<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961377#M440263</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prashanth Goutham R.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your detailed reply and for allowing this out-of-scope question. Honestly, when I read "ASA" in the subject I ignored the rest. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two more questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Which SHOW command you used at the end to verify the bandwidth?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- If one peer is policing traffic and the other one is not, the one with the smallest bandwidth would set the size limit in the connection ? I am also implying that the Traffic policing does not need to be configured on both ends, correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Jul 2012 19:11:12 GMT</pubDate>
    <dc:creator>johnramz</dc:creator>
    <dc:date>2012-07-06T19:11:12Z</dc:date>
    <item>
      <title>Ask the Expert:Configuring, Troubleshooting &amp; Best Practices on ASA &amp; FWSM Failover</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961366#M440244</link>
      <description>&lt;P&gt;&lt;IMG style="padding-right: 10px; padding-bottom: 20px;" src="https://community.cisco.com/legacyfs/online/legacy/3/8/7/93783-pgoutham.jpg" border="0" alt="Read the bio" hspace="10" width="90" align="left" /&gt;&lt;STRONG&gt;With Prashanth Goutham R.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about the Configuring, Troubleshooting &amp;amp; Best Practices on Adaptive Security Appliances (ASA) &amp;amp; Firewall Services Module (FWSM) Failover with Prashanth Goutham.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 switch and 7600 router chassis. The FWSM monitors traffic flows using application inspection engines to provide a strong level of network security. Cisco ASA protects networks of all sizes with MultiScale performance and a comprehensive suite of highly integrated, market-leading security services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Prashanth Goutham is an experienced support engineer with the High Touch Technical Support (HTTS) Security team, covering all Cisco security technologies. During his four years with Cisco, he has worked with Cisco's major customers, troubleshooting routing, LAN switching, and security technologies. He is also qualified as a GIAC Certified Incident Handler (GCIH) by the SANS Institute.&lt;/P&gt;
&lt;P&gt;Remember to use the rating system to let Prashanth know if you have received an adequate response.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Prashanth might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Security sub-community forum shortly after the event. &lt;STRONG&gt;This event lasts through July 13, 2012.&lt;/STRONG&gt; Visit this forum often to view responses to your questions and the questions of other community members.&lt;/P&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 13 Feb 2020 20:58:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961366#M440244</guid>
      <dc:creator>ciscomoderator</dc:creator>
      <dc:date>2020-02-13T20:58:26Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert:Configuring, Troubleshooting &amp; Best Practices on</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961367#M440247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Prashanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a quick question for you. Why it is recommended to have a switch in-between the Firewall pairs and not connect them directly though its going to work fine anyway?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot,&lt;/P&gt;&lt;P&gt;- John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jul 2012 04:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961367#M440247</guid>
      <dc:creator>John Ventura</dc:creator>
      <dc:date>2012-07-04T04:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961368#M440250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;Hello John,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;I believe you are talking about the Failover Lan Interface connectivity which can be of two types:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG&gt;--- &lt;/STRONG&gt;Back to Back.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG&gt;--- &lt;/STRONG&gt;With Intermediary Switch&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;I would say the second option is better as its easy to segment and isolate faults on a Production Network. Consider the below scenario:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;Your firewalls are connected back to back with a crossover cable and you have a live firewall and you start experiencing failover related issues on your FO lan port. What would you do to determine if its a cable or a Firewall Interface issue and if an Interface issue which Interface? Cause if one Interface goes down it pulls down the Peer interface as well to line protocol down. This is tricky you would need to manually test all the components seperately using another directly connected device to see which component is faulty or replace all units to restore services.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;In case of the second option we can clearly eliminate as the switch is inbetween. I think its also explained in the configuration guide here:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;When&amp;nbsp; you use a crossover cable for the LAN failover link, if the LAN&amp;nbsp; interface fails, the link is brought down on both peers. This condition&amp;nbsp; may hamper troubleshooting efforts because you cannot easily determine&amp;nbsp; which interface failed and caused the link to come down. &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ha_overview.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ha_overview.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;Hope that helps. Have a good day !&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jul 2012 07:10:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961368#M440250</guid>
      <dc:creator>pgoutham</dc:creator>
      <dc:date>2012-07-04T07:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961369#M440251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Prashanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please can you check/confirm if using a Cisco ASA Active/Standby clustering enviroment the SELF SIGNED GENERATED certificate used for SSL VPN remote access are replicated or NOT on the STANDBY unit ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the following doc there's indicate "the ASA's Local/onboard CA-generated certificates (used for SSL VPN remote access) are not replicated but testing on lab with version 8.4.4 the result is different: the self signed certificate of the active asa is replicated on the standby.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-12969" rel="nofollow"&gt;https://supportforums.cisco.com/docs/DOC-12969&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q. Are digital certificates replicated in a&amp;nbsp; Active/Standby configuration?&lt;/P&gt;&lt;P&gt;A. Yes. Third-party digital certificates (ie. from Entrust, Verisign, Microdoft,etc)&amp;nbsp; that are installed on the Active ASA are replicated to the Standby ASA in an active/standby config.&lt;/P&gt;&lt;P&gt;However, the ASA's Local/onboard CA-generated certificates (used for SSL VPN remote access) are not replicated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jul 2012 17:20:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961369#M440251</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2012-07-04T17:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961370#M440253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: left;"&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;Hello Roberto,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left;"&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;The document is absolutely right the Certificates on the ASA get replicated with Bulk replication only and these are 3rd party certificates only and not the locally generated certificates which i have checked in previous versions. However i have not played around much on 8.4.4 which was just released and i dont have a reason to believe that it works differently on 8.4.4, i can check this up for you once i get into office in the morning.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: calibri,verdana,arial,sans-serif;"&gt;Can you let me know the license you are on Active/Active or Active/Standby Failover ? Also what are the steps you took to test this and how sure are you that this was not exported to the oth&lt;SPAN style="font-size: 10pt;"&gt;er firewall ? &lt;/SPAN&gt;Just to add i would assume the purpose of Self signed Certificate to be unique to each of the ASA's.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;Prashanth&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jul 2012 20:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961370#M440253</guid>
      <dc:creator>pgoutham</dc:creator>
      <dc:date>2012-07-04T20:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961371#M440254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Prashanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;maybe I've not fully understood, please can you indicate me again why the "However, the ASA's Local/onboard CA-generated certificates (used for SSL VPN remote access) are not replicated." is correct ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the previous sentence is correct why on the following test enviroment both cisco asa active and standby have the same SSL self signed certificate ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enviroment:&lt;/P&gt;&lt;P&gt;a cluster of Cisco ASA is Active/Standby firewalls with the SSL AnyConnect certificate auto generated named “SELFSIGNEDCERT” and used for the remote SSL vpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ON THE ACTIVE:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pri/act/asa# sh run | i SELFSIGNEDCERT&lt;/P&gt;&lt;P&gt;crypto ca trustpoint SELFSIGNEDCERT&lt;/P&gt;&lt;P&gt;keypair SELFSIGNEDCERTKEY&lt;/P&gt;&lt;P&gt;crypto ca certificate chain SELFSIGNEDCERT&lt;/P&gt;&lt;P&gt;ssl trust-point SELFSIGNEDCERT outside vpnlb-ip&lt;/P&gt;&lt;P&gt;ssl trust-point SELFSIGNEDCERT outside&lt;/P&gt;&lt;P&gt;pri/act/asa# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pri/act/asa#sh crypto ca certificates SELFSIGNEDCERT&lt;/P&gt;&lt;P&gt;Certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;&lt;P&gt;&amp;nbsp; Certificate Serial Number: 5406334f&lt;/P&gt;&lt;P&gt;&amp;nbsp; Certificate Usage: General Purpose&lt;/P&gt;&lt;P&gt;&amp;nbsp; Public Key Type: RSA (2048 bits)&lt;/P&gt;&lt;P&gt;&amp;nbsp; Signature Algorithm: SHA1 with RSA Encryption&lt;/P&gt;&lt;P&gt;&amp;nbsp; Issuer Name: &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostname=asa.cisco.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=*.cisco.com&lt;/P&gt;&lt;P&gt;&amp;nbsp; Subject Name:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostname=asa.cisco.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=*.cisco.com&lt;/P&gt;&lt;P&gt;&amp;nbsp; Validity Date: &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 20:42:41 UTC Feb 20 2012&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 20:42:41 UTC Feb 17 2022&lt;/P&gt;&lt;P&gt;&amp;nbsp; Associated Trustpoints: SELFSIGNEDCERT &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pri/act/asa# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ON THE STANDBY:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sec/stby/asa# sh crypto ca certificates SELFSIGNEDCERT&lt;/P&gt;&lt;P&gt;Certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;&lt;P&gt;&amp;nbsp; Certificate Serial Number: 5406334f&lt;/P&gt;&lt;P&gt;&amp;nbsp; Certificate Usage: General Purpose&lt;/P&gt;&lt;P&gt;&amp;nbsp; Public Key Type: RSA (2048 bits)&lt;/P&gt;&lt;P&gt;&amp;nbsp; Signature Algorithm: SHA1 with RSA Encryption&lt;/P&gt;&lt;P&gt;&amp;nbsp; Issuer Name: &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostname=asa.cisco.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=*.cisco.com&lt;/P&gt;&lt;P&gt;&amp;nbsp; Subject Name:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostname=asa.cisco.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=*.cisco.com&lt;/P&gt;&lt;P&gt;&amp;nbsp; Validity Date: &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 20:42:41 UTC Feb 20 2012&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 20:42:41 UTC Feb 17 2022&lt;/P&gt;&lt;P&gt;&amp;nbsp; Associated Trustpoints: SELFSIGNEDCERT &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sec/stby/asa# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And again if the sentence "However, the ASA's Local/onboard CA-generated certificates (used for SSL VPN remote access) are not replicated." is&amp;nbsp; correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Qs:&lt;/P&gt;&lt;P&gt;1) If I activate the standby unit with “failover&amp;nbsp; active” need to do something for the SSL certificate (needed to copy it from the other unit)&amp;nbsp; ?!?!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) If the active firewall unit FAIL is it necessary to reinstall the AUTO GENERATED&amp;nbsp; SSL certificate on the Standby unit ?!?! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jul 2012 20:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961371#M440254</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2012-07-04T20:32:54Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert:Configuring, Troubleshooting &amp; Best Practices on</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961372#M440256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Prashanth for detailed info.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2012 04:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961372#M440256</guid>
