The feature is called traffic policing. Basically, what you should do is this:
1. Define traffic to each server by using corresponding ACLs
2. Define class map for each server
3. Define policy map or use global policy to apply policing.
Example:
server 1 has ip 10.0.0.1 and provides http access from the outside
server 2 has ip 10.0.0.2 and provides https access from the outside
1.
access-list SERVER_1_TRAFFIC permit tcp any host 10.0.0.1 eq 80
access-list SERVER_2_TRAFFIC permit tcp any host 10.0.0.2 eq 443
2.
class-map SERVER1
match access-list SERVER_1_TRAFFIC
class-map SERVER2
match access-list SERVER_2_TRAFFIC
3.
policy-map global_policy
class SERVER1
police input 100000 (bps) 10000 (bps)
police output .....
class SERVER2
police input 200000 (bps) 10000 (bps)
police output .....
Here's the guide:
http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/conns_qos.html#wp1065257