Cisco ASA Series Configuration Manual page 408

Firewall cli, asa services module, and the adaptive security virtual appliance
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Configure QoS
class-map policing_map_name
Example:
hostname(config)# class-map policing_traffic
Specify the traffic in the class map.
Step 4
match parameter
Example:
hostname(config-cmap)# match access-list policing
See
Identify Traffic (Layer 3/4 Class Maps), page 11-13
Tip
Step 5
Add or edit a policy map.
policy-map name
Example:
hostname(config)# policy-map QoS_policy
Identify the class map you created for prioritized traffic.
Step 6
class priority_map_name
Example:
hostname(config-pmap)# class priority_class
Configure priority queuing for the class.
Step 7
priority
Example:
hostname(config-pmap-c)# priority
Identify the class map you created for policed traffic.
Step 8
class policing_map_name
Example:
hostname(config-pmap)# class policing_class
Step 9
Configure policing for the class.
police {output | input} conform-rate [conform-burst] [conform-action [drop | transmit]]
[exceed-action [drop | transmit]]
Example:
hostname(config-pmap-c)# police output 56000 10500
The options are:
conform-burst argument—Specifies the maximum number of instantaneous bytes allowed in a
sustained burst before throttling to the conforming rate value, between 1000 and 512000000 bytes.
Cisco ASA Series Firewall CLI Configuration Guide
17-8
If you use an ACL for traffic matching, policing is applied in the direction specified in the ACL
only. That is, traffic going from the source to the destination is policed, but not the reverse.
Chapter 17
for more information.
Quality of Service

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents