Hello. i was wondering why this setup im using doesnt work. I have an asa 5506-x with traffic policing on. I have a service policy rule to limit port tcp/8080 to 3MBit traffic. I have tried to set it up under global, inside and outside interfaces. There is nothing special here, a simple NAT to the internet with 1 ip inside and outside. when I turn it on, it works only for the return traffic. what I did as a test is I set it up to shape Speedtest.net. the download side never works, but the upload works as expected. What I found was that the initiation port is 8080 and then it uses a high port to finish the communication. the asa probably shapes the first part correct regardless in or out but misses the higher 1024+ port. I did one additional test where I included everything to be shaped and it worked as expected. but I want to limit it to just port tcp8080. ive tried every combo of interfaces and direction but im not getting the sense that the firewall is detecting the 8080 and then the return high port flow. at least not for the policing. any thoughts? thank you.
can you please send me the following
- show run access-list "access-list name that matching traffic"
- show run class-map
- show run policy-map
thanks for the reply. I guess the big question I had is that I thought it was stateful meaning if the traffic left of 443 it would keep track of it its return port. what im seeing is it traffic policies the 443 no problem, in any direction or interface. but the remote system is returning on a high port that it isn't policing. I would think the statefulness would know that and block it as well. below is the test config I used. I tested it on Speedtest.net and the download does NOT work but the upload test DOES work. thank you!
there is no access list associated with this, I just have a default any any for internet traffic outbound
match port tcp eq 8080
police input 80000 1500
police output 80000 1500