cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
622
Views
19
Helpful
9
Replies

PIX QOS problem

Ofir-Yeshayahu
Level 1
Level 1

Hello,

I have FTP server on the DMZ and I want to restrict the bandwidth from and to the FTP server to 1Mbps only.

My PIX configuration:

static (DMZ1,outside) 212.117.212.237 FTP netmask 255.255.255.255

access-list outside_mpc_in extended permit ip host FTP any

class-map outside-class

match access-list outside_mpc_in

policy-map outside-policy

description Outside_FTP_policy

class outside-class

police 1000000 1000

service-policy outside-policy interface outside

The outside interface use to connect VPN users.

NAT is Defined to allow FTP access from the Internet.

The main problem is that I have no match on the acces-list ('outside_mpc_in')

Any idea?

Is something else missing?

Regards,

Ofir.

9 Replies 9

slaurin
Level 1
Level 1

Hi,

Can you do a "show service-policy police" and tell me if you have any "conformed" or "exceeded" packets in there? (or just post the output). there you'll have a much better view of your policy...

Regards

Simon Laurin

Please rate if it helps

Thanks for your response (just came from my vacation...)

show service-policy police output:

police Interface outside:

cir 100000 bps, bc 1000 bytes

conformed 363452 packets, 69590935 bytes; actions: transmit

exceeded 198 packets, 229644 bytes; actions: drop

conformed 288 bps, exceed 0 bps

What this output means?

Regards,

Ofir

Hi,

the output means a policer with a rate of 100 kbps (should be 1000 kbps?) is configured and it got 69590935 bytes within the rate allowed to transmit and 229644 bytes outside the configured bandwidth, which were dropped.

The average bandwidth since last reset of counters is 288 bps of conforming data and 0 bps of exceeding data. This is somewhat misleading, if you do not take into account measurement time. F.e. if you transfer 1 minute at 10 Mbps there will be lot of dropped packets. If this was the only transfer in a measurement intervall of 100 minutes, it would average to 100 kbps in the display.

In your case make sure source and destination IPs in your access-list match your environment. A config, which should work:

static (DMZ1,outside) 212.117.212.237 FTP netmask 255.255.255.255

access-list outside_mpc_in extended permit ip host FTP any

access-list outside_mpc_in extended permit any ip host FTP

access-list dmz_mpc_in extended permit ip host 10.1.1.1 any

access-list dmz_mpc_in extended permit any ip host 10.1.1.1

!replace 10.1.1.1 with your real FTP server IP

class-map outside-class

match access-list outside_mpc_in

policy-map outside-policy

description Outside_FTP_policy

class outside-class

police 1000000 1000

service-policy outside-policy interface outside

class-map dmz-class

match access-list dmz_mpc_in

policy-map dmz-policy

description dmz_FTP_policy

class dmz-class

police 1000000 1000

service-policy dmz-policy interface dmz1

Hope this helps! Please rate all posts.

Regards, Martin

Any idea?

Ofir,

To me it looks like the ACL is crafted wrong. The FTP option is going to corespond to TCP 21 which would be your server source port. FTP-Data option is going to correspond to the return data stream, TCP 20 which the remote host sources.

Second if you want the policy-map to affect both inbound received data and outbound sent data then you need this applied to both interfaces. Here is a config.

access-list outside_mpc_ftp_out extended permit ip host x.x.x.x ftp-data any

!This will limit your outbound data stream from DMZ FTP to any host

access-list dmz_mpc_ftp_out extended permit ip any ftp-data host x.x.x.x

!This will limit your any ftp data stream in to the DMZ FTP host

policy-map outside-policy

description Outside_FTP_policy

class outside-class

police 1000000 1000

policy-map dmz-policy

description DMZ_FTP_policy

class dmz-class

police 1000000 1000

service-policy outside-policy interface outside

service-policy dmz-policy interface dmz1

Please rate any helpful posts

Thanks

Fred

Ofir,

Just noticed FTP was the hostname and not a protocol alias. I would still try my configuration and see if it works for you.

Thanks

Fred

Ofir,

Ok let me try this again since I had some descrepancies in the 1st post. Here is what I think would be an accurate configuration.

access-list outside_mpc_ftp_out extended permit ip host x.x.x.x ftp-data any

!This will limit your outbound data stream from DMZ FTP to any host

access-list dmz_mpc_ftp_out extended permit ip any ftp-data host x.x.x.x

!This will limit your any ftp data stream in to the DMZ FTP host

class-map outside-class

match access-list outside_mpc_ftp_out

class-map dmz-class

match access-list dmz_mpc_ftp_out

policy-map outside-policy

description Outside_FTP_policy

class outside-class

police 1000000 1000

policy-map dmz-policy

description DMZ_FTP_policy

class dmz-class

police 1000000 1000

service-policy outside-policy interface outside

service-policy dmz-policy interface dmz1

Thanks

Fred

Thank you.

Can you please answer the follwing:

If I want to match traffic from Inside to DMZ, all traffic from inside local network to specific DMZ IP server. Should I do it on Inside interface or DMZ interface? maybe both?

As I understands it's possible to match only inside traffic to an interface and not both inside and outside (like NAT).

Same for all traffic from DMZ server to Outside and Outside to DMZ server? Should I

have two policies one for outside and one for DMZ?

Regards,

Ofir.

Ofir,

For maximum coverage you want the QoS policy applied to all egress interfaces that require queueing and policing. This usually is also cleaner and easier to troubleshoot when you are trying to determine traffic rates and drops.

Thanks

Fred