<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: High CPU Utilization due to IPS Policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219710#M1117288</link>
    <description>&lt;P&gt;When I had a TAC case on this they said that this was remediated in version 7.2.5, that being said it is quite possible that the issue was not actually solved or was re-introduced.&lt;/P&gt;
&lt;P&gt;The thing with the FTD2000 series is that although you can enable Elephant flow detection, there is no remediation even if you enable it.&amp;nbsp; For remediation you would need to exchange the FTD2140 with either FTD1000, FTD3000 or FTD4100.&lt;/P&gt;
&lt;P&gt;A suggestion from me would be to upgrade to the latest star version which is 7.4.2.1.&amp;nbsp; This will no doubt be a suggestion from TAC should you open a case with them.&lt;/P&gt;</description>
    <pubDate>Mon, 04 Nov 2024 13:59:21 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2024-11-04T13:59:21Z</dc:date>
    <item>
      <title>High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219615#M1117279</link>
      <description>&lt;P&gt;Hi to all,&lt;/P&gt;&lt;P&gt;i am posting this in order to have your opinion about it.&lt;/P&gt;&lt;P&gt;Today our users behind the FTD faced timeouts as well as high RTTs.&lt;/P&gt;&lt;P&gt;Digging a little bit i noticed that CPU core 16 (not the other cores)&amp;nbsp; was continuously steady at 100%.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After disabling the IPS policy for the outgoing traffic&amp;nbsp; the timeouts stopped and the RTTs returned to normal.&lt;/P&gt;&lt;P&gt;So i decided to keep&amp;nbsp; the IPS process only for the incoming traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;How could i identify the offending host or hosts ?&amp;nbsp; In addition is there any possibility for this to happen due to elephant flows passing through the firewall or probably a huge backup from inside to the Internet?&lt;/P&gt;&lt;P&gt;Any views/opinions are most welcome.&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 11:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219615#M1117279</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-11-04T11:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219621#M1117281</link>
      <description>&lt;P&gt;What FTD hardware are you running and what version software is installed on the FTD?&lt;/P&gt;
&lt;P&gt;I have seen high latency being caused by Elephant flows and enabling Elephant flow remediation or sending that traffic outside of the IPS solves the issue.&amp;nbsp; Do you have Elephant flow detection enabled?&amp;nbsp; If yes you can search the "Analysis" logs for Elephant flows and see which source IPs were causing it.&lt;/P&gt;
&lt;P&gt;But seeing a single core at 100% is normal at times.&amp;nbsp; The core number will change from time to time also.&amp;nbsp; When CPU becomes a problem is when several or all CPU cores are at 100%.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 12:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219621#M1117281</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-11-04T12:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219630#M1117283</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;CODE class="cCN_CmdName"&gt;&amp;nbsp; show asp inspect-dp snort&lt;/CODE&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;CODE class="cCN_CmdName"&gt;&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;CODE class="cCN_CmdName"&gt;&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;CODE class="cCN_CmdName"&gt;&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;CODE class="cCN_CmdName"&gt;&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 12:10:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219630#M1117283</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-04T12:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219677#M1117284</link>
      <description>&lt;P&gt;Hi Marius and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for your response.&lt;/P&gt;&lt;P&gt;i am running 7.2.8 on the FTD cluster&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; show version&lt;/STRONG&gt;&lt;BR /&gt;---------------------[ ftd-1 ]----------------------&lt;BR /&gt;Model : Cisco Firepower 2140 Threat Defense (77) Version 7.2.8 (Build 25)&lt;BR /&gt;UUID : 5857ad62-0bf5-11ed-b5a5-a5352e00b8f4&lt;BR /&gt;LSP version : lsp-rel-20241030-1856&lt;BR /&gt;VDB version : 397&lt;/P&gt;&lt;P&gt;and i am running 7.4.2 on the FMC.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; show version&lt;/STRONG&gt;&lt;BR /&gt;----------------------[ fmc ]-----------------------&lt;BR /&gt;Model : Secure Firewall Management Center for VMware (66) Version 7.4.2 (Build 172)&lt;BR /&gt;UUID : 0be5b5be-bc49-11ed-8b60-038ff8fad965&lt;BR /&gt;Rules update version : 2024-10-30-001-vrt&lt;BR /&gt;LSP version : lsp-rel-20241030-1856&lt;BR /&gt;VDB version : 397&lt;/P&gt;&lt;P&gt;What i noticed is that although i had activated elephant flows i hadn't enable the bypass from within the same menu.&amp;nbsp;&lt;/P&gt;&lt;P&gt;However IAB was active.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But i can not find any elephant flows from the analysis menu (although i filter with the field "Reason" for Elephant Flows.&lt;/P&gt;&lt;P&gt;Please see the attached PNGs.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;&lt;P&gt;Please see attached PNGs.