Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 655
  • Last Modified:

Using the Cisco ASA Identity Firewall for Traffic Shaping or Bandwidth Control?

Hello,

I have just discovered and been briefly reading up on Cisco's "new to me" Identity Firewall feature set.  

I am specifically trying to determine if it can be used for the purposes of bandwidth control or traffic shaping based on users.  For example, once it has attached its self via the million steps to active directory and the mine field of it completely breaking existing things navigated, is it able to associate network activity with users on the network, can I then create policies for each user or active directory user group?

Specifically policies that would allow users or users referenced by their associated groups access to only a certain amount of the total interface's bandwidth?  IE, no one user on the network can ever utilize more than 500 Kbytes per second.  So a cat video(s) or a sports cast(s) doesn't end up killing an important webex conference for example?  

Now I know there are a few ways that this COULD be done (allow/disallow known ports/IPs or microflow on mega expensive catalyst switches), none of which are really any good or scale able.  Basically I am trying to get the ASA to act like a Next Generation Firewall and allow for some form of user based bandwidth control.  

Also, if this is possible, I am guessing the ASA will need 1GB of RAM as opposed to 256MB?

Thanks for the info.
0
CnicNV
Asked:
CnicNV
1 Solution
 
rauenpcCommented:
I've never done this specifically (I've done IDFW but not traffic shaping based on IDFW), but the commands are allowed, so I assume that you can do this. I would definitely recommend going with 1Gb RAM (or the max) and also upgrade your code to the latest so that you can support IDFW for 2008R2 and 2012. The bigger question I would have would be if you configure this for an individual user, it seems clear that the user will not be allowed beyond the max. However, if you configure a group will each user be allowed up to the max, or will the collective group of users be allowed up to the max (as an aggregate)? That I don't know and would probably want to test.

access-list AL-WEB-TRAFFIC extended permit tcp user LOCAL\Administrator any any eq https

class-map CM-POLICE-WEB
 match access-list AL-WEB-TRAFFIC
!
!
policy-map PM-POLICE-WEB
 class CM-POLICE-WEB
  police input 1000000
!
service-policy PM-POLICE-WEB interface outside
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now