      <dc:creator>John Ventura</dc:creator>
      <dc:date>2012-07-05T04:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961373#M440257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;Hello Roberto,&lt;BR /&gt;&lt;BR /&gt;I tried out the configuration on 8.4.4 and observed the same issue as what you have noticed, look below :&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;CiscoASA(config-ca-trustpoint)# fqdn sslvpn.cisco.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;CiscoASA(config-ca-trustpoint)# subject-name CN=sslvpn.cisco.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;CiscoASA(config-ca-trustpoint)# crypto key generate rsa label sslvpnkeypair&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;INFO: The name for the keys will be: sslvpnkeypair&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Keypair generation process begin. Please wait...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;CiscoASA(config)# crypto ca trustpoint SELFSIGNEDCERT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;CiscoASA(config-ca-trustpoint)# keypair sslvpnkeypair&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;CiscoASA(config)# crypto ca enroll SELFSIGNEDCERT noconfirm&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;% The fully-qualified domain name in the certificate will be: sslvpn.cisco.com&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;When i try to view it i see the below output on both Active and Standby Firewalls replicated without doing even a write standby:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;CiscoASA(config)# show cry ca cert&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Certificate&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; Status: Available&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; Certificate Serial Number: c5d1f44f&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; Certificate Usage: General Purpose&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; Public Key Type: RSA (1024 bits)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; Signature Algorithm: SHA1 with RSA Encryption&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; Issuer Name: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostname=sslvpn.cisco.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=sslvpn.cisco.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; Subject Name:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostname=sslvpn.cisco.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=sslvpn.cisco.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; Validity Date: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 16:29:09 GMT Jul 5 2012&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 16:29:09 GMT Jul 3 2022&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; Associated Trustpoints: SELFSIGNEDCERT &lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;This is exactly matching the output you had provided, however what we both did not figure out earlier is that this is an Identity certificate and not a CA certificate. A typical CA certificate looks like this:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;PRE&gt;&lt;SPAN style="font-size: 8pt;"&gt;CiscoASA(config)#&lt;/SPAN&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt; show crypto ca certificate&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;CA Certificate&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp; Status: Available&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp; Certificate Serial Number: 344ed55720d5edec49f42fce37db2b6d&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp; Certificate Usage: General Purpose&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp; Public Key Type: RSA (2048 bits)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp; Signature Algorithm: SHA1 with RSA Encryption&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp; Issuer Name:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=thawte Primary Root CA&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=(c) 2006 thawte\, Inc. - For authorized use only&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=Certification Services Division&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=thawte\, Inc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=US&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp; Subject Name:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=thawte Primary Root CA&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=(c) 2006 thawte\, Inc. - For authorized use only&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=Certification Services Division&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=thawte\, Inc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=US&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp; Validity Date:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 00:00:00 UTC Nov 17 2006&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 23:59:59 UTC Jul 16 2036&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&amp;nbsp; Associated Trustpoints: abc&lt;/SPAN&gt;&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;Hence going back to the document you had pointed out, its only speaking about the Local CA Generated certificates and not all locally generated Certificates (identity)&lt;/SPAN&gt;. &lt;SPAN style="font-size: 10pt; font-family: calibri,verdana,arial,sans-serif;"&gt;Refer to the 8.4 Configuration guide as well which shows that the locally generated &lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ha_active_standby.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ha_active_standby.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;&lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;Standby Failover does not replicate the following files and configuration components: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;AnyConnect images &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;CSD images &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;ASA images &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;AnyConnect profiles &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Local Certificate Authorities (CA) &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 8pt; font-family: courier new,courier;"&gt;•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;ASDM images &lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif; font-size: 10pt;"&gt;Hope that clarifies the document's wordings &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2012 12:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961373#M440257</guid>