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 13:19:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219677#M1117284</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-11-04T13:19:45Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219684#M1117285</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;on my primary FTD:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show asp inspect-dp snort&lt;/P&gt;&lt;P&gt;SNORT Inspect Instance Status Info&lt;/P&gt;&lt;P&gt;Id Pid Conns Segs/Pkts Status&lt;BR /&gt;-- ----- ---------- ---------- ----------&lt;BR /&gt;0 32159 1.9 K 0 READY&lt;BR /&gt;1 32162 1.9 K 0 READY&lt;BR /&gt;2 32166 2 K 0 READY&lt;BR /&gt;3 32183 2 K 0 READY&lt;BR /&gt;4 32164 1.9 K 0 READY&lt;BR /&gt;5 32165 1.9 K 0 READY&lt;BR /&gt;6 32185 2 K 0 READY&lt;BR /&gt;7 32138 2 K 0 READY&lt;BR /&gt;8 32186 2 K 0 READY&lt;BR /&gt;9 32156 1.9 K 0 READY&lt;BR /&gt;10 32140 1.9 K 0 READY&lt;BR /&gt;11 32158 2 K 1 READY&lt;BR /&gt;12 32187 2 K 0 READY&lt;BR /&gt;-- ----- ---------- ---------- ----------&lt;BR /&gt;Summary 25.4 K 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 13:23:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219684#M1117285</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-11-04T13:23:45Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219709#M1117287</link>
      <description>&lt;P&gt;It would be interesting to see what type of traffic are you currently inspecting under that IPS policy. Even though Elephant Flows event did not trigger, maybe the massive amount of inspected traffic could have something to do with it. What are your top applications that are hitting that IPS Rule at this moment?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 13:59:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219709#M1117287</guid>
      <dc:creator>ckleopa</dc:creator>
      <dc:date>2024-11-04T13:59:17Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219710#M1117288</link>
      <description>&lt;P&gt;When I had a TAC case on this they said that this was remediated in version 7.2.5, that being said it is quite possible that the issue was not actually solved or was re-introduced.&lt;/P&gt;
&lt;P&gt;The thing with the FTD2000 series is that although you can enable Elephant flow detection, there is no remediation even if you enable it.&amp;nbsp; For remediation you would need to exchange the FTD2140 with either FTD1000, FTD3000 or FTD4100.&lt;/P&gt;
&lt;P&gt;A suggestion from me would be to upgrade to the latest star version which is 7.4.2.1.&amp;nbsp; This will no doubt be a suggestion from TAC should you open a case with them.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 13:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219710#M1117288</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-11-04T13:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219716#M1117289</link>
      <description>&lt;P&gt;When the problem first occured i did inspect all outgoing traffic from around 1000 PCs (that is traffic going to Internet) , after the problem occured i stopped inspecting this traffic and the problem stopped, so currently&amp;nbsp; i do not inspect outgoing traffic , only incoming traffic to specific ports.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 14:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219716#M1117289</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-11-04T14:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219794#M1117299</link>
      <description>&lt;P&gt;OK so you don't see this issue anymore. I guess one possible solution is to see if your connection events during the time of the high cpu usage is still available and try to create a report of the top Application Protocols that hit that IPS rule and see if this would provide any hints on where most of the inspection time went though it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In general, application protocols that are not encrypted do get the most inspection and based on those you can get some guidelines on what could have been the reason for the high cpu usage.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 15:55:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219794#M1117299</guid>
      <dc:creator>ckleopa</dc:creator>
      <dc:date>2024-11-04T15:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219847#M1117303</link>
      <description>&lt;P&gt;When it happened again check snort cpu&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For snort not lina cpu health use&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Root@firepower:/opt/cisco/csp/application# top&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 17:10:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219847#M1117303</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-04T17:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219902#M1117313</link>
      <description>&lt;P&gt;Hi Ckleopa, i limited down the observation window during the high cpu load period and by using the predefined searches i searched for elephant flows&amp;nbsp; but i did not find anything.&amp;nbsp; So i assume something else kept the cpu load to 100% (CPU core num. 16 in particular). However don't know how to search further for the reason of high cpu util. which actually affected all users with dropped packets and high RTT.&amp;nbsp; Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 18:37:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219902#M1117313</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-11-04T18:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219905#M1117314</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently , with no intense network traffic the snort process keeps cpu load @&amp;nbsp;48% and as mentioned it inspects traffic only in the incoming direction and only in high tcp/udp ports.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND&lt;BR /&gt;28736 root 1 -19 17.4g 8.1g 3.0g S &lt;STRONG&gt;48.7&lt;/STRONG&gt; 12.9 326:50.34 snort3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 18:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5219905#M1117314</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-11-04T18:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5221497#M1117405</link>
