Jose, One way to begin tunning your environment would be to create class-maps which rely on ACLs to properly categorize the traffic. In the class-map, you may want to specific the conform action to be "transmit" and the exceed action to be transmit as well. This should ensure that the traffic that you are categorizing in CoPP will still transmit even if it exceeds the bandwidth you specified, but will still increment your exceed counter if the bandwidth you specified is not enough. Later all you will have to do is adjust your bandwidth to higher amount until you do not see the exceed counter increment. When using the "show policy-map control-plane-policy" command be aware that the output may be limiited to a small window of time.
ip access-list ex test_ssh permit ip any any eq ssh permit ip any eq ssh any exit
class-map test_ssh match access-group test_ssh
policy-map control-plane-policy !notice the exceed action of "transmit" below class test_ssh police rate 100 10 conform-action transmit exceed-action transmit exit
control plane service-policyinput control-plane-policy end show policy-map control-plane-policy
Hopefully my syntax is correct, I do not have a router in front of me right now.
Are you responsible for risk management, compliance management and auditing of a network?
If so, we’d like to speak with you to learn your current processes of enforcing compliance and managing risk to help us develop services that will ...
Once you've expanded Cisco Secure Endpoint connector deployment to about 50% of your licensed count (check out this article that shows you how to do that), it's time to put those connectors to action i.e. convert them to Protect from Audit mode for vari...
Hello! I’m Betsy, UX Researcher, on the Cisco+ Secure Connect Now team. Nice to meet you all .We have a short survey to learn about your Zero Trust Network Access (ZTNA) journey. Whether you have, plan to, or have not implemented a ...
A set of interface access rules can cause the Cisco Adaptive Security Appliance to permit or deny a designated host to access another particular host with a specific network application (service). When there is only one client, one host and one se...
How To: Cisco ISE Captive Portals with Aruba Wireless
Authors: Adam Hollifield, Brad Johnson
IntroductionPrerequisitesMinimum RequirementsComponents UsedConfigurationAruba Wireless ControllerWLAN CreationAuthentication ConfigurationRole & Policy Confi...