      <dc:creator>pgoutham</dc:creator>
      <dc:date>2012-07-05T12:05:13Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert:Configuring, Troubleshooting &amp; Best Practices on</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961374#M440259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roberto Taccon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2012 12:38:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961374#M440259</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2012-07-05T12:38:47Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert:Configuring, Troubleshooting &amp; Best Practices on</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961375#M440260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prashanth Goutham R.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have set up 4 IPsec VPNs in a ASA 5520. The maximum bandwidth-BW- provided by our ISP is 3 MBPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's suppose that I want to assign/allocate BW to each IPSEc tunnel as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tunnel 1: 500 KBps&lt;/P&gt;&lt;P&gt;Tunnel 2: 700 KBps&lt;/P&gt;&lt;P&gt;Tunnel 3: 300 KBps&lt;/P&gt;&lt;P&gt;Tunnel 4: 600 Kbps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- What is the configuration to make that possible?&lt;/P&gt;&lt;P&gt;2- Does it make any difference if this configuration fo BW assignment is also added on the other VPN peer?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2012 15:09:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961375#M440260</guid>
      <dc:creator>johnramz</dc:creator>
      <dc:date>2012-07-06T15:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961376#M440261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif; font-size: 10pt;"&gt;Hello John,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif; font-size: 10pt;"&gt;This session is on Failover Functionality on all Cisco Firewalls, im not a geek on QOS however i have the answer for what you need. The way to limit traffic would be to enable QOS Policing on your Firewalls. The requirement that you have is about limiting 4 different tunnels to be utilizing the set limits and drop any further packets. This is called Traffic Policing. I tried out the following in my lab and it looks good.&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;access-list tunnel_one extended permit ip 10.1.0.0 255.255.0.0 20.1.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;access-list tunnel_two extended permit ip 10.2.0.0 255.255.0.0 20.2.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;access-list tunnel_three extended permit ip 10.3.0.0 255.255.0.0 20.3.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;access-list tunnel_four extended permit ip 10.4.0.0 255.255.0.0 20.4.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; class-map Tunnel_Policy1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-list tunnel_one&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp; class-map Tunnel_Policy2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-list tunnel_two&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp; class-map Tunnel_Policy3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-list tunnel_three&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp; class-map Tunnel_Policy4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-list tunnel_four&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; &lt;SPAN style="font-family: calibri,verdana,arial,sans-serif; font-size: 8pt;"&gt;policy-map tunnel_traffic_limit&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class Tunnel_Policy1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; police output 4096000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp; policy-map tunnel_traffic_limit&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class Tunnel_Policy2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; police output 5734400&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp; policy-map tunnel_traffic_limit&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class Tunnel_Policy3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; police output 2457600&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp; policy-map tunnel_traffic_limit&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class Tunnel_Policy4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; police output 4915200&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;service-policy tunnel_traffic_limit interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;You might want to watch out for the following changes in values:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-cmap)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map tunnel_traffic_limit&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class Tunnel_Policy1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; police output 4096000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map tunnel_traffic_limit&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class Tunnel_Policy2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; police output 5734400&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;WARNING: police rate 5734400 not supported. Rate is changed to 5734000&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map tunnel_traffic_limit&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class Tunnel_Policy3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; police output 2457600&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;WARNING: police rate 2457600 not supported. Rate is changed to 2457500&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map tunnel_traffic_limit&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class Tunnel_Policy4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; police output 4915200&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;WARNING: police rate 4915200 not supported. Rate is changed to 4915000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: calibri,verdana,arial,sans-serif;"&gt;I believe this is because of the software granularity and the way IOS rounds it off in multiples of a certain value, so watch out for the exact values you might get finally. I used this website to calculate your Kilobyte values to Bits&lt;/SPAN&gt;: &lt;SPAN style="font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;A class="jive-link-external-small" href="http://www.matisse.net/bitcalc/" rel="nofollow"&gt;http://www.matisse.net/bitcalc/&lt;/A&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;The Final outputs of the configured values were :&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: Tunnel_Policy1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Output police Interface outside:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cir 4096000 bps, bc 128000 bytes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 packets, 0 bytes; actions:&amp;nbsp; transmit&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exceeded 0 packets, 0 bytes; actions:&amp;nbsp; drop&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 bps, exceed 0 bps&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: Tunnel_Policy2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Output police Interface outside:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cir 5734000 bps, bc 179187 bytes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 packets, 0 bytes; actions:&amp;nbsp; transmit&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exceeded 0 packets, 0 bytes; actions:&amp;nbsp; drop&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 bps, exceed 0 bps&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: Tunnel_Policy3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Output police Interface outside:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cir 2457500 bps, bc 76796 bytes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 packets, 0 bytes; actions:&amp;nbsp; transmit&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exceeded 0 packets, 0 bytes; actions:&amp;nbsp; drop&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 bps, exceed 0 bps&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: Tunnel_Policy4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Output police Interface outside:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cir 4915000 bps, bc 153593 bytes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 packets, 0 bytes; actions:&amp;nbsp; transmit&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exceeded 0 packets, 0 bytes; actions:&amp;nbsp; drop&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 bps, exceed 0 bps&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif; font-size: 8pt;"&gt;Please refer to the QOS document on CCO here for further information:&lt;/SPAN&gt; &lt;SPAN style="font-family: calibri,verdana,arial,sans-serif; font-size: 8pt;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/conns_qos.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/conns_qos.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif; font-size: 10pt;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif; font-size: 10pt;"&gt;Hope that helps.. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2012 18:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961376#M440261</guid>
      <dc:creator>pgoutham</dc:creator>
      <dc:date>2012-07-06T18:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961377#M440263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prashanth Goutham R.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your detailed reply and for allowing this out-of-scope question. Honestly, when I read "ASA" in the subject I ignored the rest. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two more questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Which SHOW command you used at the end to verify the bandwidth?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- If one peer is policing traffic and the other one is not, the one with the smallest bandwidth would set the size limit in the connection ? I am also implying that the Traffic policing does not need to be configured on both ends, correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2012 19:11:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961377#M440263</guid>
      <dc:creator>johnramz</dc:creator>
      <dc:date>2012-07-06T19:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961378#M440265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;John,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;1- Which SHOW command you used at the end to verify the bandwidth?&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG&gt;---&lt;/STRONG&gt; Command used is &lt;STRONG&gt;show service-policy police&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;2-&amp;nbsp; If one peer is policing traffic and the other one is not, the one with&amp;nbsp; the smallest bandwidth would set the size limit in the connection ? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;I am&amp;nbsp; also implying that the Traffic policing does not need to be configured&amp;nbsp; on both ends, correct?&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG&gt;---&lt;/STRONG&gt; Policing at one end should help control the limits.&lt;/SPAN&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Jul 2012 00:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961378#M440265</guid>
      <dc:creator>pgoutham</dc:creator>
      <dc:date>2012-07-07T00:12:56Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert:Configuring, Troubleshooting &amp; Best Practices on</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961379#M440266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi this is good opportunity to get good concept..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my Question is..&lt;/P&gt;&lt;P&gt;I am not able to get CA certificate by microsoft CA server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Jul 2012 08:11:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961379#M440266</guid>
      <dc:creator>gaurav bhardwaj</dc:creator>
      <dc:date>2012-07-07T08:11:38Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert:Configuring, Troubleshooting &amp; Best Practices on</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961380#M440267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Prashanth Goutham R.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for answering my questions. Very appreciated.I hope other users did benefit from your detailed/tested replies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2012 13:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961380#M440267</guid>
      <dc:creator>johnramz</dc:creator>
