<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: QOS on ASA based on tunnel-group not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/qos-on-asa-based-on-tunnel-group-not-working/m-p/1399292#M798079</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ivan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought we were differentiating between traffic going through the tunnel and the encrypted packets (ipsec/ike) going to the internet (peer). Not traffic that is not going through the vpn tunnel.&lt;/P&gt;&lt;P&gt;So what I really am trying to do, is limiting the bandwidth of a VPN site-to-site tunnel, which is tunnelgroup 1.1.1.1 in my example.&lt;/P&gt;&lt;P&gt;I don't really care if the traffic within the tunnel is limited or the entire tunnel itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can confirm that when I sent packets from 2.2.2.2 to 3.3.3.3, the tunnel 1.1.1.1 is established and the vpn works perfectly.&lt;/P&gt;&lt;P&gt;I can confirm that limiting works with the access-lists but I cannot get the limiting to work based on the tunnelgroup name (which is very dynamic and which I would prefer).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Jan 2010 10:26:07 GMT</pubDate>
    <dc:creator>siennax</dc:creator>
    <dc:date>2010-01-28T10:26:07Z</dc:date>
    <item>
      <title>QOS on ASA based on tunnel-group not working</title>
      <link>https://community.cisco.com/t5/network-security/qos-on-asa-based-on-tunnel-group-not-working/m-p/1399288#M798075</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a lan2lan vpn on an ASA 5520 and am trying to limit the bandwidth of this tunnel going outside.&lt;/P&gt;&lt;P&gt;I have created the following configuration, but it is not working:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;class-map 1.1.1.1_CM&lt;BR /&gt; match tunnel-group 1.1.1.1&lt;BR /&gt; match flow ip destination-address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;policy-map VPNQOS_PM&lt;BR /&gt; class 1.1.1.1_CM&lt;BR /&gt;&amp;nbsp; police output 1000000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;service-policy VPNQOS_PM interface outside&lt;/P&gt;&lt;P&gt;As a workaround I created the following configuration, which does the trick, but not as nicely as the above config:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list 1.1.1.1_ACL extended permit ip host 2.2.2.2 host 3.3.3.3&lt;BR /&gt;access-list 1.1.1.1_ACL extended deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;class-map 1.1.1.1_CM&lt;BR /&gt; match access-list 1.1.1.1_ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;policy-map VPNQOS_PM&lt;BR /&gt; class 1.1.1.1_CM&lt;BR /&gt;&amp;nbsp; police output 1000000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;service-policy VPNQOS_PM interface outside&lt;/P&gt;&lt;P&gt;Does anybody know what I am doing wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:58:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-on-asa-based-on-tunnel-group-not-working/m-p/1399288#M798075</guid>
      <dc:creator>siennax</dc:creator>
      <dc:date>2019-03-11T16:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: QOS on ASA based on tunnel-group not working</title>
      <link>https://community.cisco.com/t5/network-security/qos-on-asa-based-on-tunnel-group-not-working/m-p/1399289#M798076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By outside you mean traffic going out to the internet or going throgh the vpn tunnel?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 18:46:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-on-asa-based-on-tunnel-group-not-working/m-p/1399289#M798076</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2010-01-27T18:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: QOS on ASA based on tunnel-group not working</title>
      <link>https://community.cisco.com/t5/network-security/qos-on-asa-based-on-tunnel-group-not-working/m-p/1399290#M798077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ivan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By outside I mean indeed traffic to the internet.&lt;/P&gt;&lt;P&gt;I think I have configured traffic through the tunnel at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I really would like to know, is what my faulty configuration should do and why it doesn't work...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 19:40:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-on-asa-based-on-tunnel-group-not-working/m-p/1399290#M798077</guid>
      <dc:creator>siennax</dc:creator>
      <dc:date>2010-01-27T19:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: QOS on ASA based on tunnel-group not working</title>
      <link>https://community.cisco.com/t5/network-security/qos-on-asa-based-on-tunnel-group-not-working/m-p/1399291#M798078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so if that traffic is going out to the internet rather than going through the vpn tunnel this configuration will not work since the QoS config for a tunnel group applies only for traffic going through that crypto connection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 19:41:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-on-asa-based-on-tunnel-group-not-working/m-p/1399291#M798078</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2010-01-27T19:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: QOS on ASA based on tunnel-group not working</title>
      <link>https://community.cisco.com/t5/network-security/qos-on-asa-based-on-tunnel-group-not-working/m-p/1399292#M798079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ivan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought we were differentiating between traffic going through the tunnel and the encrypted packets (ipsec/ike) going to the internet (peer). Not traffic that is not going through the vpn tunnel.&lt;/P&gt;&lt;P&gt;So what I really am trying to do, is limiting the bandwidth of a VPN site-to-site tunnel, which is tunnelgroup 1.1.1.1 in my example.&lt;/P&gt;&lt;P&gt;I don't really care if the traffic within the tunnel is limited or the entire tunnel itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can confirm that when I sent packets from 2.2.2.2 to 3.3.3.3, the tunnel 1.1.1.1 is established and the vpn works perfectly.&lt;/P&gt;&lt;P&gt;I can confirm that limiting works with the access-lists but I cannot get the limiting to work based on the tunnelgroup name (which is very dynamic and which I would prefer).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jan 2010 10:26:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/qos-on-asa-based-on-tunnel-group-not-working/m-p/1399292#M798079</guid>
      <dc:creator>siennax</dc:creator>
      <dc:date>2010-01-28T10:26:07Z</dc:date>
    </item>
  </channel>
</rss>

