<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: High Memory in FPR ASA 2120 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4867270#M1102301</link>
    <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;it's a new install and said commands are there by default.&lt;/P&gt;&lt;P&gt;most of the high NAT traffic are TCP. is there a similar "set connection timeout" for TCP? what is the command syntax/example?&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ciscoasa/pri/act/INET# sh run all | i xlate&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit tcp any4 any4&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit tcp any4 any6&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit tcp any6 any4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit tcp any6 any6&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit udp any4 any4 eq domain&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit udp any4 any6 eq domain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit udp any6 any4 eq domain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit udp any6 any6 eq domain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate block-allocation size 512&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate block-allocation maximum-per-host 4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no xlate block-allocation pba-interim-logging&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout xlate 3:00:00&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Jul 2023 22:35:36 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2023-07-04T22:35:36Z</dc:date>
    <item>
      <title>High Memory in FPR ASA 2120</title>
      <link>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4864263#M1102113</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;i got a dual FPR 2120 in ASA appliance mode, active-standby HA and in multiple context.&lt;/P&gt;&lt;P&gt;there was a high memory incident wherein the primary-active unit hanged/no console prompt, need to login to secondary-standby, force a failover and reboot the primary unit.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;the recent config change was only adding two /24 subnets with dynamic NAT/PAT on the outside interface. as interim, had to change from dynamic interface to dynamic &amp;lt;PUBLIC IP&amp;gt; for each of the subnet, i.e. 1 subnet &amp;gt; PAT to a separate public IP.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;can someone advise if the high memory is due to high NAT? i thought FPR 2100 platforms are more "beefy" than previous 5500-x?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;was it due to a lot of "inside" subnets PAT'd on a single public IP/"outside" interface?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;will the change of the 2 subnets to PAT to a different IP will "help" to some degree offload the memory?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa/pri/act/CONTEXT-A# sh xlate&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;77588 in use, 77589 most used&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; s - static, T - twice, N - net-to-net&lt;/P&gt;&lt;P&gt;&amp;lt;LOTS OF XLATE OUTPUT, HAD TO DISCONNECT MY SSH SESSION&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa/pri/act/CONTEXT-A# sh conn count&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;83665 in use, 89120 most used&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;&amp;lt;SNIP&amp;gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 22:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4864263#M1102113</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2023-06-28T22:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: High Memory in FPR ASA 2120</title>
      <link>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4866206#M1102245</link>
      <description>&lt;P&gt;How do you know that the issue was caused by high memory? Did you see console or syslog messages about memory allocation failures or collected "show memory detail" output?&lt;/P&gt;&lt;P&gt;77K xlates is not many for this platform, so it's unlikely that the issue was caused by PAT. It doesn't matter how many internal subnets you have or whether you PAT them to different IPs or same IP. Only the number of xlates and conns matters. Also "extended" PAT option can lead to high memory sometimes: CSCud84453 High Memory Utilization when PAT has "extended" option, but it's unlikely you use it.&lt;/P&gt;&lt;P&gt;If PAT pool is too small, you can run out of xlate slots, but this is another story. The "xlate per-session permit" per-session PAT feature can significantly improve scalability and reduce memory footprint in this case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2023 08:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4866206#M1102245</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-07-03T08:20:34Z</dc:date>
    </item>
    <item>
      <title>Re: High Memory in FPR ASA 2120</title>
      <link>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4866792#M1102273</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;we saw the high memory graph shoot up to a max of around 10 GB on this platform. console wasn't responsive on the active FW that's why we forced standby to become active and reboot primary/old active.&lt;/P&gt;&lt;P&gt;i checked the bug link and it doesn't affect our current 9.16 code. the bug doesn't affect ASA version 9.6(3)1 and above.&lt;/P&gt;&lt;P&gt;i do see the 2x /24 subnets being offload from PAT to outside interface to its separate public IP (.13 and .14) got maxed out. the average memory went down to 4-5 GB for several days now.&lt;/P&gt;&lt;P&gt;TCP PAT pool outside, address 64.x.x.13, range 1024-65535, allocated &lt;FONT color="#FF0000"&gt;64512&lt;/FONT&gt;&lt;BR /&gt;UDP PAT pool outside, address 64.x.x.28, range 1-1023, allocated 0&lt;BR /&gt;UDP PAT pool outside, address 64.x.x.28, range 1024-65535, allocated 2035&lt;BR /&gt;TCP PAT pool outside, address 64.x.x.14, range 1-1023, allocated 0&lt;BR /&gt;TCP PAT pool outside, address 64.x.x.14, range 1024-65535, allocated &lt;FONT color="#FF0000"&gt;64512&lt;/FONT&gt;&lt;BR /&gt;ciscoasa/pri/act/INET#&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2023 23:43:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4866792#M1102273</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2023-07-03T23:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: High Memory in FPR ASA 2120</title>
      <link>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4866891#M1102277</link>
