How we can find the limitation of the access policies and identification profiles that can be created on the WSA proxy server?
I do not see anywhere documented this, the more Access policies degrade performance for sure - because it needs to process top-down manner.
Optimize always Access policies for a better match and keep housekeeping when required remove redundant access policies.
Keep monitor always CPU and performance, how the requests are processing - based in the response time. ( by configuring access logs with syntax give you any delay in processing the requests.
for reference guide: based in 11.X version
***** Rate All Helpful Responses *****
How to Ask The Cisco Community for Help
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: