<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA - QoS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346009#M344317</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am thinking the mi_band class is catching the traffic that is going to the AmazonS3 sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class-map mi_band&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; match any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are in a position to test this, try removing the mi_band from the policy map and see if DropAmazon matches then.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 04 Sep 2013 10:21:37 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2013-09-04T10:21:37Z</dc:date>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346004#M344312</link>
      <description>&lt;P&gt;Hello all.&amp;nbsp; ASA IOS is v8.22.&amp;nbsp;&amp;nbsp; I have setup overall police (10 down 5 up) on outside interface to match ISP bandwidth (for congestion determination) as well as two rules to put packest into LLQ.&amp;nbsp; First rule is for all traffic to DataCenter and it is working as I can see the LLQ packet count increasing during access.&amp;nbsp; Second rule is for all traffic coming from our internal ProxyServer to outside, but it is not working.&amp;nbsp; No packets from this second rule are entering the LLQ.&amp;nbsp; Thank you to anyone who can assist or point me in direction of clues to priorty queue packets from our ProxyServer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;name 77.77.77.0 DataCenter&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;name 192.168.1.158 ProxyServer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list MIConnection_mpc extended permit ip any DataCenter 255.255.192.0&lt;/P&gt;&lt;P&gt;access-list MIConnection_mpc extended permit ip host ProxyServer any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;priority-queue MIConnection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map QOS&lt;/P&gt;&lt;P&gt; match access-list MIConnection_mpc&lt;/P&gt;&lt;P&gt;class-map mi_band&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;policy-map mi_band_police&lt;/P&gt;&lt;P&gt; class mi_band&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 10000000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 5000000 2500&lt;/P&gt;&lt;P&gt; class QOS&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy mi_band_police interface outside&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:28:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346004#M344312</guid>
      <dc:creator>alieas007</dc:creator>
      <dc:date>2019-03-12T02:28:20Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346005#M344313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the ACL does not match at all?&amp;nbsp; Have you tried replacing the ProxyServer name with the actual IP and see if you get any matches then?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 09:38:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346005#M344313</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-21T09:38:16Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346006#M344314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marius, thank you for the reply.&amp;nbsp; Yes it does not appear the ACL is matching.&amp;nbsp; Yes I am using the IP address, I actually only changed to a name for this post to help make it easier to understand.&amp;nbsp; Sorry for the confusion.&amp;nbsp;&amp;nbsp; I will continue testing this afternoon and post whatever I come up with.&amp;nbsp; Thanks again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 13:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346006#M344314</guid>
      <dc:creator>alieas007</dc:creator>
      <dc:date>2013-08-21T13:46:28Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346007#M344315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version ASA are you running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The outside interface, I assume that is connecting to the Internet or is it a WAN link?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any NAT statements that might be messing with the traffic not being able to match the ACL?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 07:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346007#M344315</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-22T07:11:09Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346008#M344316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marius:&amp;nbsp; My ASA IOS is v8.22.&amp;nbsp; The outside interface is connected to a cable modem.&amp;nbsp; In my current setup, I have the cable ISP policed at 10/5 Mbit.&amp;nbsp; If I adjust down to 2/1 Mbit speedtest.net adjusts accordingly, so I know the police on the cable ISP is working.&amp;nbsp; The 1st QoS Rule (QOS) is priorty for our datacenter, and I can see packets hitting the LLQ when this rule is applied.&amp;nbsp; The 2nd QoS rule (DropAmazon) I cannot get to work.&amp;nbsp;&amp;nbsp; It is suppose to police all input and output traffic to AmazonS3 servers at 0.05 Mbit (our offsite backups), but it refuses.&amp;nbsp;&amp;nbsp; I have all the IP ranges for AmazonS3 defined, and I have sniffed the traffic and verified it is going to these ranges, however with the rule active uploads to Amazon still run at full ISP bandwidth (5 Mbit).&amp;nbsp;&amp;nbsp; I will continue to research and test but have been working on this for weeks now.&amp;nbsp; Hopefully I can find out why I cannot police bandwidth to AmazonS3.&amp;nbsp;&amp;nbsp; I can also provide you with the full configuration if you can offer your assistance.&amp;nbsp; Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 72.15.192.0 Peak10&lt;/P&gt;&lt;P&gt;name 72.21.192.0 AmazonS3.1&lt;/P&gt;&lt;P&gt;name 207.171.160.0 AmazonS3.2&lt;/P&gt;&lt;P&gt;name 176.0.0.0 AmazonS3.3&lt;/P&gt;&lt;P&gt;name 205.251.192.0 AmazonS3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface Ethernet0/2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; nameif MIConnection&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 24.224.90.78 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list MIConnection_mpc_1 extended permit ip any object-group AmazonS3&lt;/P&gt;&lt;P&gt;access-list MIConnection_mpc_1 extended permit ip object-group AmazonS3 any&lt;/P&gt;&lt;P&gt;access-list MIConnection_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list MIConnection_mpc extended permit ip host 192.168.1.158 any inactive&lt;/P&gt;&lt;P&gt;access-list MIConnection_mpc extended permit ip any Peak10 255.255.192.0&lt;/P&gt;&lt;P&gt;access-list MIConnection_mpc extended permit ip Peak10 255.255.192.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;priority-queue MIConnection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map QOS&lt;/P&gt;&lt;P&gt; match access-list MIConnection_mpc&lt;/P&gt;&lt;P&gt;class-map mi_band&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;class-map DropAmazon&lt;/P&gt;&lt;P&gt; match access-list MIConnection_mpc_1&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map http-map1&lt;/P&gt;&lt;P&gt; match access-list http-list2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map mi_band_police&lt;/P&gt;&lt;P&gt; class mi_band&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 10000000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 5000000 2500&lt;/P&gt;&lt;P&gt; class QOS&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt; class DropAmazon&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 50000 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 50000 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy mi_band_police interface MIConnection&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Sep 2013 20:29:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346008#M344316</guid>
      <dc:creator>alieas007</dc:creator>