      <description>&lt;P&gt;Hi to all,&lt;/P&gt;&lt;P&gt;The problems continued with high unresponsiveness and with No active IPS rule and in addition&amp;nbsp; &amp;nbsp;i also enabled the NO RULE ACTIVE in the IPS policy.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The users still complaining&amp;nbsp; for very slow network response even though i checked the CPU and int was not high at all.&lt;/P&gt;&lt;P&gt;The message i got (i am not sure when i got this message) , i mean before or after activating the no rules active in the IPS Policy )&amp;nbsp; &amp;nbsp;and it was the following:&lt;/P&gt;&lt;P&gt;Module: Automatic Application Bypass Status&lt;BR /&gt;Description: [12132] Process '/ngfw/var/sf/detection_engines/f08edaa6-0bf5-11ed-9aa5-95282f00b8f4/snort3 --plugin-path /ngfw/var/sf/detection_engines/f08edaa6-0bf5-11ed-9aa5-95282f00b8f4/plugins:/ngfw/var/sf/lsp/active-so_rules --daq-dir /ngfw/usr/local/sf/lib/daq3 -M -Q -v -c /ngfw/var/sf/detection_engines/f08edaa6-0bf5-11ed-9aa5-95282f00b8f4/snort3.lua -l /ngfw/var/sf/detection_engines/f08edaa6-0bf5-11ed-9aa5-95282f00b8f4 --id-offset 1 --id-subdir --id-zero --run-prefix instance- --control-socket /ngfw/var/sf/detection_engines/f08edaa6-0bf5-11ed-9aa5-95282f00b8f4/snort3.sock --create-pidfile -s 1500 -z 13 ' bypassed.&lt;/P&gt;&lt;P&gt;Dont seem to be very clear message to me , as IPS policy was not active in any rule and what i did in order to make things work again , was to remove from the FTD a vlan consisting of many users.&amp;nbsp; This brought things back to normal and traffic started to flow again.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking at connection events and unified events i could not find the offending host (or hosts) .&amp;nbsp;&lt;/P&gt;&lt;P&gt;How could i troubleshoot this situation and have insight before just removing a vlan because simply it consisted of many users (and apparently my assumption was correct , but just an assumption &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 14:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5221497#M1117405</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-11-07T14:22:13Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5221621#M1117416</link>
      <description>&lt;P&gt;as you share above the Top was Snort&amp;nbsp;&lt;BR /&gt;so it snort issue&amp;nbsp;&lt;BR /&gt;try reduce the snort level&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (183).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/233449i6E864C41AC0DAF4E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (183).png" alt="Screenshot (183).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 16:47:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5221621#M1117416</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-07T16:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5221625#M1117417</link>
      <description>&lt;P&gt;Well if this is still causing issues for you I would recommend opening up a TAC case. They can work with you to isolate where most of the CPU resources are going and propose optimizations on the access control rules around this.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 17:00:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5221625#M1117417</guid>
      <dc:creator>ckleopa</dc:creator>
      <dc:date>2024-11-07T17:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5221863#M1117432</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;and &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/356861"&gt;@ckleopa&lt;/a&gt;&amp;nbsp;Previously i had enabled the balanced mode , now according to your suggestions i activated the Connectivity over Security (now only 584 rules active). In addition i upgraded the FTDs to version 7.4.2.1-30 as well as the FMC to version 7.6.0-113.&lt;/P&gt;&lt;P&gt;I will also try the Cisco Recommended Rules but i noticed that it asked me on what ipv4/ipv6 networks i want the ips rules active.&amp;nbsp; But i have already configured the appropriate ipv4/ipv6 networks that i have activated the IPS policy, i do not understand why the system asks me this question about the networks i want the IPS policy active.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 08:24:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5221863#M1117432</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-11-08T08:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU Utilization due to IPS Policy</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5221865#M1117433</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/356861"&gt;@ckleopa&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Update: Going one step further and by accepting Cisco IPS Recommendations the rules increased from 584 active rules to 2996 rules (alert:158 and block:2838)&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 08:32:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-due-to-ips-policy/m-p/5221865#M1117433</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2024-11-08T08:32:31Z</dc:date>
    </item>
  </channel>
</rss>

