The server is allowed to burst traffic over the rate of 2MBit/s. Thats normal. But if the traffic keeps being over 2 MBit, the excess traffic is dropped and has to be retransmitted which can slow down some operations. So what you describe can be normal operation on the ASA. Keep in mind that the ASA is quite limited with QoS.--

Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.It is used to optimize network performance by prioritizing certain traffic flows and ensuring the traffic rate doesn't exceed the bandwidth limit.. Content Continues Below Traffic shaping - Wikipedia Traffic shaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a desired traffic profile. Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds. It is often confused with traffic policing, the distinct but Solved: Traffic Shaping Rules - The Meraki Community When creating traffic shaping rules on a MX appliance do those rules only affect traffic outbound over the Meraki VPN or will it help to prioritize Internet traffic as well? For instance tagging video conferencing and Netsuite as high priority traffic and tagging YouTube as low priority traffic. t

Traffic shaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a desired traffic profile. Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds. It is often confused with traffic policing, the distinct but

Figure 1. Site to site VPN between San Francisco branch and UK branch. The following rule is defined on the SF MX60 under Configure > Traffic shaping. As this rule is designed to match traffic coming from a particular local source network, it is important that the localnet syntax be used in the Custom expression: Figure 2. Traffic shaping with VPNs is a tricky topic because VPN traffic is considered separate from, but also a part of, the WAN traffic through which it also flows. If WAN is 10 Mbit/s, then the VPN can also use 10Mbit/s, but there is not actually 20Mbit/s of bandwidth to consider, only 10Mbit/s.

Traffic Shaper — Traffic Shaping and VPNs | pfSense

This traffic shaping document describes Priority Queueing (PRIQ), Type of Service (ToS) priority, and Quality of Service (QoS). It also explains the following: Why traffic shaping only occurs when traffic approaches the configured capacity on a given interface. Why you should configure the FortiGate unit to preemptively drop excess packets. Cisco’s implementation of Traffic Shaping. Similar to Traffic Policing, Traffic Shaping as implemented by Cisco also uses a token bucket metaphor as follows: A token can be “spent” and can be thought of the right to send a certain amount of traffic. In traffic shaping, one token represents one bit of traffic.