<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problems with very big latency  ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problems-with-very-big-latency-asa-5505/m-p/1459952#M681730</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a big problem. When I download a big file from internet I can view that my latency grow too much. If nothing are surfing in internet&amp;nbsp; I have 30 ms latency but if somebody download something I have 1000 ms of latency. Only happen&amp;nbsp; in DMZ internface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is my ASA configuration, Is something wrong?&amp;nbsp; .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;Result of the command: "sh run"&lt;BR /&gt;&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password EhxQ5dBfvkyaUj52 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.10.8 W2K3-X32-SP&lt;BR /&gt;name 0.0.0.201 &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 0.0.0.194 255.255.255.240 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.20.5 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DNS1&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; timeout 30&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any interface dmz eq domain &lt;BR /&gt;access-list INSIDE_ACL_OUT extended permit ip any any &lt;BR /&gt;access-list 100 extended permit udp any any eq domain &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any any eq https &lt;BR /&gt;access-list 100 extended permit tcp any any eq 3389 &lt;BR /&gt;access-list 100 extended permit tcp any any eq www &lt;BR /&gt;access-list 100 extended permit icmp any any &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inbound extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list RDP extended permit tcp any interface outside eq 3389 log &lt;BR /&gt;access-list RDP extended permit tcp interface outside interface inside eq 3389 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.9.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.252.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.10.64 255.255.255.240 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;BR /&gt;access-list outbound extended permit ip any any &lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list outside_3_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list outside_4_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;access-list inside_acl extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;&lt;SPAN&gt;logging from-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:cisco@XXXX.com" target="_blank"&gt;cisco@XXXX.com&lt;/A&gt;&lt;BR /&gt;logging recipient-address @XXXX.com level errors&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool pool1 192.168.10.70-192.168.10.75 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;monitor-interface inside&lt;BR /&gt;monitor-interface outside&lt;BR /&gt;monitor-interface dmz&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 0.0.0.195-0.0.0.206 netmask 255.255.255.240&lt;BR /&gt;global (outside) 2 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 192.168.10.0 255.255.255.0&lt;BR /&gt;nat (dmz) 2 192.168.9.0 255.255.255.0&lt;BR /&gt;nat (dmz) 2 192.168.252.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; ftp 192.168.10.10 ftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; ftp-data 192.168.10.10 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; 51000 192.168.10.10 50000 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.197 3389 192.168.10.9 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.200 https 192.168.10.9 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; https W2K3-X32-SP https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; www W2K3-X32-SP www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.198 https 192.168.10.13 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.198 www 192.168.10.133 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.202 3389 192.168.10.10 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.200 www 192.168.10.14 www netmask 255.255.255.255 &lt;BR /&gt;access-group 100 in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 0.0.0.193 1&lt;BR /&gt;route dmz 192.168.9.0 255.255.255.0 192.168.20.1 1&lt;BR /&gt;route dmz 192.168.252.0 255.255.255.0 192.168.20.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.255 inside&lt;BR /&gt;http 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.194 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-NOAUT esp-3des esp-none &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer 88.2.205.108 &lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set peer 0.0.0.218 &lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 3 match address outside_3_cryptomap&lt;BR /&gt;crypto map outside_map 3 set peer 80.24.224.149 &lt;BR /&gt;crypto map outside_map 3 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 3 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 4 match address outside_4_cryptomap&lt;BR /&gt;crypto map outside_map 4 set peer 80.37.221.171 &lt;BR /&gt;crypto map outside_map 4 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 4 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable inside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 80000&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 172800&lt;BR /&gt;crypto isakmp nat-traversal&amp;nbsp; 15&lt;BR /&gt;crypto isakmp disconnect-notify&lt;BR /&gt;crypto isakmp reload-wait&lt;BR /&gt;telnet 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 30&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;l2tp tunnel hello 120&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.10.90-192.168.10.100 inside&lt;BR /&gt;dhcpd dns 154.15.255.134 154.15.255.130 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.8.4 interface dmz&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; banner none&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server none&lt;BR /&gt; dhcp-network-scope none&lt;BR /&gt; vpn-access-hours none&lt;BR /&gt; vpn-simultaneous-logins 3&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-filter none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec webvpn&lt;BR /&gt; password-storage disable&lt;BR /&gt; ip-comp disable&lt;BR /&gt; re-xauth disable&lt;BR /&gt; group-lock none&lt;BR /&gt; pfs disable&lt;BR /&gt; ipsec-udp disable&lt;BR /&gt; ipsec-udp-port 10000&lt;BR /&gt; split-tunnel-policy tunnelall&lt;BR /&gt; split-tunnel-network-list none&lt;BR /&gt; default-domain none&lt;BR /&gt; split-dns none&lt;BR /&gt; intercept-dhcp 255.255.255.255 disable&lt;BR /&gt; secure-unit-authentication disable&lt;BR /&gt; user-authentication disable&lt;BR /&gt; user-authentication-idle-timeout none&lt;BR /&gt; ip-phone-bypass disable&lt;BR /&gt; leap-bypass disable&lt;BR /&gt; nem disable&lt;BR /&gt; backup-servers keep-client-config&lt;BR /&gt; msie-proxy server none&lt;BR /&gt; msie-proxy method no-modify&lt;BR /&gt; msie-proxy except-list none&lt;BR /&gt; msie-proxy local-bypass disable&lt;BR /&gt; nac disable&lt;BR /&gt; nac-sq-period 300&lt;BR /&gt; nac-reval-period 86400&lt;BR /&gt; nac-default-acl none&lt;BR /&gt; address-pools none&lt;BR /&gt; smartcard-removal-disconnect enable&lt;BR /&gt; client-firewall none&lt;BR /&gt; client-access-rule none&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; functions url-entry&lt;BR /&gt;&amp;nbsp; html-content-filter none&lt;BR /&gt;&amp;nbsp; homepage none&lt;BR /&gt;&amp;nbsp; keep-alive-ignore 4&lt;BR /&gt;&amp;nbsp; http-comp gzip&lt;BR /&gt;&amp;nbsp; filter none&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;&amp;nbsp; port-forward none&lt;BR /&gt;&amp;nbsp; port-forward-name value Application Access&lt;BR /&gt;&amp;nbsp; sso-server none&lt;BR /&gt;&amp;nbsp; deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information&lt;BR /&gt;&amp;nbsp; svc none&lt;BR /&gt;&amp;nbsp; svc keep-installer installed&lt;BR /&gt;&amp;nbsp; svc keepalive none&lt;BR /&gt;&amp;nbsp; svc rekey time none&lt;BR /&gt;&amp;nbsp; svc rekey method none&lt;BR /&gt;&amp;nbsp; svc dpd-interval client none&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway none&lt;BR /&gt;&amp;nbsp; svc compression deflate&lt;BR /&gt;group-policy Iphone internal&lt;BR /&gt;group-policy Iphone attributes&lt;BR /&gt; dns-server value 192.168.10.10 8.8.8.8&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value XXXX.net&lt;BR /&gt;username iphone password encrypted privilege 0&lt;BR /&gt;username iphone attributes&lt;BR /&gt; vpn-group-policy Iphone&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool pool1&lt;BR /&gt; default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group 0.0.0.218 type ipsec-l2l&lt;BR /&gt;tunnel-group 0.0.0.218 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 0.0.0.149 type ipsec-l2l&lt;BR /&gt;tunnel-group 0.0.0.149 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 0.0.0.171 type ipsec-l2l&lt;BR /&gt;tunnel-group 0.0.0.171 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group Iphone type ipsec-ra&lt;BR /&gt;tunnel-group Iphone general-attributes&lt;BR /&gt; address-pool pool1&lt;BR /&gt; default-group-policy Iphone&lt;BR /&gt;tunnel-group Iphone ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 0.0.0.108 type ipsec-l2l&lt;BR /&gt;tunnel-group 0.0.0.108 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect dns &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 217.76.146.62&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:0f6662e7b1cacc4712e1be913bf7addf&lt;BR /&gt;: end&lt;BR /&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don´t know if is a bad configuration of ASA or if is my internet provider who have configured QoS (MPLS) in the wrong way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot!!&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:39:12 GMT</pubDate>
    <dc:creator>cuelate21</dc:creator>
    <dc:date>2019-03-11T17:39:12Z</dc:date>
    <item>
