<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix Processor up tp 90% in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-processor-up-tp-90/m-p/627366#M1030654</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The version is 7.0. PIX 515E&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Dec 2006 07:29:15 GMT</pubDate>
    <dc:creator>KlediBodinaku24</dc:creator>
    <dc:date>2006-12-27T07:29:15Z</dc:date>
    <item>
      <title>Pix Processor up tp 90%</title>
      <link>https://community.cisco.com/t5/network-security/pix-processor-up-tp-90/m-p/627364#M1030648</link>
      <description>&lt;P&gt;This is the output when the proccesor was  high. Some of the VPN client users were unable to log in. when those users that were logged in started getting out the proccessor activity started going down until it reached 7%.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:11:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-processor-up-tp-90/m-p/627364#M1030648</guid>
      <dc:creator>KlediBodinaku24</dc:creator>
      <dc:date>2019-03-11T09:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: Pix Processor up tp 90%</title>
      <link>https://community.cisco.com/t5/network-security/pix-processor-up-tp-90/m-p/627365#M1030651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version of software are you using in the pix ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Dec 2006 20:36:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-processor-up-tp-90/m-p/627365#M1030651</guid>
      <dc:creator>drolemc</dc:creator>
      <dc:date>2006-12-26T20:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: Pix Processor up tp 90%</title>
      <link>https://community.cisco.com/t5/network-security/pix-processor-up-tp-90/m-p/627366#M1030654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The version is 7.0. PIX 515E&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Dec 2006 07:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-processor-up-tp-90/m-p/627366#M1030654</guid>
      <dc:creator>KlediBodinaku24</dc:creator>
      <dc:date>2006-12-27T07:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: Pix Processor up tp 90%</title>
      <link>https://community.cisco.com/t5/network-security/pix-processor-up-tp-90/m-p/627367#M1030656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mate,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How many VPN users were logged in? Does your PIX have a VPN accelerator card (is it Unrestricted PIX)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you don't have any VPN termination capacity problems then you might need to check your IP Audit logs (if you have configured it). If you don't have it configured I would suggest that you do that on all physical interfaces and set the action to "log" only rather than "block" and then you can monitor if there is any malicious activities from any source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Dec 2006 16:06:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-processor-up-tp-90/m-p/627367#M1030656</guid>
      <dc:creator>scheikhnajib</dc:creator>
      <dc:date>2006-12-27T16:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: Pix Processor up tp 90%</title>
      <link>https://community.cisco.com/t5/network-security/pix-processor-up-tp-90/m-p/627368#M1030659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check for incoming icmp log from hosts configured on the pix. Could be&lt;/P&gt;&lt;P&gt;- a misconfigured server the pix cannot reach&lt;/P&gt;&lt;P&gt;- a patch not well applied on syslog-server or snmp-server.&lt;/P&gt;&lt;P&gt;- misconfgured pix eg wrong ip server-address,&lt;/P&gt;&lt;P&gt;- port udp/514 not opened on server, etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check either the syslog-server and snmp-server.&lt;/P&gt;&lt;P&gt;As a permanent workaround, enable icmp echo and icmp echo reply for the faulty host.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Dec 2006 16:20:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-processor-up-tp-90/m-p/627368#M1030659</guid>
      <dc:creator>mpalardy</dc:creator>
      <dc:date>2006-12-27T16:20:47Z</dc:date>
    </item>
  </channel>
</rss>

