Using the Cisco ASA Identity Firewall for Traffic Shaping or Bandwidth Control?


I have just discovered and been briefly reading up on Cisco's "new to me" Identity Firewall feature set.  

I am specifically trying to determine if it can be used for the purposes of bandwidth control or traffic shaping based on users.  For example, once it has attached its self via the million steps to active directory and the mine field of it completely breaking existing things navigated, is it able to associate network activity with users on the network, can I then create policies for each user or active directory user group?

Specifically policies that would allow users or users referenced by their associated groups access to only a certain amount of the total interface's bandwidth?  IE, no one user on the network can ever utilize more than 500 Kbytes per second.  So a cat video(s) or a sports cast(s) doesn't end up killing an important webex conference for example?  

Now I know there are a few ways that this COULD be done (allow/disallow known ports/IPs or microflow on mega expensive catalyst switches), none of which are really any good or scale able.  Basically I am trying to get the ASA to act like a Next Generation Firewall and allow for some form of user based bandwidth control.  

Also, if this is possible, I am guessing the ASA will need 1GB of RAM as opposed to 256MB?

Thanks for the info.
Who is Participating?
rauenpcConnect With a Mentor Commented:
I've never done this specifically (I've done IDFW but not traffic shaping based on IDFW), but the commands are allowed, so I assume that you can do this. I would definitely recommend going with 1Gb RAM (or the max) and also upgrade your code to the latest so that you can support IDFW for 2008R2 and 2012. The bigger question I would have would be if you configure this for an individual user, it seems clear that the user will not be allowed beyond the max. However, if you configure a group will each user be allowed up to the max, or will the collective group of users be allowed up to the max (as an aggregate)? That I don't know and would probably want to test.

access-list AL-WEB-TRAFFIC extended permit tcp user LOCAL\Administrator any any eq https

class-map CM-POLICE-WEB
 match access-list AL-WEB-TRAFFIC
policy-map PM-POLICE-WEB
  police input 1000000
service-policy PM-POLICE-WEB interface outside
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.