<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic Rate Limiting on Cisco ASA 5510? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557036#M658230</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA config is below and bandwith limit is 512/512 kbit/s. With any&amp;nbsp; combination using policy on outside/inside interface and input/output&amp;nbsp; (single or both) it doesn't work? Any suggestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-style: italic;"&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;BR /&gt;hostname&amp;nbsp; ASAfirewall&lt;BR /&gt;enable password jbzGGb3hW4EV5FGM encrypted&lt;BR /&gt;passwd&amp;nbsp; 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.1.101.0 LAN description&amp;nbsp; VlanPC&lt;BR /&gt;name 10.1.100.0 Switches description Switches&lt;BR /&gt;name&amp;nbsp; 10.1.103.0 WirelessPrivate description WirelesusersPrivate&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet0/0&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet0/0.1&lt;BR /&gt; vlan 51&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 94.247.XXX.XXX 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet0/1.1&lt;BR /&gt; vlan 110&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.1.1 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip&amp;nbsp; address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;banner exec * WARNING *&lt;BR /&gt;banner exec IF YOU&amp;nbsp; ARE NOT AUTHORISED TO ACCESS THIS SYSTEM EXIT IMMEDIATELY!&lt;BR /&gt;boot&amp;nbsp; system disk0:/asa822-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock&amp;nbsp; summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns&amp;nbsp; domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup&amp;nbsp; management&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic&amp;nbsp; permit intra-interface&lt;BR /&gt;object-group network Lan&lt;BR /&gt; description VLAN&amp;nbsp; PC &lt;BR /&gt;object-group network NETWORK_OBJ_192.168.100.0_25&lt;BR /&gt;object-group&amp;nbsp; network PCtoNetGroup&lt;BR /&gt;object-group network Net&lt;BR /&gt;access-list 101&amp;nbsp; extended permit icmp any any echo &lt;BR /&gt;access-list 101 extended permit&amp;nbsp; icmp any any unreachable &lt;BR /&gt;access-list 101 extended permit icmp any&amp;nbsp; any time-exceeded &lt;BR /&gt;access-list 101 extended permit icmp any any&amp;nbsp; source-quench &lt;BR /&gt;access-list 101 extended permit icmp any any &lt;BR /&gt;access-list&amp;nbsp; clinical_splitTunnelAcl standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; NetAccess extended permit ip host 10.1.101.5 any &lt;BR /&gt;access-list&amp;nbsp; NetAccess extended permit ip host 10.1.101.30 any &lt;BR /&gt;access-list&amp;nbsp; NetAccess extended permit ip WirelessPrivate 255.255.255.0 any &lt;BR /&gt;access-list&amp;nbsp; NetAccess extended deny ip any any &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl standard permit Switches 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl_1 standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl_2 standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl_5 standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl_3 standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl_4 standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; inside_nat0_outbound extended permit ip LAN 255.255.255.0 192.168.100.0&amp;nbsp; 255.255.255.128 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip&amp;nbsp; Switches 255.255.255.0 192.168.100.0 255.255.255.128 &lt;BR /&gt;access-list&amp;nbsp; inside_nat0_outbound extended permit ip 10.1.1.0 255.255.255.252&amp;nbsp; 192.168.100.0 255.255.255.128 &lt;BR /&gt;access-list rate-limit-wireless&amp;nbsp; extended permit ip WirelessPrivate 255.255.255.0 interface outside &lt;BR /&gt;pager&amp;nbsp; lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside&amp;nbsp; 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool VPNpool&amp;nbsp; 192.168.100.1-192.168.100.100 mask 255.255.255.0&lt;BR /&gt;icmp unreachable&amp;nbsp; rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any&amp;nbsp; inside&lt;BR /&gt;asdm image disk0:/asdm-631.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp&amp;nbsp; timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0&amp;nbsp; access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 LAN 255.255.255.0&lt;BR /&gt;nat&amp;nbsp; (inside) 1 WirelessPrivate 255.255.255.0&lt;BR /&gt;access-group 101 in&amp;nbsp; interface outside&lt;BR /&gt;access-group NetAccess in interface inside&lt;BR /&gt;route&amp;nbsp; outside 0.0.0.0 0.0.0.0 94.247.XXX.XXX 1&lt;BR /&gt;route inside Switches&amp;nbsp; 255.255.255.0 10.1.1.2 1&lt;BR /&gt;route inside LAN 255.255.255.0 10.1.1.2 1&lt;BR /&gt;route&amp;nbsp; inside WirelessPrivate 255.255.255.0 10.1.1.2 1&lt;BR /&gt;timeout xlate&amp;nbsp; 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp&amp;nbsp; 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&amp;nbsp; mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite&amp;nbsp; 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00&amp;nbsp; uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record&amp;nbsp; DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http&amp;nbsp; LAN 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no&amp;nbsp; snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable&amp;nbsp; traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set RA-TS esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set&amp;nbsp; ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec&amp;nbsp; security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map&amp;nbsp; DYN_MAP 10 set transform-set RA-TS&lt;BR /&gt;crypto dynamic-map&amp;nbsp; SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map&amp;nbsp; SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA&amp;nbsp; ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA&amp;nbsp; ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto&amp;nbsp; map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto&amp;nbsp; map outside_map interface outside&lt;BR /&gt;crypto isakmp identity hostname &lt;BR /&gt;crypto&amp;nbsp; isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication&amp;nbsp; pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime&amp;nbsp; 86400&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;telnet LAN 255.255.255.0&amp;nbsp; inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd&amp;nbsp; address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection&amp;nbsp; basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection&amp;nbsp; statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt;group-policy VPNclinical internal&lt;BR /&gt;group-policy&amp;nbsp; VPNclinical attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value&amp;nbsp; VPNclinical_splitTunnelAcl&lt;BR /&gt;group-policy VPNclients internal&lt;BR /&gt;group-policy&amp;nbsp; VPNclients attributes&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; webvpn&lt;BR /&gt; url-list none&lt;BR /&gt;username xxxx password DyDq4NEbqGjfIfWL encrypted&amp;nbsp; privilege 15&lt;BR /&gt;username yyyy password GQ6EDJEzerx065iq encrypted&amp;nbsp; privilege 15&lt;BR /&gt;username zzzz password KCW0Chtpty2A/5kt encrypted&lt;BR /&gt;username&amp;nbsp; wwww password APYksyyt89fKLVDC encrypted privilege 15&lt;BR /&gt;tunnel-group&amp;nbsp; VPNclinical type remote-access&lt;BR /&gt;tunnel-group VPNclinical&amp;nbsp; general-attributes&lt;BR /&gt; address-pool VPNpool&lt;BR /&gt; default-group-policy&amp;nbsp; VPNclinical&lt;BR /&gt;tunnel-group VPNclinical ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group VPNclients type remote-access&lt;BR /&gt;tunnel-group&amp;nbsp; VPNclients general-attributes&lt;BR /&gt; default-group-policy VPNclients&lt;BR /&gt;!&lt;BR /&gt;class-map&amp;nbsp; rate-limit&lt;BR /&gt; match access-list rate-limit-wireless&lt;BR /&gt;class-map&amp;nbsp; inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map&amp;nbsp; global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect&amp;nbsp; rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny&amp;nbsp; &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip&amp;nbsp; &lt;BR /&gt; inspect&amp;nbsp; netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect icmp &lt;BR /&gt; inspect ip-options &lt;BR /&gt;policy-map&amp;nbsp; limit-policy&lt;BR /&gt; class rate-limit&lt;BR /&gt; police input 512000 96000&lt;BR /&gt; police output 512000 96000&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy&amp;nbsp; limit-policy interface inside&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt; no active&lt;BR /&gt; destination address http &lt;!-- m --&gt;&lt;A class="postlink" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/odd&amp;nbsp; ... DCEService&lt;/A&gt;&lt;!-- m --&gt;&lt;BR /&gt; destination address email &lt;!-- e --&gt;&lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;!-- e --&gt;&lt;BR /&gt; destination transport-method http&lt;BR /&gt; subscribe-to-alert-group&amp;nbsp; diagnostic&lt;BR /&gt; subscribe-to-alert-group environment&lt;BR /&gt; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:06dee49ed404601c3f296eeb8c691bb2&lt;BR /&gt;:&amp;nbsp; end&lt;BR /&gt;asdm image disk0:/asdm-631.bin&lt;BR /&gt;asdm location LAN&amp;nbsp; 255.255.255.0 inside&lt;BR /&gt;asdm location Switches 255.255.255.0 inside&lt;BR /&gt;asdm&amp;nbsp; location WirelessPrivate 255.255.255.0 inside&lt;BR /&gt;no asdm history enable&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Sep 2010 19:45:14 GMT</pubDate>
    <dc:creator>DejanMilicevic</dc:creator>
