item>
      <title>Hi So how can we do the </title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657693#M194597</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So how can we do the&amp;nbsp;&amp;nbsp;traffic shaping ?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2015 12:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657693#M194597</guid>
      <dc:creator>susim</dc:creator>
      <dc:date>2015-04-27T12:58:25Z</dc:date>
    </item>
    <item>
      <title>If you need to do traffic</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657694#M194598</link>
      <description>&lt;P&gt;If you need to&amp;nbsp;do traffic shaping, you would create a policy on the base ASA, not on the FirePOWER module.&lt;/P&gt;&lt;P&gt;Here's a &lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/82310-qos-voip-vpn.html#anc6"&gt;guide for doing that&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2015 13:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657694#M194598</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-04-27T13:01:01Z</dc:date>
    </item>
    <item>
      <title>So how can we do the layer7</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657695#M194599</link>
      <description>&lt;P&gt;So how can we do the layer7 traffic shaping?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2015 19:56:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657695#M194599</guid>
      <dc:creator>mscottini</dc:creator>
      <dc:date>2015-09-28T19:56:19Z</dc:date>
    </item>
    <item>
      <title>Well..  you can't do true L7</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657696#M194600</link>
      <description>&lt;P&gt;Well..&amp;nbsp; you can't do true L7 traffic shaping today in a ASA/Firepower combination.. You need something else.. like Meraki..&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2015 13:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657696#M194600</guid>
      <dc:creator>Daniel Sandstrom</dc:creator>
      <dc:date>2015-10-01T13:50:51Z</dc:date>
    </item>
    <item>
      <title>As per our Cisco Security CSE</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657697#M194601</link>
      <description>&lt;P&gt;As per our Cisco Security CSE, L7 shaping/policing (QoS) and Time-based will be available into Firepower/Firesight 6.1 release...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My guest, should be available in 2016...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2015 23:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657697#M194601</guid>
      <dc:creator>dlongpre</dc:creator>
      <dc:date>2015-10-06T23:01:18Z</dc:date>
    </item>
    <item>
      <title>Any news on this?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657698#M194602</link>
      <description>&lt;P&gt;Any news on this?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2016 02:09:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657698#M194602</guid>
      <dc:creator>TM13</dc:creator>
      <dc:date>2016-04-25T02:09:21Z</dc:date>
    </item>
    <item>
      <title>It's not available as of the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657699#M194603</link>
      <description>&lt;P&gt;It's not available as of the current 6.0.1.&lt;/P&gt;
&lt;P&gt;Please watch the release notes for future updates.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/security/asa-firepower-services/products-release-notes-list.html&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/security/defense-center/products-release-notes-list.html&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2016 03:20:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657699#M194603</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-04-25T03:20:46Z</dc:date>
    </item>
    <item>
      <title>Hehe, thanks, better go for</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657700#M194604</link>
      <description>&lt;P&gt;Hehe, thanks, better go for Fortinet &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2016 04:27:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657700#M194604</guid>
      <dc:creator>TM13</dc:creator>
      <dc:date>2016-04-25T04:27:44Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657701#M194605</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;Do you know any ETA of the Layer 7 traffic shaping feature ?&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Marcin&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 09:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657701#M194605</guid>
      <dc:creator>Marcin Szatkowski</dc:creator>
      <dc:date>2016-05-26T09:17:23Z</dc:date>
    </item>
    <item>
      <title>We hope for it in 6.1 (Summer</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657702#M194606</link>
      <description>&lt;P&gt;We hope for it in 6.1 (Summer 2016) but it won't be confirmed until released.&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 11:43:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657702#M194606</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-05-26T11:43:59Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657703#M194607</link>
      <description>&lt;P&gt;Thanks Marvin.&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 11:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657703#M194607</guid>
      <dc:creator>Marcin Szatkowski</dc:creator>
      <dc:date>2016-05-26T11:51:38Z</dc:date>
    </item>
    <item>
      <title>I got internal note from</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657704#M194608</link>
      <description>&lt;P&gt;I got internal note from Cisco Security SE, and 6.1 should include rate-limiting and other new features like SITE-TO-SITE VPN, Shared NAT...&lt;/P&gt;
&lt;P&gt;6.1 should be available July 2016.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dominic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 13:03:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657704#M194608</guid>
      <dc:creator>dlongpre</dc:creator>
      <dc:date>2016-05-26T13:03:56Z</dc:date>
    </item>
    <item>
      <title>Thanks for the update Dominic</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657705#M194611</link>
      <description>&lt;P&gt;Thanks for the update Dominic.&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 13:09:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657705#M194611</guid>
      <dc:creator>Marcin Szatkowski</dc:creator>
      <dc:date>2016-05-26T13:09:01Z</dc:date>
    </item>
    <item>
      <title>QoS is now available in 6.1.0</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657706#M194613</link>
      <description>&lt;P&gt;QoS&amp;nbsp;is now available in 6.1.0 (released Aug 29th), but only works with FirePower Threat Defense devices, which is the ASA/FirePower unified image. There are other ASA base limitations when running this image, ie. no AnyConnect, although this is set to be added soon ... they are making big leaps on FTD.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Sep 2016 23:12:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657706#M194613</guid>
      <dc:creator>Barrett Cowan</dc:creator>
      <dc:date>2016-09-27T23:12:19Z</dc:date>
    </item>
    <item>
      <title>What is mean "no AnyConnect"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657707#M194615</link>
      <description>&lt;P&gt;What is mean "no AnyConnect" ? actually Cisco traditional Policy based rule is set on Source/Destination IP or range, not like every IP or bulk configuration on different rate on IP range ... by the way FirePower has Load balancing?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 01:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657707#M194615</guid>
      <dc:creator>TM13</dc:creator>
      <dc:date>2016-09-28T01:59:18Z</dc:date>
    </item>
    <item>
      <title>"AnyConnect" = shorthand for</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657708#M194617</link>
      <description>&lt;P&gt;"AnyConnect" = shorthand for client-based remote access SSL VPN. Cisco uses the AnyConnect Secure Mobility Client software for that function.&lt;/P&gt;
&lt;P&gt;FTD-based rule sets can be based on application, URL category, etc. in addition to traditional 5-tuple criteria (protocol, source and destination address and port).&lt;/P&gt;
&lt;P&gt;Load balancing - how do you mean that?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 02:18:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657708#M194617</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-09-28T02:18:45Z</dc:date>
    </item>
    <item>
      <title>Means if we order Cisco</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657709#M194618</link>
      <description>&lt;P&gt;Means if we order Cisco FirePower it hasn't AnyConnect? :O, that FTP sounds nice, but still does it can possible give same bandwidth limit on each IP having session established?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Load balancing is for 2 different Internet Gateways solution, using both ISP for Internet access.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 02:34:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657709#M194618</guid>
      <dc:creator>TM13</dc:creator>
      <dc:date>2016-09-28T02:34:33Z</dc:date>
    </item>
    <item>
      <title>Please keep in mind the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657710#M194619</link>
      <description>&lt;P&gt;Please keep in mind the distinction between "FirePOWER" = a general set of features and technologies based on the Cisco acquisition of Sourcefire in 2013 and specific products, i.e:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;1. Cisco ASA with FirePOWER services. Has all the traditional ASA features plus FirePOWER services in an added module that perform Next Generation IPS, URL Filtering and Advance Malware Protection (depending on licensing).&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;2. FirePOWER Threat Defense (FTD). A new unified image that can run on an ASA (or FirePOWER 4100 and 9300 series) that includes many (but not all) of the classic ASA features along with the FirePOWER features.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Remote access SSL VPN ("AnyConnect") is only available with option #1 at this time.&lt;/P&gt;
&lt;P&gt;#1 has crude rate limiting (classic QoS policing and shaping). #2 has that plus the ability to use Layer 7 characteristics to your policy.&lt;/P&gt;
&lt;P&gt;As far as load balancing, that is a separate topic unto itself.&lt;/P&gt;
&lt;P&gt;A lot depends on your Internet connectivity. If you have your own provider-independent addressing and BGP peering to separate providers you can technically use that with the classic ASA solution (#1). However it's usually not a good choice to do that on an ASA since it's really not designed to accept a full routing table and make dynamic decisions based on the routes installed in the FIB on a per-flow basis. You can also do policy-based routing on an ASA with FirePOWER services. Again not really ISP load balancing.&lt;/P&gt;
&lt;P&gt;An FTD solution has fewer routing options and is generally best suited for single egress route use cases at this stage.&lt;/P&gt;
&lt;P&gt;In either case, it is almost always much better to let an upstream router route. They are fit for that purpose. A security appliance is fit to provide security. Don't count on it having all the routing features of a true router.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 03:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower-traffic-rate-limiting/m-p/2657710#M194619</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-09-28T03:04:39Z</dc:date>
    </item>
  </channel>
</rss>

