<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 QoS latency... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-qos-latency/m-p/1659040#M557789</link>
    <description>&lt;P&gt;I am working with a single T1 connection, and I have configured policing rules to police any user at 500000. This seems to be working well, the problem is that whenever something is being downloaded, latency is terrible, even though I am watching the ASDM bandwidth graph and it appears to be limiting the connection to 500000!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This causes problems because we have a lot of workstations that access a remote network through an ipsec tunnel using both RDP and 2X connections, and it is very noticiable when something is being downloaded/uploaded to the internet. . I've added those ports as priority, but it doesn't seem to help. Is the problem that we just need more bandwidth, or would shaping help?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Here is the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_mpc extended permit ip any any time-range Daily_0600-1900&lt;BR /&gt;access-list outside_mpc_3 extended permit tcp any 192.168.50.0 255.255.255.0 eq www&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;class-map rdp-priority&lt;BR /&gt; match port tcp eq 3389&lt;BR /&gt; class-map 2X-80-priority&lt;BR /&gt; match access-list outside_mpc_3&lt;BR /&gt;class-map outside-class&lt;BR /&gt; match access-list outside_mpc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map outside-policy&lt;BR /&gt; class rdp-priority&lt;BR /&gt;&amp;nbsp; priority&lt;BR /&gt; class 2X-80-priority&lt;BR /&gt;&amp;nbsp; priority&lt;BR /&gt; class outside-class&lt;BR /&gt;&amp;nbsp; police input 500000 1500&lt;BR /&gt;&amp;nbsp; police output 500000 1500&lt;BR /&gt;policy-map global-policy&lt;BR /&gt; class netflow&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination exchange&lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;service-policy outside-policy interface outside&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 20:21:31 GMT</pubDate>
    <dc:creator>Dustin Barnett</dc:creator>
    <dc:date>2019-03-11T20:21:31Z</dc:date>
    <item>
      <title>ASA 5505 QoS latency...</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-qos-latency/m-p/1659040#M557789</link>
      <description>&lt;P&gt;I am working with a single T1 connection, and I have configured policing rules to police any user at 500000. This seems to be working well, the problem is that whenever something is being downloaded, latency is terrible, even though I am watching the ASDM bandwidth graph and it appears to be limiting the connection to 500000!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This causes problems because we have a lot of workstations that access a remote network through an ipsec tunnel using both RDP and 2X connections, and it is very noticiable when something is being downloaded/uploaded to the internet. . I've added those ports as priority, but it doesn't seem to help. Is the problem that we just need more bandwidth, or would shaping help?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Here is the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_mpc extended permit ip any any time-range Daily_0600-1900&lt;BR /&gt;access-list outside_mpc_3 extended permit tcp any 192.168.50.0 255.255.255.0 eq www&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;class-map rdp-priority&lt;BR /&gt; match port tcp eq 3389&lt;BR /&gt; class-map 2X-80-priority&lt;BR /&gt; match access-list outside_mpc_3&lt;BR /&gt;class-map outside-class&lt;BR /&gt; match access-list outside_mpc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map outside-policy&lt;BR /&gt; class rdp-priority&lt;BR /&gt;&amp;nbsp; priority&lt;BR /&gt; class 2X-80-priority&lt;BR /&gt;&amp;nbsp; priority&lt;BR /&gt; class outside-class&lt;BR /&gt;&amp;nbsp; police input 500000 1500&lt;BR /&gt;&amp;nbsp; police output 500000 1500&lt;BR /&gt;policy-map global-policy&lt;BR /&gt; class netflow&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination exchange&lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;service-policy outside-policy interface outside&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:21:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-qos-latency/m-p/1659040#M557789</guid>
      <dc:creator>Dustin Barnett</dc:creator>
      <dc:date>2019-03-11T20:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 QoS latency...</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-qos-latency/m-p/1659041#M557791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dustin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all I would monitor if you latency is related to drops in QoS or come for a different place (an example you would be ingress buffer on physical interface filling up).&lt;/P&gt;&lt;P&gt;Monitoring "show service-policy" during high drop period would be the way to go. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would suggest overall is not to police by use traffic shaping (hierarchical QoS) &lt;/P&gt;&lt;P&gt;An example is here:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/conns_qos.html#wp1074879"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/conns_qos.html#wp1074879&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Which should be more appropriate in your scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the parameters to use, well there will be a bit of experimenting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Apr 2011 15:19:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-qos-latency/m-p/1659041#M557791</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2011-04-16T15:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 QoS latency...</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-qos-latency/m-p/1659042#M557792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, I'll look into traffic shaping and go from there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Apr 2011 18:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-qos-latency/m-p/1659042#M557792</guid>
      <dc:creator>Dustin Barnett</dc:creator>
      <dc:date>2011-04-18T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 QoS latency...</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-qos-latency/m-p/1659043#M557794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marcin,&lt;/P&gt;&lt;P&gt;I have been reading about hierarchical priority queuing, and I've noticed that IPsec over TCP is not supported. What will this mean, since we have an IPsec tunnel that we want to give traffic priority on?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Apr 2011 15:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-qos-latency/m-p/1659043#M557794</guid>
      <dc:creator>Dustin Barnett</dc:creator>
      <dc:date>2011-04-19T15:45:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 QoS latency...</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-qos-latency/m-p/1659044#M557795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dustin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well indeed option are slim as far as CLASSIFICATION goes, you cannot do anything decent to IPsec over TCP (but that's a rare deployment, are you actually using it? cTCP or Transport - IPsec over TCP it's called).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first restriction is specifying this option "&lt;EM&gt;&lt;SPAN class="cExBold"&gt;match tunnel-group Tunnel-Group-1&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will either need to perform DSCP tagging/coloring before traffic gets into the tunnel or not use shaping if you need to police inside the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What could otherwise work for you is a combination of traffic shaping and policing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Defining traffic including traffic over FAKE_VPN tunnel.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;class-map VOIP&lt;BR /&gt; match rtp 16384 16383&lt;BR /&gt;class-map FAKE_VPN&lt;BR /&gt; match flow ip destination-address&lt;BR /&gt; match tunnel-group FAKE_VPN&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now creating child policy for VOIP.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;policy-map VOIP&lt;BR /&gt; class VOIP&lt;BR /&gt;&amp;nbsp; priority&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And applying it into the big policy like so.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;policy-map MIXED_POLICY&lt;BR /&gt; class FAKE_VPN&lt;BR /&gt;&amp;nbsp; police output 512000&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; shape average 1024000&lt;BR /&gt;&amp;nbsp; service-policy VOIP&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And than of course:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;service-policy MIXED_POLICY interface outside&lt;/P&gt;&lt;P&gt;priority-queue outside&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just a thought &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Apr 2011 17:18:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-qos-latency/m-p/1659044#M557795</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2011-04-19T17:18:48Z</dc:date>
    </item>
  </channel>
</rss>

