cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1094
Views
10
Helpful
3
Replies

Restricting the bandwidth for particular subnet in ASA 5545

shoaib sheikh
Level 1
Level 1

Hello Freinds,

We have ASA 5545 connected to internet Router 3925. We are creating
site to site VPN From Firewall and want to restrict the bandwidth  of the users
travelling in the VPN. I know the process for router but not getting the 
configuration for firewall as options for policing traffic are not coming under policy-map command in ASA.

Configuration for router:


ip access-list extended 105
permit ip 10.10.10.0 0.0.0.255 any


class-map test
match access-group 105

policy-map test1
class test
police cir 1000000
conform-action transmit
exceed-action drop
violate-action drop


int Gixx
service-policy output test1


Please help me with the equivalent configuration for ASA 5545.

3 Replies 3

Shrikant Jadhav
Level 1
Level 1

Hi Shoaib,

you can do the same by referring below on ASA:

CLASSIFYING TRAFFIC-:

access-list capin1 permit ip 10.10.10.0 0.0.0.255 any

access-list capin1 permit ip any 10.10.10.0 0.0.0.255
Access-list cap permit ip any any ---> this is for all other traffic except 10.10.10.0

MATCHING THE TRAFFIC-:

class-map capin1 
match access-list capin1

Class-map cap
Match access-list cap

TAKING THE ACTION UNDER THE GLOBAL POLICY-:

policy-map global_policy
class capin1
police input 1000000 -------to allocate the 10 Mbps for only 10.x.x.x network IN and OUT
police output 1000000
Class cap
Police input 20000000 ------to allocate the 20 Mbps for other network subnets IN and OUT
Police output 20000000

 

Thanks

Shrikant

In ASA the access list wouldn't take wild card mask, instead it should be subnet mask, hence

 

access-list capin1 permit ip 10.10.10.0 0.0.0.255 any

access-list capin1 permit ip any 10.10.10.0 0.0.0.255
Access-list cap permit ip any any ---> this is for all other traffic except 10.10.10.0

 

should be

 

access-list capin1 permit ip 10.10.10.0 255.255.255.0 any

access-list capin1 permit ip any 10.10.10.0 255.255.255.0
Access-list cap permit ip any any ---> this is for all other traffic except 10.10.10.0

Hello Shrikant,

 

Thanks for your input. The ASA is giving the the following error when putting police command.

 policy-map global_policy

class restrict_FL

 police ?

ERROR: % Unrecognized command

 

For your information the ASA is 5545 and I am trying to put this command in context mode. So, please let me know the commands supported in context.

Review Cisco Networking for a $25 gift card