      <title>Problems with very big latency  ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-very-big-latency-asa-5505/m-p/1459952#M681730</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a big problem. When I download a big file from internet I can view that my latency grow too much. If nothing are surfing in internet&amp;nbsp; I have 30 ms latency but if somebody download something I have 1000 ms of latency. Only happen&amp;nbsp; in DMZ internface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is my ASA configuration, Is something wrong?&amp;nbsp; .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;Result of the command: "sh run"&lt;BR /&gt;&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password EhxQ5dBfvkyaUj52 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.10.8 W2K3-X32-SP&lt;BR /&gt;name 0.0.0.201 &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 0.0.0.194 255.255.255.240 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.20.5 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DNS1&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; timeout 30&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any interface dmz eq domain &lt;BR /&gt;access-list INSIDE_ACL_OUT extended permit ip any any &lt;BR /&gt;access-list 100 extended permit udp any any eq domain &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any any eq https &lt;BR /&gt;access-list 100 extended permit tcp any any eq 3389 &lt;BR /&gt;access-list 100 extended permit tcp any any eq www &lt;BR /&gt;access-list 100 extended permit icmp any any &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inbound extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list RDP extended permit tcp any interface outside eq 3389 log &lt;BR /&gt;access-list RDP extended permit tcp interface outside interface inside eq 3389 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.9.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.252.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.10.64 255.255.255.240 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;BR /&gt;access-list outbound extended permit ip any any &lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list outside_3_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list outside_4_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;access-list inside_acl extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;&lt;SPAN&gt;logging from-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:cisco@XXXX.com" target="_blank"&gt;cisco@XXXX.com&lt;/A&gt;&lt;BR /&gt;logging recipient-address @XXXX.com level errors&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool pool1 192.168.10.70-192.168.10.75 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;monitor-interface inside&lt;BR /&gt;monitor-interface outside&lt;BR /&gt;monitor-interface dmz&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 0.0.0.195-0.0.0.206 netmask 255.255.255.240&lt;BR /&gt;global (outside) 2 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 192.168.10.0 255.255.255.0&lt;BR /&gt;nat (dmz) 2 192.168.9.0 255.255.255.0&lt;BR /&gt;nat (dmz) 2 192.168.252.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; ftp 192.168.10.10 ftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; ftp-data 192.168.10.10 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; 51000 192.168.10.10 50000 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.197 3389 192.168.10.9 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.200 https 192.168.10.9 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; https W2K3-X32-SP https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; www W2K3-X32-SP www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXXX.net" target="_blank"&gt;www.XXXX.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.198 https 192.168.10.13 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.198 www 192.168.10.133 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.202 3389 192.168.10.10 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.200 www 192.168.10.14 www netmask 255.255.255.255 &lt;BR /&gt;access-group 100 in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 0.0.0.193 1&lt;BR /&gt;route dmz 192.168.9.0 255.255.255.0 192.168.20.1 1&lt;BR /&gt;route dmz 192.168.252.0 255.255.255.0 192.168.20.