      <dc:date>2012-07-09T13:32:23Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert:Configuring, Troubleshooting &amp; Best Practices on</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961381#M440268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Prashanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've setup a ASA 5505 with 3 servers behind it. Riunning Exchange 2007 and RD Gateway behind NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port&amp;nbsp; 443 is opened to allow Outlook Anywhere so the Domain users can access&amp;nbsp; mail from outside the office without setting up a VPN tunnel. Also I use&amp;nbsp; the RD Gateway so the users can access their worksations in the LAN and&amp;nbsp; also the TS server (remote desktop)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This&amp;nbsp; was working with the old firewall (D-Link Netdefend) but now the users&amp;nbsp; get prompted with user/password popup from Outlook. The RD Gateway has&amp;nbsp; also stopped working only telling the users "Logon Attempt Failed". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That means that Outlook failed to access the server using NTLM auth. and need to use "basic auth" instead.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the ASA 5505 allow NTLM Passthrough? If not, what will I need to buy ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2012 14:18:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961381#M440268</guid>
      <dc:creator>johantuneld</dc:creator>
      <dc:date>2012-07-09T14:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961382#M440270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif; font-size: 10pt;"&gt;Hello Gaurav,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif; font-size: 10pt;"&gt;Apologies for the delayed response, this is a Failover discussion series on Cisco Firewalls, however ill help you to get started on the Certificate issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif; font-size: 10pt;"&gt;I am not really sure about what is the actual problem. Based on the fact that you have mentioned the ASA is unable to enroll with Microsoft CA server i would first enable the following debugs:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE style="margin: 0em;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;debug crypto ca 255&lt;/SPAN&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;PRE style="margin: 0em;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;debug crypto ca transactions 255&lt;/SPAN&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: calibri,verdana,arial,sans-serif;"&gt;I would actually start with researching on what error messages you had received while you tried to enroll and what was the procedure you used to enroll from the ASA perspective, i would also suggest that you take a packet capture to see if the CA server and the ASA are able to communicate without any network level issues.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 06:30:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961382#M440270</guid>
      <dc:creator>pgoutham</dc:creator>
      <dc:date>2012-07-10T06:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961383#M440275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;Hello Johan,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;This forum is specifically for the Failover Discussion on Cisco Firewalls, however to answer your question, Yes ASA supports NTLM Passthrough:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG style="font-size: 8pt;"&gt;The ASA supports the following Single Sign On (SSO) methods: &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG style="font-size: 8pt;"&gt; Kerberos Constrained Delegation (KCD) &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG style="font-size: 8pt;"&gt; Computer Associates Siteminder (Netegrity) &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG style="font-size: 8pt;"&gt; RSA Access Manager (ClearTrust) &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG style="font-size: 8pt;"&gt; Security Assertion Markup Language (SAML v1.1) &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG style="font-size: 8pt;"&gt; Basic/NTLM/FTP/CIFS authentication pass-through &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG style="font-size: 8pt;"&gt; Forms-based authentication pass-through;HTTP-POST via variable substitution (macros) &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;STRONG style="font-size: 8pt; font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/product_data_sheet0900aecd80402e3f.html" rel="nofollow"&gt;http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/product_data_sheet0900aecd80402e3f.html&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt; &lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: calibri,verdana,arial,sans-serif;"&gt;Do let me know what troubleshooting you have done so far... Hope that helps.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 08:15:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961383#M440275</guid>
      <dc:creator>pgoutham</dc:creator>
      <dc:date>2012-07-10T08:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961384#M440278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I can read on the provided URL those auth methods is supported on the &lt;STRONG&gt;&lt;EM&gt;"Single sign-on (SSO) for clientless SSL VPN users"&lt;/EM&gt;&lt;/STRONG&gt; section...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I am not talking about building any VPN solution.&lt;/P&gt;&lt;P&gt;But can that be the issue? That the ASA is picking up the NTLM for the VPN? Not possible to disable the VPN feature somehow?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Troubleshoting done:&lt;/P&gt;&lt;P&gt;With D-Lnk it works. With Cisco it doesn't.&lt;/P&gt;&lt;P&gt;(Both devices redirects the TCP 443 to the internal IP of the server. Nothing else done)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 08:38:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961384#M440278</guid>
      <dc:creator>johantuneld</dc:creator>
      <dc:date>2012-07-10T08:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert:Configuring, Troubleshooting &amp; Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961385#M440280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jonan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you indicate "Port&amp;nbsp; 443 is opened " the Cisco ASA do NOT inspect this particular SSL port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you check the output of the following cli command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp "internetsourceipaddress" 44444 "exchangeserveripaddress" 443 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show service-policy flow tcp host "internetsourceipaddress" host "exchangeserveripaddress" eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show service-policy &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 09:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-troubleshooting-amp-best-practices-on/m-p/1961385#M440280</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2012-07-10T09:08:25Z</dc:date>
    </item>
  </channel>
</rss>