    <dc:date>2010-09-08T19:45:14Z</dc:date>
    <item>
      <title>Traffic Rate Limiting on Cisco ASA 5510?</title>
      <link>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557033#M658190</link>
      <description>&lt;P&gt;We have internet bandwidth 4/4 Mbps on outside interface. To inside&amp;nbsp; interface are coming few internal network. How to limit internet&amp;nbsp; bandwith usage for let's say 10.1.103.0/24 network to use 100/100 kbps.&amp;nbsp; We tried as shown below but without luck. If we create subinterfaces for&amp;nbsp; each vlan, we can apply policy on interfaces and that's working, but&amp;nbsp; now we must do that ont few internal networks coming to ASA on inside&amp;nbsp; interface.&lt;/P&gt;&lt;P&gt;Are we apply traffic shaping (&lt;EM&gt;limit the flow of traffic&lt;/EM&gt;) or traffic policing (&lt;EM&gt;traffic that exceeds the speed limit on the interface is dropped)&lt;/EM&gt; and what&lt;EM&gt; &lt;/EM&gt;about burst&lt;EM&gt; &lt;BR /&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;size? What is policing output and input? Why isn't this working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 10.1.103.0 WirelessPrivate description WirelesusersPrivate&lt;/P&gt;&lt;P&gt;access-list rate-limit-wireless extended permit ip WirelessPrivate 255.255.255.0 interface outside&lt;/P&gt;&lt;P&gt;class-map rate-limit&lt;BR /&gt;&amp;nbsp; match access-list rate-limit-wireless&lt;/P&gt;&lt;P&gt;policy-map limit-policy&lt;BR /&gt;&amp;nbsp; class rate-limit&lt;BR /&gt;&amp;nbsp;&amp;nbsp; police output 100000 8000&lt;BR /&gt;&amp;nbsp;&amp;nbsp; police input 100000 8000&lt;/P&gt;&lt;P&gt;service-policy limit-policy interface outside&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557033#M658190</guid>
      <dc:creator>DejanMilicevic</dc:creator>
      <dc:date>2019-03-11T18:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Rate Limiting on Cisco ASA 5510?</title>
      <link>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557034#M658204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dejan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at this link--it describes the differences between the various QoS options and provides config examples for each scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1230"&gt;https://supportforums.cisco.com/docs/DOC-1230&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Sep 2010 13:35:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557034#M658204</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-09-07T13:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Rate Limiting on Cisco ASA 5510?</title>
      <link>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557035#M658209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dejan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This configuration will not work as the rate limiting is not bidirectional and the other thing it should be configured on your inside interface but in your case you have rate limiting configured it on your outside&amp;nbsp; interface. If you want this to enable on your all the interface then apply service policy onto global . So that this way the policy map will be applied to all the interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To activate the policy map on one or more interfaces, enter the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;hostname(config)# service-policy policymap_name {global | interface interface_name}&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Where global applies the policy map to all interfaces, and interface applies the policy to one interface. Only one global policy is allowed. Interface service policies take precedence over the global service policy for a given feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, if you have a global policy with inspections, and an interface policy with TCP normalization, then both inspections and TCP normalization are applied to the interface. However, if you have a global policy with inspections, and an interface policy with inspections, then only the interface policy inspections are applied to that interface.&lt;/P&gt;&lt;P&gt;With the new modular policy framework (MPF) introduced in ASA versions 7.x and 8.x, the firewall administrator is now able to apply policing and rate limiting to traffic passing through the ASA appliance. I got a few questions from people how this functionality works and decided to throw in a quick example below which you can easily modify accordingly to match your needs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Scenario&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;We want to rate limit a local internal host when accessing a specific external public server. The local host is 192.168.1.10 and the external public server is 100.100.100.1. We need to limit the traffic to 100kbps and burst size 8000.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration Snippet:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config)#access-list rate-limit-acl extended permit ip host 192.168.1.10 host 100.100.100.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config)#class-map rate-limit&lt;BR /&gt;ASA(config-cmap)#match access-list rate-limit-acl&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config)#policy-map limit-policy&lt;BR /&gt;ASA(config-pmap)#class rate-limit&lt;BR /&gt;ASA(config-pmap-c)#police output 100000 8000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config)#service-policy limit-policy interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For detail in this regard Kindly go through the following referencce page for all the configuration related information for Bandwidth Management(Rate Limit) Using QoS Policies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a008084de0c.shtml#rate"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a008084de0c.shtml#rate&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For configuring the rate limits through ASDM kindly go through the following link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://flylib.com/books.php?ln=en&amp;amp;n=2&amp;amp;p=464&amp;amp;c=186&amp;amp;p1=1&amp;amp;c1=1&amp;amp;c2=231&amp;amp;view=1"&gt;http://flylib.com/books.php?ln=en&amp;amp;n=2&amp;amp;p=464&amp;amp;c=186&amp;amp;p1=1&amp;amp;c1=1&amp;amp;c2=231&amp;amp;view=1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Cisco ASA 8.x find th following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www1.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_qos.html"&gt;http://www1.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_qos.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www1.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_qos.html#wp1075478"&gt;http://www1.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_qos.html#wp1075478&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sachin Garg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: sachinga.hcl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: sachinga.hcl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Sep 2010 16:17:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557035#M658209</guid>
      <dc:creator>sachinga.hcl</dc:creator>
      <dc:date>2010-09-07T16:17:21Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Rate Limiting on Cisco ASA 5510?</title>
      <link>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557036#M658230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA config is below and bandwith limit is 512/512 kbit/s. With any&amp;nbsp; combination using policy on outside/inside interface and input/output&amp;nbsp; (single or both) it doesn't work? Any suggestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-style: italic;"&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;BR /&gt;hostname&amp;nbsp; ASAfirewall&lt;BR /&gt;enable password jbzGGb3hW4EV5FGM encrypted&lt;BR /&gt;passwd&amp;nbsp; 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.1.101.0 LAN description&amp;nbsp; VlanPC&lt;BR /&gt;name 10.1.100.0 Switches description Switches&lt;BR /&gt;name&amp;nbsp; 10.1.103.0 WirelessPrivate description WirelesusersPrivate&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet0/0&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet0/0.1&lt;BR /&gt; vlan 51&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 94.247.XXX.XXX 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet0/1.1&lt;BR /&gt; vlan 110&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.1.1 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip&amp;nbsp; address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;banner exec * WARNING *&lt;BR /&gt;banner exec IF YOU&amp;nbsp; ARE NOT AUTHORISED TO ACCESS THIS SYSTEM EXIT IMMEDIATELY!&lt;BR /&gt;boot&amp;nbsp; system disk0:/asa822-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock&amp;nbsp; summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns&amp;nbsp; domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup&amp;nbsp; management&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic&amp;nbsp; permit intra-interface&lt;BR /&gt;object-group network Lan&lt;BR /&gt; description VLAN&amp;nbsp; PC &lt;BR /&gt;object-group network NETWORK_OBJ_192.168.100.0_25&lt;BR /&gt;object-group&amp;nbsp; network PCtoNetGroup&lt;BR /&gt;object-group network Net&lt;BR /&gt;access-list 101&amp;nbsp; extended permit icmp any any echo &lt;BR /&gt;access-list 101 extended permit&amp;nbsp; icmp any any unreachable &lt;BR /&gt;access-list 101 extended permit icmp any&amp;nbsp; any time-exceeded &lt;BR /&gt;access-list 101 extended