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.255 inside&lt;BR /&gt;http 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.194 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-NOAUT esp-3des esp-none &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer 88.2.205.108 &lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set peer 0.0.0.218 &lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 3 match address outside_3_cryptomap&lt;BR /&gt;crypto map outside_map 3 set peer 80.24.224.149 &lt;BR /&gt;crypto map outside_map 3 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 3 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 4 match address outside_4_cryptomap&lt;BR /&gt;crypto map outside_map 4 set peer 80.37.221.171 &lt;BR /&gt;crypto map outside_map 4 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 4 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable inside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 80000&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 172800&lt;BR /&gt;crypto isakmp nat-traversal&amp;nbsp; 15&lt;BR /&gt;crypto isakmp disconnect-notify&lt;BR /&gt;crypto isakmp reload-wait&lt;BR /&gt;telnet 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 30&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;l2tp tunnel hello 120&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.10.90-192.168.10.100 inside&lt;BR /&gt;dhcpd dns 154.15.255.134 154.15.255.130 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.8.4 interface dmz&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; banner none&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server none&lt;BR /&gt; dhcp-network-scope none&lt;BR /&gt; vpn-access-hours none&lt;BR /&gt; vpn-simultaneous-logins 3&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-filter none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec webvpn&lt;BR /&gt; password-storage disable&lt;BR /&gt; ip-comp disable&lt;BR /&gt; re-xauth disable&lt;BR /&gt; group-lock none&lt;BR /&gt; pfs disable&lt;BR /&gt; ipsec-udp disable&lt;BR /&gt; ipsec-udp-port 10000&lt;BR /&gt; split-tunnel-policy tunnelall&lt;BR /&gt; split-tunnel-network-list none&lt;BR /&gt; default-domain none&lt;BR /&gt; split-dns none&lt;BR /&gt; intercept-dhcp 255.255.255.255 disable&lt;BR /&gt; secure-unit-authentication disable&lt;BR /&gt; user-authentication disable&lt;BR /&gt; user-authentication-idle-timeout none&lt;BR /&gt; ip-phone-bypass disable&lt;BR /&gt; leap-bypass disable&lt;BR /&gt; nem disable&lt;BR /&gt; backup-servers keep-client-config&lt;BR /&gt; msie-proxy server none&lt;BR /&gt; msie-proxy method no-modify&lt;BR /&gt; msie-proxy except-list none&lt;BR /&gt; msie-proxy local-bypass disable&lt;BR /&gt; nac disable&lt;BR /&gt; nac-sq-period 300&lt;BR /&gt; nac-reval-period 86400&lt;BR /&gt; nac-default-acl none&lt;BR /&gt; address-pools none&lt;BR /&gt; smartcard-removal-disconnect enable&lt;BR /&gt; client-firewall none&lt;BR /&gt; client-access-rule none&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; functions url-entry&lt;BR /&gt;&amp;nbsp; html-content-filter none&lt;BR /&gt;&amp;nbsp; homepage none&lt;BR /&gt;&amp;nbsp; keep-alive-ignore 4&lt;BR /&gt;&amp;nbsp; http-comp gzip&lt;BR /&gt;&amp;nbsp; filter none&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;&amp;nbsp; port-forward none&lt;BR /&gt;&amp;nbsp; port-forward-name value Application Access&lt;BR /&gt;&amp;nbsp; sso-server none&lt;BR /&gt;&amp;nbsp; deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information&lt;BR /&gt;&amp;nbsp; svc none&lt;BR /&gt;&amp;nbsp; svc keep-installer installed&lt;BR /&gt;&amp;nbsp; svc keepalive none&lt;BR /&gt;&amp;nbsp; svc rekey time none&lt;BR /&gt;&amp;nbsp; svc rekey method none&lt;BR /&gt;&amp;nbsp; svc dpd-interval client none&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway none&lt;BR /&gt;&amp;nbsp; svc compression deflate&lt;BR /&gt;group-policy Iphone internal&lt;BR /&gt;group-policy Iphone attributes&lt;BR /&gt; dns-server value 192.168.10.10 8.8.8.8&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value XXXX.net&lt;BR /&gt;username iphone password encrypted privilege 0&lt;BR /&gt;username iphone attributes&lt;BR /&gt; vpn-group-policy Iphone&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool pool1&lt;BR /&gt; default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group 0.0.0.218 type ipsec-l2l&lt;BR /&gt;tunnel-group 0.0.0.218 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 0.0.0.149 type ipsec-l2l&lt;BR /&gt;tunnel-group 0.0.0.149 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 0.0.0.171 type ipsec-l2l&lt;BR /&gt;tunnel-group 0.0.0.171 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group Iphone type ipsec-ra&lt;BR /&gt;tunnel-group Iphone general-attributes&lt;BR /&gt; address-pool pool1&lt;BR /&gt; default-group-policy Iphone&lt;BR /&gt;tunnel-group Iphone ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 0.0.0.108 type ipsec-l2l&lt;BR /&gt;tunnel-group 0.0.0.108 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect dns &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 217.76.146.62&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:0f6662e7b1cacc4712e1be913bf7addf&lt;BR /&gt;: end&lt;BR /&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don´t know if is a bad configuration of ASA or if is my internet provider who have configured QoS (MPLS) in the wrong way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot!!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:39:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-very-big-latency-asa-5505/m-p/1459952#M681730</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2019-03-11T17:39:12Z</dc:date>
    </item>
  </channel>
</rss>

