06-17-2018 07:28 AM - edited 02-21-2020 07:53 AM
Dear experts,
Is one able to rate limit below items when configuring security context on a ASA5520?
1) NAT
2)MAC Learning
3) Stateful packet inspections
My understanding is that only ASDM sessions rate and connections rate as well as syslog msg rates are the only options to rate limit? Am I wrong? your input is much appreciated.
06-17-2018 07:46 AM
Yes to all three - as well as several others you didn't mention.
A complete listing can be found here:
06-17-2018 07:55 AM
Hi Marvin,
Appreciate your prompt response. However I am a bit confused. The list mentions about mac-address and inspect. (attached)
mac-address: does it mean the rate limit of mac address learning in a second or its only the maximum number of macs in the mac table?
inspect: is it only Application inspections per second or its stateful packet inspection as well? (I don't think this two are the same, are they?)
06-17-2018 08:01 AM
You're welcome.
For mac address it's the latter.
Inspects is (are) application inspections per second.
What's the use case you're looking to address with the answer to these questions?
06-17-2018 08:43 AM
I am preparing for an exam, I came up to a question that I found in a discussion forum which many people are arguing on different answers.
It is asking: which three resource class limits can be set using a rate limit? (Choose three.)
A. address translation rate
B. Cisco ASDM session rate
C. connections rate
D. MAC-address learning rate (when in transparent mode)
E. syslog messages rate
F. stateful packet inspections rate
06-17-2018 10:19 PM
06-18-2018 07:30 AM
The answer would be c, e, and f.
The reason is because, as indicated in the link I provided earlier, those are the only parameters in that list that are limited by "rate" (vs. by a "concurrent" number).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide