<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower FTD high CPU in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5034573#M1109654</link>
    <description>&lt;P&gt;What is the no form of the "capture cap-asp" command. Because I stopped it and wanted to redo it. I tried configuring another capture, but it says "error: another capture associated with this drop"&lt;/P&gt;</description>
    <pubDate>Tue, 05 Mar 2024 19:58:40 GMT</pubDate>
    <dc:creator>David Rollins</dc:creator>
    <dc:date>2024-03-05T19:58:40Z</dc:date>
    <item>
      <title>Firepower FTD high CPU</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5032020#M1109573</link>
      <description>&lt;P&gt;Firepower FTD CPU 07 spiked to 100% earlier today. And it corresponds to the same time there was a spike on snort03. Snort-busy Frame drops - Snort busy started averaging 100 drops/sec.&lt;/P&gt;&lt;P&gt;Is there a way for me to identify what traffic may have started this?&lt;/P&gt;&lt;P&gt;I have looked into&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-security/high-cpu-usage-in-ftd/td-p/4793469" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/network-security/high-cpu-usage-in-ftd/td-p/4793469 &lt;/A&gt;and&amp;nbsp;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCwh58213" target="_blank" rel="noopener"&gt;https://bst.cisco.com/bugsearch/bug/CSCwh58213&lt;/A&gt;&lt;/P&gt;&lt;P&gt;as possible issues. But disabling&amp;nbsp;&lt;SPAN&gt;TLS server identity discovery didn't resolve it. I even tried failing over to secondary HA. Issue came right back on secondary.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So I'm certain there is current network traffic causing it. But I'm unsure how to find out. Is there a way to do a packet capture on the ASP drops? Or a command in Lina to find out what traffic is tying up snort?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We are currently running FP 4112 version 7.0.5&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 21:30:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5032020#M1109573</guid>
      <dc:creator>David Rollins</dc:creator>
      <dc:date>2024-03-01T21:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FTD high CPU</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5032056#M1109578</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/338007"&gt;@David Rollins&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Another thought I have could be related to the rules if they are using the app IDs instead of the service ports?! sometimes when using the app IDs the firewall needs to see more traffic before it can understand what app ID is inside the payload, that could potentially cause some temp drops.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 22:53:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5032056#M1109578</guid>
      <dc:creator>Ruben Cocheno</dc:creator>
      <dc:date>2024-03-01T22:53:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FTD high CPU</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5032731#M1109584</link>
      <description>&lt;P&gt;Good question. Lina ASP drop capture should be able to capture "snort-busy" drops. Try "capture cap-asp type asp-drop snort-busy".&lt;/P&gt;&lt;P&gt;Also, "show asp inspect-dp" commands have instance-id argument and can display statistics per Snort instance. The "show asp inspect-dp snort" can show which instance has high CPU and "show asp inspect-dp snort queues" displays instance queue utilization. The "show asp inspect-dp snort counters rate" displays per-queue traffic rate. If some queue is exhausted, Lina should take a snapshot of the queue automatically: "show asp inspect-dp snort queue-exhaustion". The snapshot in .pcap format can be offloaded for analysis: "show capture", "show capture &amp;lt;name&amp;gt;", "show asp inspect-dp snort queue-exhaustion export &lt;A href="ftp://...&amp;quot;" target="_blank"&gt;ftp://..."&lt;/A&gt;. This can help identify problematic flows.&lt;/P&gt;&lt;P&gt;FMC Analysis &amp;gt; Search should be able to search connection events by Snort instance-id. In case of Snort3 Elephant Flow Detection feature can help identify elephant flows and display them:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/snort/740/snort3-configuration-guide-v74/m_configure-elephant-flow-detection-and-remediation.html#view-events-for-elephant-flows" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/snort/740/snort3-configuration-guide-v74/m_configure-elephant-flow-detection-and-remediation.html#view-events-for-elephant-flows&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Mar 2024 16:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5032731#M1109584</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-03-02T16:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FTD high CPU</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5034573#M1109654</link>
      <description>&lt;P&gt;What is the no form of the "capture cap-asp" command. Because I stopped it and wanted to redo it. I tried configuring another capture, but it says "error: another capture associated with this drop"&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2024 19:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5034573#M1109654</guid>
      <dc:creator>David Rollins</dc:creator>
      <dc:date>2024-03-05T19:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FTD high CPU</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035083#M1109676</link>
      <description>&lt;P&gt;no capture cap-asp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 14:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035083#M1109676</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-03-06T14:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FTD high CPU</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035092#M1109677</link>