permit icmp any any&amp;nbsp; source-quench &lt;BR /&gt;access-list 101 extended permit icmp any any &lt;BR /&gt;access-list&amp;nbsp; clinical_splitTunnelAcl standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; NetAccess extended permit ip host 10.1.101.5 any &lt;BR /&gt;access-list&amp;nbsp; NetAccess extended permit ip host 10.1.101.30 any &lt;BR /&gt;access-list&amp;nbsp; NetAccess extended permit ip WirelessPrivate 255.255.255.0 any &lt;BR /&gt;access-list&amp;nbsp; NetAccess extended deny ip any any &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl standard permit Switches 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl_1 standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl_2 standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl_5 standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl_3 standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; VPNclinical_splitTunnelAcl_4 standard permit LAN 255.255.255.0 &lt;BR /&gt;access-list&amp;nbsp; inside_nat0_outbound extended permit ip LAN 255.255.255.0 192.168.100.0&amp;nbsp; 255.255.255.128 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip&amp;nbsp; Switches 255.255.255.0 192.168.100.0 255.255.255.128 &lt;BR /&gt;access-list&amp;nbsp; inside_nat0_outbound extended permit ip 10.1.1.0 255.255.255.252&amp;nbsp; 192.168.100.0 255.255.255.128 &lt;BR /&gt;access-list rate-limit-wireless&amp;nbsp; extended permit ip WirelessPrivate 255.255.255.0 interface outside &lt;BR /&gt;pager&amp;nbsp; lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside&amp;nbsp; 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool VPNpool&amp;nbsp; 192.168.100.1-192.168.100.100 mask 255.255.255.0&lt;BR /&gt;icmp unreachable&amp;nbsp; rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any&amp;nbsp; inside&lt;BR /&gt;asdm image disk0:/asdm-631.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp&amp;nbsp; timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0&amp;nbsp; access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 LAN 255.255.255.0&lt;BR /&gt;nat&amp;nbsp; (inside) 1 WirelessPrivate 255.255.255.0&lt;BR /&gt;access-group 101 in&amp;nbsp; interface outside&lt;BR /&gt;access-group NetAccess in interface inside&lt;BR /&gt;route&amp;nbsp; outside 0.0.0.0 0.0.0.0 94.247.XXX.XXX 1&lt;BR /&gt;route inside Switches&amp;nbsp; 255.255.255.0 10.1.1.2 1&lt;BR /&gt;route inside LAN 255.255.255.0 10.1.1.2 1&lt;BR /&gt;route&amp;nbsp; inside WirelessPrivate 255.255.255.0 10.1.1.2 1&lt;BR /&gt;timeout xlate&amp;nbsp; 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp&amp;nbsp; 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&amp;nbsp; mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite&amp;nbsp; 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00&amp;nbsp; uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record&amp;nbsp; DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http&amp;nbsp; LAN 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no&amp;nbsp; snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable&amp;nbsp; traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; transform-set RA-TS esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set&amp;nbsp; ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec&amp;nbsp; security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec&amp;nbsp; security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map&amp;nbsp; DYN_MAP 10 set transform-set RA-TS&lt;BR /&gt;crypto dynamic-map&amp;nbsp; SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map&amp;nbsp; SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA&amp;nbsp; ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA&amp;nbsp; ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto&amp;nbsp; map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto&amp;nbsp; map outside_map interface outside&lt;BR /&gt;crypto isakmp identity hostname &lt;BR /&gt;crypto&amp;nbsp; isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication&amp;nbsp; pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime&amp;nbsp; 86400&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;telnet LAN 255.255.255.0&amp;nbsp; inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd&amp;nbsp; address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection&amp;nbsp; basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection&amp;nbsp; statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt;group-policy VPNclinical internal&lt;BR /&gt;group-policy&amp;nbsp; VPNclinical attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value&amp;nbsp; VPNclinical_splitTunnelAcl&lt;BR /&gt;group-policy VPNclients internal&lt;BR /&gt;group-policy&amp;nbsp; VPNclients attributes&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; webvpn&lt;BR /&gt; url-list none&lt;BR /&gt;username xxxx password DyDq4NEbqGjfIfWL encrypted&amp;nbsp; privilege 15&lt;BR /&gt;username yyyy password GQ6EDJEzerx065iq encrypted&amp;nbsp; privilege 15&lt;BR /&gt;username zzzz password KCW0Chtpty2A/5kt encrypted&lt;BR /&gt;username&amp;nbsp; wwww password APYksyyt89fKLVDC encrypted privilege 15&lt;BR /&gt;tunnel-group&amp;nbsp; VPNclinical type remote-access&lt;BR /&gt;tunnel-group VPNclinical&amp;nbsp; general-attributes&lt;BR /&gt; address-pool VPNpool&lt;BR /&gt; default-group-policy&amp;nbsp; VPNclinical&lt;BR /&gt;tunnel-group VPNclinical ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group VPNclients type remote-access&lt;BR /&gt;tunnel-group&amp;nbsp; VPNclients general-attributes&lt;BR /&gt; default-group-policy VPNclients&lt;BR /&gt;!&lt;BR /&gt;class-map&amp;nbsp; rate-limit&lt;BR /&gt; match access-list rate-limit-wireless&lt;BR /&gt;class-map&amp;nbsp; inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map&amp;nbsp; global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect&amp;nbsp; rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny&amp;nbsp; &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip&amp;nbsp; &lt;BR /&gt; inspect&amp;nbsp; netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect icmp &lt;BR /&gt; inspect ip-options &lt;BR /&gt;policy-map&amp;nbsp; limit-policy&lt;BR /&gt; class rate-limit&lt;BR /&gt; police input 512000 96000&lt;BR /&gt; police output 512000 96000&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy&amp;nbsp; limit-policy interface inside&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt; no active&lt;BR /&gt; destination address http &lt;!-- m --&gt;&lt;A class="postlink" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/odd&amp;nbsp; ... DCEService&lt;/A&gt;&lt;!-- m --&gt;&lt;BR /&gt; destination address email &lt;!-- e --&gt;&lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;!-- e --&gt;&lt;BR /&gt; destination transport-method http&lt;BR /&gt; subscribe-to-alert-group&amp;nbsp; diagnostic&lt;BR /&gt; subscribe-to-alert-group environment&lt;BR /&gt; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:06dee49ed404601c3f296eeb8c691bb2&lt;BR /&gt;:&amp;nbsp; end&lt;BR /&gt;asdm image disk0:/asdm-631.bin&lt;BR /&gt;asdm location LAN&amp;nbsp; 255.255.255.0 inside&lt;BR /&gt;asdm location Switches 255.255.255.0 inside&lt;BR /&gt;asdm&amp;nbsp; location WirelessPrivate 255.255.255.0 inside&lt;BR /&gt;no asdm history enable&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Sep 2010 19:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557036#M658230</guid>
      <dc:creator>DejanMilicevic</dc:creator>
      <dc:date>2010-09-08T19:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Rate Limiting on Cisco ASA 5510?</title>
      <link>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557037#M658242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;WHat if you do a show policy-map interface inside?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You ACL - are you sure that this is correct?? I think it should be the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-style: italic;"&gt;access-list rate-limit-wireless&amp;nbsp; extended permit ip WirelessPrivate 255.255.255.0 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only have 4mb on your internet facing connection, I would apply the following outbound on the outside (assuming that the &lt;SPAN style="font-style: italic;"&gt;rate-limit-wireless&amp;nbsp; ACL is correct)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map wireless&lt;BR /&gt;match access-list rate-limit-wireless&lt;BR /&gt;!&lt;BR /&gt;policy-map wireless&lt;BR /&gt;class wireless&lt;BR /&gt; police 512000&lt;BR /&gt; &lt;BR /&gt;!&lt;BR /&gt;policy-map qos&lt;BR /&gt; class class-default&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; shape average 4000000 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy wireless&lt;BR /&gt;!&lt;BR /&gt;service-policy qos interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Sep 2010 22:06:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557037#M658242</guid>
      <dc:creator>golly_wog</dc:creator>
      <dc:date>2010-09-08T22:06:08Z</dc:date>
    </item>
    <item>
      <title>I have 4 public addresses</title>
      <link>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557038#M658257</link>
      <description>&lt;P&gt;I have 4 public addresses with 8 Mbps now. i want to distribute 2Mbps on each public ip address in asa5515.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2015 04:43:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-rate-limiting-on-cisco-asa-5510/m-p/1557038#M658257</guid>
      <dc:creator>Ahmad-Maan</dc:creator>
      <dc:date>2015-10-21T04:43:20Z</dc:date>
    </item>
  </channel>
</rss>

