<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA on Firepower 2140 - High CPU usage in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939707#M1104999</link>
    <description>&lt;P&gt;Processes CPU usage is not normal, because it is displayed incorrectly in this version due to CSCvt15348. Actually, it is very high in datapath. This can be caused by high pps rate or high drop rate, so you need to collect "clear traffic" / "show traffic" (once, but wait 1 minute after clearing) and "clear asp drop" / "show clock" + "show asp drop" (thrice) (to see how drops increase over time).&lt;/P&gt;&lt;P&gt;You're running out of 1550B and 80B blocks. The former can be attributed to high CPU. The latter is a bug. Do you encrypt failover link with IPsec? Provide "show run failover".&lt;/P&gt;&lt;P&gt;Conn rate, ACL size, number of xlates is small for this platform.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 13 Oct 2023 09:10:49 GMT</pubDate>
    <dc:creator>tvotna</dc:creator>
    <dc:date>2023-10-13T09:10:49Z</dc:date>
    <item>
      <title>ASA on Firepower 2140 - High CPU usage</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939343#M1104977</link>
      <description>&lt;P&gt;We are seeing a high CPU usage on our network firewall. Does anyone know what the DataPath process is for?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 14:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939343#M1104977</guid>
      <dc:creator>NetworkNinjaAC</dc:creator>
      <dc:date>2023-11-15T14:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA on Firepower 2140 - High CPU usage</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939366#M1104983</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- FYI :&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-security/commands-for-troubleshooting-high-cpu/m-p/4573402#M1088424" target="_blank"&gt;https://community.cisco.com/t5/network-security/commands-for-troubleshooting-high-cpu/m-p/4573402#M1088424&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 16:46:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939366#M1104983</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-10-12T16:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA on Firepower 2140 - High CPU usage</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939368#M1104984</link>
      <description>&lt;P&gt;what kind of traffic this FW handling?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 16:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939368#M1104984</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-10-12T16:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA on Firepower 2140 - High CPU usage</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939375#M1104986</link>
      <description>&lt;P&gt;It sits at the perimeter of the network so all traffic traverses through it.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 17:05:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939375#M1104986</guid>
      <dc:creator>NetworkNinjaAC</dc:creator>
      <dc:date>2023-10-12T17:05:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA on Firepower 2140 - High CPU usage</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939671#M1104996</link>
      <description>&lt;P&gt;&lt;SPAN&gt;what kind of traffic this FW handling?&amp;nbsp; &amp;nbsp;- i mean bandwidth wise, ? post interface output how much utilization.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Oct 2023 08:12:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939671#M1104996</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-10-13T08:12:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA on Firepower 2140 - High CPU usage</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939707#M1104999</link>
      <description>&lt;P&gt;Processes CPU usage is not normal, because it is displayed incorrectly in this version due to CSCvt15348. Actually, it is very high in datapath. This can be caused by high pps rate or high drop rate, so you need to collect "clear traffic" / "show traffic" (once, but wait 1 minute after clearing) and "clear asp drop" / "show clock" + "show asp drop" (thrice) (to see how drops increase over time).&lt;/P&gt;&lt;P&gt;You're running out of 1550B and 80B blocks. The former can be attributed to high CPU. The latter is a bug. Do you encrypt failover link with IPsec? Provide "show run failover".&lt;/P&gt;&lt;P&gt;Conn rate, ACL size, number of xlates is small for this platform.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Oct 2023 09:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939707#M1104999</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-10-13T09:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA on Firepower 2140 - High CPU usage</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939745#M1105000</link>
      <description>&lt;P&gt;Datapath sometimes is big problem.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Usually Datapath is for VPN (s2s or anyconnect).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you can open TAC with cisco it better and fast way to know why these processes utilize your FW CPU.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Oct 2023 09:16:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939745#M1105000</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-10-13T09:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA on Firepower 2140 - High CPU usage</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939859#M1105007</link>
      <description>&lt;P&gt;oh ok sorry for misunderstanding, this was this morning with low traffic and cpu at 50%:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 15:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-firepower-2140-high-cpu-usage/m-p/4939859#M1105007</guid>
      <dc:creator>NetworkNinjaAC</dc:creator>
      <dc:date>2023-11-15T15:23:20Z</dc:date>
    </item>
  </channel>
</rss>