      <description>&lt;P&gt;Right, you're running out of translation slots and need more public IP addresses in your PAT pool. You can either use single PAT statement like "nat (inside, outside) source dynamic ... pat-pool mypool" or few statements and PAT each/few subnets to a different public IP address. To remove xlates more quickly use per-session PAT feature "xlate per-session permit".&lt;/P&gt;&lt;P&gt;It's hard to say what caused high memory, but I agree that ~10GB is a lot. 2120 platform has 8GB of DRAM for dataplane if I remember correctly. Syslog, "show memory detail", "show memory top-usage", "show memory app-cache" can be used to troubleshoot, but you'll need to open TAC case to decode memory addresses. Also, "show chunkstat", but note that the output is huge.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jul 2023 07:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4866891#M1102277</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-07-04T07:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: High Memory in FPR ASA 2120</title>
      <link>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4866902#M1102279</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;thanks! i still see a LOT of xlate on these 2x subnet/public IP.&lt;/P&gt;&lt;P&gt;i suspect some P2P abuse going on downstream customer/device. i will just trace it and shutdown its&amp;nbsp; switch port.&lt;/P&gt;&lt;P&gt;can you enlighten or how do you use the 'xlate per-session permit'?&lt;/P&gt;&lt;P&gt;ciscoasa/pri/act/INET# sh run | i xlate&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;ciscoasa/pri/act/INET(config)# xlate per-session permit ?&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;BR /&gt;tcp TCP protocol&lt;BR /&gt;udp UDP protocol&lt;BR /&gt;ciscoasa/pri/act/INET(config)# xlate per-session permit tcp ?&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;BR /&gt;Hostname or A.B.C.D Match based on source network IPv4&lt;BR /&gt;address&lt;BR /&gt;Hostname/&amp;lt;0-128&amp;gt; or X:X:X:X::X/&amp;lt;0-128&amp;gt; Source IPv6 address/prefix&lt;BR /&gt;any4 Abbreviation for source address and&lt;BR /&gt;mask of 0.0.0.0 0.0.0.0&lt;BR /&gt;any6 Abbreviation for source prefix ::/0&lt;BR /&gt;host Use this keyword to configure source&lt;BR /&gt;host&lt;BR /&gt;ciscoasa/pri/act/INET(config)# xlate per-session permit tcp ?&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;BR /&gt;Hostname or A.B.C.D Match based on source network IPv4&lt;BR /&gt;address&lt;BR /&gt;Hostname/&amp;lt;0-128&amp;gt; or X:X:X:X::X/&amp;lt;0-128&amp;gt; Source IPv6 address/prefix&lt;BR /&gt;any4 Abbreviation for source address and&lt;BR /&gt;mask of 0.0.0.0 0.0.0.0&lt;BR /&gt;any6 Abbreviation for source prefix ::/0&lt;BR /&gt;host Use this keyword to configure source&lt;BR /&gt;host&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jul 2023 08:16:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4866902#M1102279</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2023-07-04T08:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: High Memory in FPR ASA 2120</title>
      <link>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4866989#M1102292</link>
      <description>&lt;P&gt;Per-session PAT:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/configuration/firewall/asa-916-firewall-config/nat-basics.html#ID-2090-000007b6" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/configuration/firewall/asa-916-firewall-config/nat-basics.html#ID-2090-000007b6&lt;/A&gt;&lt;/P&gt;&lt;P&gt;If ASA was upgraded from an older release, it is disabled by default. For new installations it is enabled by default (what you need). You can verify it with "show run xlate". Typically the following two commands is all you need to use this feature for IPv4 (to remove xlate as soon as connection is torn down), but you can try to add your own rules for UDP if some UDP-based protocol create lots of xlates.&lt;/P&gt;&lt;PRE&gt;xlate per-session permit tcp any4 any4&lt;/PRE&gt;&lt;PRE&gt;xlate per-session permit udp any4 any4 eq domain&lt;/PRE&gt;&lt;P&gt;Also, in this case "set connection timeout" should be used in policy-map to lower UDP idle timeout for offending protocol. Alternatively offending protocol or host can be blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jul 2023 11:51:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4866989#M1102292</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-07-04T11:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: High Memory in FPR ASA 2120</title>
      <link>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4867270#M1102301</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;it's a new install and said commands are there by default.&lt;/P&gt;&lt;P&gt;most of the high NAT traffic are TCP. is there a similar "set connection timeout" for TCP? what is the command syntax/example?&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ciscoasa/pri/act/INET# sh run all | i xlate&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit tcp any4 any4&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit tcp any4 any6&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit tcp any6 any4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit tcp any6 any6&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit udp any4 any4 eq domain&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit udp any4 any6 eq domain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit udp any6 any4 eq domain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session permit udp any6 any6 eq domain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate block-allocation size 512&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate block-allocation maximum-per-host 4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no xlate block-allocation pba-interim-logging&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout xlate 3:00:00&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jul 2023 22:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4867270#M1102301</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2023-07-04T22:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: High Memory in FPR ASA 2120</title>
      <link>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4867739#M1102314</link>
      <description>&lt;P&gt;Yes, you can set TCP idle timeout either globally ("timeout conn hh:mm:ss") or per class in policy-map ("set connection timeout idle"). This may not help much though, unless you have long-live TCP connection which don't pass any traffic and you want to get rid of them. There are few other timeouts, e.g. embryonic and half-closed. They can be used to teardown SYN-only connections and connections after one-way FIN. Reducing them may not help too, depending on your traffic profile. TCP Intercept ("set connection embryonic-conn-max" / "set connection per-client-embryonic-max") and/or per-client connection limiting ("set connection per-client-max") are typically more helpful to limit the number of SYN-only connections and established connections (e.g. per-client).&lt;/P&gt;&lt;P&gt;Anyway, it's possible that the only solution is to increase the PAT pool size.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2023 09:08:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-memory-in-fpr-asa-2120/m-p/4867739#M1102314</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-07-05T09:08:54Z</dc:date>
    </item>
  </channel>
</rss>