      <dc:date>2013-09-03T20:29:02Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346009#M344317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am thinking the mi_band class is catching the traffic that is going to the AmazonS3 sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class-map mi_band&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; match any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are in a position to test this, try removing the mi_band from the policy map and see if DropAmazon matches then.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 10:21:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346009#M344317</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-09-04T10:21:37Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346010#M344318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Or just move DropAmazon to the top of the policy-map configuration&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 10:25:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346010#M344318</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-09-04T10:25:53Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346011#M344319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marius, thank you for the help.&amp;nbsp; You we're correct, I moved it to the top and it took effect.&amp;nbsp; However I am know interested in shaping, and am having a problem maybe you can offer some assistance.&amp;nbsp; I have setup shaping on the interface with one priority policy but cannot seem to get the ACL to match again.&amp;nbsp; Please take a look:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------&lt;/P&gt;&lt;P&gt;access-list global_mpc_2 extended permit ip any Peak10 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map DM_INLINE_Child-Class&lt;/P&gt;&lt;P&gt; match access-list global_mpc_2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map DM_INLINE_Child-Policy&lt;/P&gt;&lt;P&gt; class DM_INLINE_Child-Class&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map MI-SHAPE&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; shape average 4000000&lt;/P&gt;&lt;P&gt;&amp;nbsp; service-policy DM_INLINE_Child-Policy&lt;/P&gt;&lt;P&gt;---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However no packets showing the the priority queue.&amp;nbsp; I even tried changing the ACL to match any and "hitcnt" always equals 0 as shown here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AssetFirewall# sh access-list global_mpc_2&lt;/P&gt;&lt;P&gt;access-list global_mpc_2; 1 elements; name hash: 0xeb994e93&lt;/P&gt;&lt;P&gt;access-list global_mpc_2 line 1 extended permit ip any Peak10 255.255.192.0 (hitcnt=0) 0x2d9af57d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface MIConnection:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Service-policy: MI-SHAPE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class-default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; shape (average) cir 4000000, bc 16000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (pkts output/bytes output) 171542/216278411&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (total drops/no-buffer drops) 3105/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service-policy: DM_INLINE_Child-Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: DM_INLINE_Child-Class&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Queueing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; queue limit 66 packets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (queue depth/total drops/no-buffer drops) 0/0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (pkts output/bytes output) 0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class-default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Default Queueing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; queue limit 66 packets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (queue depth/total drops/no-buffer drops) 50/3105/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (pkts output/bytes output) 172584/217549709&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas why the priority queue is not matching traffic?&amp;nbsp; Thank you for your help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 02:20:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346011#M344319</guid>
      <dc:creator>alieas007</dc:creator>
      <dc:date>2013-09-05T02:20:06Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346012#M344320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to re structure the policy map.&amp;nbsp; This way shapes the traffic to 4Mb while prioritizing the traffic going to Peak10.&amp;nbsp; Now I am not 100% sure why it doesn't work the way you originally did it, But I believe it is because the ASA is a firewall and not all functionality of a route is available. Please correct me if I am wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list global_mpc_2 extended permit ip any Peak10 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map DM_INLINE_Child-Class&lt;/P&gt;&lt;P&gt; match access-list global_mpc_2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map MI-SHAPE&lt;/P&gt;&lt;P&gt;class DM_INLINE_Child-Class&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; shape average 4000000&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 08:16:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346012#M344320</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-09-05T08:16:00Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346013#M344321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marius, original way should have been correct as it was constructed by the ASDM software, however I will try your changes and report.&amp;nbsp; Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 12:59:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346013#M344321</guid>
      <dc:creator>alieas007</dc:creator>
      <dc:date>2013-09-05T12:59:50Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346014#M344322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately met with error, SHAPE cannot be used on a policy-map already using Standard Priority.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 13:11:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346014#M344322</guid>
      <dc:creator>alieas007</dc:creator>
      <dc:date>2013-09-05T13:11:54Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346015#M344323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry my bad, a different policy-map is needed for the priority.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just out of curiosity, are you in a position to do a test with the ACL?&amp;nbsp; Could you create an ACL that matches an exact port and not IP... for example &lt;/P&gt;&lt;P&gt;access-list global_mpc_2 extended permit tcp any Peak10 255.255.192.0 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and see if the hitcount on the priority increases.&amp;nbsp; I have seen that with some features on the ASA it needs the exact ports to match for the feature to take effect.&amp;nbsp; I wonder if it is the same with the shaping.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 18:54:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346015#M344323</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-09-05T18:54:47Z</dc:date>
    </item>
    <item>
      <title>ASA - QoS</title>
      <link>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346016#M344324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks changed ACL to "tcp eq 80" and still no hit counts on ACL.&amp;nbsp; It gets hit counts in standard priority/police mode, although I went back using standard priority today and I'm having problems making ACL's match that too, so I'm wondering if there is some governing setting in my config that is causing all these problems.&amp;nbsp; The shaping on the outside interface with heirerachal priority queue should be working as far as I can tell...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 20:16:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-qos/m-p/2346016#M344324</guid>
      <dc:creator>alieas007</dc:creator>
      <dc:date>2013-09-05T20:16:45Z</dc:date>
    </item>
  </channel>
</rss>