      <description>&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;This is what I know:&lt;/P&gt;&lt;P&gt;Use CLI Commands to Monitor CPU Usage:&lt;/P&gt;&lt;P&gt;Log in to the FTD device's CLI and use commands like &lt;STRONG&gt;show cpu usage&lt;/STRONG&gt; or &lt;STRONG&gt;show processes cpu-usage sorted&lt;/STRONG&gt; to monitor CPU utilization. Look for any processes or threads consuming excessive CPU resources.&lt;BR /&gt;Check Snort Statistics:&lt;/P&gt;&lt;P&gt;Since you noticed a spike in Snort CPU usage, check Snort statistics using the &lt;STRONG&gt;show snort statistics&lt;/STRONG&gt; command. Look for any anomalies or excessive activity that might be causing the CPU spike.&lt;BR /&gt;Packet Capture for ASP Drops:&lt;/P&gt;&lt;P&gt;You can use packet capture functionality to capture traffic associated with ASP (Accelerated Security Path) drops. Use the following command to configure a capture:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;capture capture_name interface ingress capture_filter&lt;/LI-CODE&gt;&lt;P&gt;Replace &lt;EM&gt;capture_name&lt;/EM&gt; with a name for the capture, &lt;EM&gt;interface&lt;/EM&gt; with the interface where drops are occurring, and &lt;EM&gt;capture_filter&lt;/EM&gt; with a filter to capture specific traffic (if needed).&lt;BR /&gt;After capturing packets, you can use Wireshark or similar tools to analyze the captured traffic and identify any anomalies or excessive traffic causing drops.&lt;BR /&gt;Inspect Logs for Anomalies:&lt;/P&gt;&lt;P&gt;Check system logs (&lt;STRONG&gt;show logging&lt;/STRONG&gt;) for any unusual events or error messages that might indicate the cause of the CPU spike.&lt;BR /&gt;Review Configuration Changes:&lt;/P&gt;&lt;P&gt;Check for any recent configuration changes or updates that might have triggered the CPU spike. Roll back any recent changes if necessary to isolate the issue.&lt;BR /&gt;Update to Latest Version:&lt;/P&gt;&lt;P&gt;Consider upgrading your FTD device to the latest software version (if feasible) as newer versions often include bug fixes and performance improvements.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 15:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035092#M1109677</guid>
      <dc:creator>Max Jobs</dc:creator>
      <dc:date>2024-03-06T15:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FTD high CPU</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035103#M1109679</link>
      <description>&lt;P&gt;I thought I had tried "&lt;SPAN&gt;no capture cap-asp"&amp;nbsp;&lt;/SPAN&gt;that already, but it took this time. What I did differently this time was exit out of Lina and then connected back to FTD. Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 15:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035103#M1109679</guid>
      <dc:creator>David Rollins</dc:creator>
      <dc:date>2024-03-06T15:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FTD high CPU</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035126#M1109682</link>
      <description>&lt;P&gt;Sorry what traffic effect the Snort ?&lt;/P&gt;
&lt;P&gt;Can you share more details&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 16:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035126#M1109682</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-06T16:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FTD high CPU</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035205#M1109684</link>
      <description>&lt;P&gt;I wasn't able to capture the traffic in time. By the time I started capturing, whoever it was had stopped transferring the data. I really just wanted to know, so the next time it happens I can capture the traffic and identify.&amp;nbsp;&lt;BR /&gt;The other way I thought of identifying the traffic, was through looking at the interfaces with high input and output rates. Then through FMC, doing a packet capture. Seeing what IP address was showing up the most in the packet capture. Then from Lina, doing a "show conn address x.x.x.x"" to confirm how much data has been sent.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 17:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035205#M1109684</guid>
      <dc:creator>David Rollins</dc:creator>
      <dc:date>2024-03-06T17:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FTD high CPU</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035217#M1109685</link>
      <description>&lt;P&gt;I was just to confirm,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The capture IN and Out show traffic ingress and egress the Lina&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Capture-traffic this use for traffic punt to snort,&lt;/P&gt;
&lt;P&gt;But this way we know traffic punt to snort but we don't know which traffic high punt to snort, this from my opinion.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share show conn&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Only few lines&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 17:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035217#M1109685</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-06T17:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FTD high CPU</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035561#M1109707</link>
      <description>&lt;P&gt;Yeah, regular capture can be helpful too. You can also use "show traffic" to see the rate per interface as well as aggregated rate on Internal-Data0/0 which connects ASA to the internal switch. But do "clear traffic" first, otherwise the rate won't be correct.&lt;/P&gt;&lt;P&gt;You can also try EXEC CLI "conn data-rate". This enables per conn traffic rate tracking. Then use:&lt;/P&gt;&lt;P&gt;show conn {long | detail} [data-rate-filter {lt | eq | gt} &amp;lt;value in bytes per second&amp;gt;]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 06:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ftd-high-cpu/m-p/5035561#M1109707</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-03-07T06:30:33Z</dc:date>
    </item>
  </channel>
</rss>

