<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Cut Through (Authentication) Proxy HTTPS concurrent conn in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-cut-through-authentication-proxy-https-concurrent/m-p/1995047#M401468</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA allows 16 concurrent HTTPS-Authentication-sessions. This is documented in the config-guide:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_fwaaa.html#wp1150372" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_fwaaa.html#wp1150372&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the authenticated traffic the "normal" connection-limits apply as they are processed the same way as any other traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to authenticate your internal Users you should think about the Identity-Firewall-feature:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_idfw.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_idfw.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Jul 2012 13:39:20 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2012-07-30T13:39:20Z</dc:date>
    <item>
      <title>ASA Cut Through (Authentication) Proxy HTTPS concurrent connections</title>
      <link>https://community.cisco.com/t5/network-security/asa-cut-through-authentication-proxy-https-concurrent/m-p/1995044#M401465</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the limitations on the max number of concurrent HTTPS connections when using Auth Proxy for HTTPS traffic on a Cisco ASA 5520.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) What is the max number of concurrent Authentications that the ASA can perform (HTTPS)?&lt;/P&gt;&lt;P&gt;2) Once Authenticated. What is the max number of concurrent HTTPS Authenticated connections to the back end HTTPS server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Byron&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:36:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cut-through-authentication-proxy-https-concurrent/m-p/1995044#M401465</guid>
      <dc:creator>byron.momsen</dc:creator>
      <dc:date>2019-03-11T23:36:05Z</dc:date>
    </item>
    <item>
      <title>ASA Cut Through (Authentication) Proxy HTTPS concurrent connecti</title>
      <link>https://community.cisco.com/t5/network-security/asa-cut-through-authentication-proxy-https-concurrent/m-p/1995045#M401466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Byron,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess it should be based on the concurrent VPN sessions for your Webvpn/SSL vpn. If so then 750 is the maximum session allowed through ASA 5520. Because the valid https authentication for your vpn connectivity will be considered as one session. Your second question depends on the HTTPS server which you have i suppose&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate if the given information helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 13:21:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cut-through-authentication-proxy-https-concurrent/m-p/1995045#M401466</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-30T13:21:02Z</dc:date>
    </item>
    <item>
      <title>ASA Cut Through (Authentication) Proxy HTTPS concurrent connecti</title>
      <link>https://community.cisco.com/t5/network-security/asa-cut-through-authentication-proxy-https-concurrent/m-p/1995046#M401467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Byron,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you mean to say whenevr you hit the firewall with any traffic if that matches it will direct you to a proxy authentication of https which you are asking a count how many cut through proxy authentication for the same???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 13:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cut-through-authentication-proxy-https-concurrent/m-p/1995046#M401467</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-30T13:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Cut Through (Authentication) Proxy HTTPS concurrent conn</title>
      <link>https://community.cisco.com/t5/network-security/asa-cut-through-authentication-proxy-https-concurrent/m-p/1995047#M401468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA allows 16 concurrent HTTPS-Authentication-sessions. This is documented in the config-guide:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_fwaaa.html#wp1150372" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_fwaaa.html#wp1150372&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the authenticated traffic the "normal" connection-limits apply as they are processed the same way as any other traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to authenticate your internal Users you should think about the Identity-Firewall-feature:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_idfw.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_idfw.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 13:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cut-through-authentication-proxy-https-concurrent/m-p/1995047#M401468</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-30T13:39:20Z</dc:date>
    </item>
  </channel>
</rss>

