<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA policing issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629913#M591606</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to see your reply. I will appreciate if you mark this question as answered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Feb 2011 12:45:55 GMT</pubDate>
    <dc:creator>PAUL GILBERT ARIAS</dc:creator>
    <dc:date>2011-02-17T12:45:55Z</dc:date>
    <item>
      <title>ASA policing issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629906#M591599</link>
      <description>&lt;P&gt;Dear friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a requirement for a wireless guest subnet to be policed to 600 kbps while sending traffic to Internet.&lt;/P&gt;&lt;P&gt;The wireless guest subnet is 172.20.50.0/24 and is connected to inside interface of ASA.&lt;/P&gt;&lt;P&gt;A point to note is that this subnet is nat'ed out to ASA public interface. So the ASCII diagram would be:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PAT&lt;/P&gt;&lt;P&gt;192.168.50.0/24 --------------&amp;gt;ASA---------------&amp;gt;Internet &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list wl-guest extended permit ip host 192.168.50.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;class-map wireless&lt;/P&gt;&lt;P&gt;match access-list wl-guest&lt;/P&gt;&lt;P&gt;policy-map my-policy&lt;/P&gt;&lt;P&gt;class wireless&lt;/P&gt;&lt;P&gt;police input 600000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy my-policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A few points:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Since i am nating, i am applying the policy to inside interface. I am not applying the policy to outside interface because that would probably match to the nat'ed ip, not the real ip.&lt;/P&gt;&lt;P&gt;2. I am saying police input. But i am wondering if police output is right? Examples always show that Internet destined traffic is policed using police output on outside interface.&lt;/P&gt;&lt;P&gt;3. I am not trying to control bandwidth inbound because i guess it is not possible? Because by the time traffic reaches the outside interface of ASA, it has consumed the bandwidth of the link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone have a look and tell me if the above config is right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;Gautam&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629906#M591599</guid>
      <dc:creator>gautamzone</dc:creator>
      <dc:date>2019-03-11T19:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA policing issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629907#M591600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your configuration looks perfect. It should work correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to share to you my running QoS config for my GUEST users. It is a little different but works great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;TITLE&gt;&lt;/TITLE&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p2"&gt;access-list GUEST extended permit ip any 172.16.138.0 255.255.255.0&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p2"&gt;class-map GUEST&lt;/P&gt;&lt;P class="p2"&gt; match access-list GUEST&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p2"&gt;policy-map global_policy&lt;/P&gt;&lt;P class="p2"&gt; class GUEST&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp; police output 512000&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p2"&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Feb 2011 13:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629907#M591600</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-16T13:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA policing issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629908#M591601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your kind advise.&lt;/P&gt;&lt;P&gt;In your case,&amp;nbsp; i believe you are not nating/pating 172.16.138.0 subnet?&lt;/P&gt;&lt;P&gt;And i think that you are trying to police traffic destined to the 172.16.138.0 subnet, not sourced from the 172.16.138.0 subnet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;Gautam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Feb 2011 14:08:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629908#M591601</guid>
      <dc:creator>gautamzone</dc:creator>
      <dc:date>2011-02-16T14:08:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA policing issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629909#M591602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am doing NAT, in my case my configuration is not the best one because I am applying the police for the returning traffic. It is a waste of resorces but that is just the way I originally made and never fixed it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your configuration is the correct config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both configs will work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Feb 2011 14:28:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629909#M591602</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-16T14:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA policing issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629910#M591603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your quick clarification.&lt;/P&gt;&lt;P&gt;Just wanted to make sure that i understand this correctly. Please correct me if i am wrong:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Police input on inside interface means policing traffic when it enters the inside interface. This policed traffic can be either DMZ or outside destined traffic. Right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Police output on inside interface means policing traffic as it exits inside interface and either goes out to DMZ or outside. Right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One last question: Does outbound / inbound policing on global or outside interface happen on pre-nat addresses or post-nat addresses?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;Gautam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Feb 2011 14:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629910#M591603</guid>
      <dc:creator>gautamzone</dc:creator>
      <dc:date>2011-02-16T14:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA policing issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629911#M591604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the answer to the first to questions is yes. You are correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On my case I have the configuration applied globally and when you do a show service-policy it shows the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Class-map: GUEST&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Output police Interface outside:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cir 512000 bps, bc 16000 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 packets, 0 bytes; actions:&amp;nbsp; transmit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exceeded 0 packets, 0 bytes; actions:&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 bps, exceed 0 bps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Output police Interface inside:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cir 512000 bps, bc 16000 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 126893 packets, 82726717 bytes; actions:&amp;nbsp; transmit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exceeded 3722 packets, 4670407 bytes; actions:&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 456 bps, exceed 24 bps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Output police Interface internet:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cir 512000 bps, bc 16000 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 packets, 0 bytes; actions:&amp;nbsp; transmit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exceeded 0 packets, 0 bytes; actions:&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conformed 0 bps, exceed 0 bps&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;My police is applied outbound so it will apply that police to all interfaces going out. Since my ACL has the source ANY and destination the Guest subnet it is doing the police on the inside interface going out.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;If you want it to do outbound police on the outside interface it will happen Post NAT that is what I wanted to apply it on the inside interface.&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Feb 2011 15:00:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629911#M591604</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-16T15:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA policing issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629912#M591605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for the clarification.&lt;/P&gt;&lt;P&gt;Your answers were very clear and helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;Gautam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2011 05:51:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629912#M591605</guid>
      <dc:creator>gautamzone</dc:creator>
      <dc:date>2011-02-17T05:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA policing issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629913#M591606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to see your reply. I will appreciate if you mark this question as answered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2011 12:45:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policing-issue/m-p/1629913#M591606</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-17T12:45:55Z</dc:date>
    </item>
  </channel>
</rss>

