<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA to ASA firewall Transit link Latency Issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243783#M1118583</link>
    <description>&lt;P&gt;Core Firewall to Core Switch Interfaces&lt;BR /&gt;..........................................................&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;description From_mmcoresw01-Gi1/0/45&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;description From_mmcoresw01-Gi1/0/46&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;lacp max-bundle 8&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.10&lt;BR /&gt;description WEB_VLAN Interface&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif WEB_VLAN&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.30.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.20&lt;BR /&gt;description Application_VLAN Interface&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif APP_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.30&lt;BR /&gt;description Database_VLAN Interface&lt;BR /&gt;vlan 30&lt;BR /&gt;nameif DB_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.3.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.40&lt;BR /&gt;description Management_VLAN Interface&lt;BR /&gt;vlan 40&lt;BR /&gt;nameif MGMT_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.4.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.60&lt;BR /&gt;description VPN_Vlan Interface&lt;BR /&gt;vlan 60&lt;BR /&gt;nameif VPN_Vlan&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.6.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.70&lt;BR /&gt;description API_VLAN&lt;BR /&gt;vlan 70&lt;BR /&gt;nameif API_VLAN&lt;BR /&gt;security-level 20&lt;BR /&gt;ip address 10.30.7.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.80&lt;BR /&gt;description Virtualization VLAN Interface&lt;BR /&gt;vlan 80&lt;BR /&gt;nameif Virtualization_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.8.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.110&lt;BR /&gt;description Inter_VLAN Interface&lt;BR /&gt;vlan 110&lt;BR /&gt;nameif Inter_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.11.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.237&lt;BR /&gt;description Inter_JUMP&lt;BR /&gt;vlan 237&lt;BR /&gt;nameif Inter_JUMP&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.30.237.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.238&lt;BR /&gt;description P_WIFI3&lt;BR /&gt;vlan 238&lt;BR /&gt;nameif P_WIFI3&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.30.238.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.239&lt;BR /&gt;description Inter_JUMP_Share_Acc&lt;BR /&gt;vlan 239&lt;BR /&gt;nameif Jump_SHARE_ACCESS&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.30.239.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jan 2025 03:27:17 GMT</pubDate>
    <dc:creator>Pyie Phyo Htay</dc:creator>
    <dc:date>2025-01-06T03:27:17Z</dc:date>
    <item>
      <title>ASA to ASA firewall Transit link Latency Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243244#M1118570</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;I am currently experiencing network latency issues on the transit link between the ASA Core Firewall and the Edge Firewall, which is using the IP range 172.12.1.0/30.&lt;BR /&gt;The connection from the Edge Firewall to the Internet is functioning without latency issues, and the inter-VLAN network on the Core Firewall is also performing well with no latency concerns.&lt;/P&gt;&lt;P&gt;Please find the testing results below. This issue has been occurring for the past four days. I kindly request assistance in investigating and resolving this issue.&lt;/P&gt;&lt;P&gt;Testing Edge Firewall to Internet is Fine&lt;BR /&gt;.............................................................&lt;BR /&gt;mmedgefw01# ping OUTSIDE 8.8.8.8&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 20/26/30 ms&lt;BR /&gt;mmedgefw01#&lt;/P&gt;&lt;P&gt;Testing Edge to Core Firewall is Too many Latency&lt;BR /&gt;..............................................................................&lt;BR /&gt;mmedgefw01# ping internal 172.12.1.2&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 172.12.1.2, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 370/378/380 ms&lt;BR /&gt;mmedgefw01#&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Interface Output Details for Edge Firewall&lt;BR /&gt;................................................................&lt;BR /&gt;mmedgefw01# show int gigabitEthernet 1/8 detail&lt;BR /&gt;Interface GigabitEthernet1/8 "internal", is up, line protocol is up&lt;BR /&gt;Hardware is Accelerator rev01, BW 1000 Mbps, DLY 10 usec&lt;BR /&gt;Auto-Duplex(Full-duplex), Auto-Speed(1000 Mbps)&lt;BR /&gt;Input flow control is unsupported, output flow control is off&lt;BR /&gt;Description: Connect From DC_ASA01 to DC_CoreASA0/5&lt;BR /&gt;MAC address 10b3.d50c.5e41, MTU 1500&lt;BR /&gt;IP address 172.12.1.1, subnet mask 255.255.255.252&lt;BR /&gt;5822815774095 packets input, 738732956040586 bytes, 0 no buffer&lt;BR /&gt;Received 6 broadcasts, 0 runts, 1 giants&lt;BR /&gt;2 input errors, 0 CRC, 1 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;0 pause input, 0 resume input&lt;BR /&gt;0 L2 decode drops&lt;BR /&gt;5831673410633 packets output, 749966242957387 bytes, 0 underruns&lt;BR /&gt;0 pause output, 0 resume output&lt;BR /&gt;0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;0 late collisions, 0 deferred&lt;BR /&gt;0 input reset drops, 2815 output reset drops&lt;BR /&gt;input queue (blocks free curr/low): hardware (1890/1647)&lt;BR /&gt;output queue (blocks free curr/low): hardware (1957/863)&lt;BR /&gt;Traffic Statistics for "internal":&lt;BR /&gt;4564030233261 packets input, 462204650950260 bytes&lt;BR /&gt;5831673410633 packets output, 644984402563344 bytes&lt;BR /&gt;2027461058814 packets dropped&lt;BR /&gt;1 minute input rate 47471 pkts/sec, 4774615 bytes/sec&lt;BR /&gt;1 minute output rate 47525 pkts/sec, 4790944 bytes/sec&lt;BR /&gt;1 minute drop rate, 23694 pkts/sec&lt;BR /&gt;5 minute input rate 46094 pkts/sec, 4744695 bytes/sec&lt;BR /&gt;5 minute output rate 46280 pkts/sec, 5075050 bytes/sec&lt;BR /&gt;5 minute drop rate, 25807 pkts/sec&lt;BR /&gt;Control Point Interface States:&lt;BR /&gt;Interface number is 9&lt;BR /&gt;Interface config status is active&lt;BR /&gt;Interface state is active&lt;BR /&gt;mmedgefw01#&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Testing Client Users to Internet is Too Many Latency&lt;BR /&gt;.................................................................................&lt;BR /&gt;C:\Users\sysadmin&amp;gt;ping 8.8.8.8&lt;/P&gt;&lt;P&gt;Pinging 8.8.8.8 with 32 bytes of data:&lt;BR /&gt;Reply from 8.8.8.8: bytes=32 time=463ms TTL=119&lt;BR /&gt;Reply from 8.8.8.8: bytes=32 time=447ms TTL=119&lt;BR /&gt;Reply from 8.8.8.8: bytes=32 time=448ms TTL=119&lt;BR /&gt;Reply from 8.8.8.8: bytes=32 time=449ms TTL=119&lt;/P&gt;&lt;P&gt;Ping statistics for 8.8.8.8:&lt;BR /&gt;Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;BR /&gt;Approximate round trip times in milli-seconds:&lt;BR /&gt;Minimum = 447ms, Maximum = 463ms, Average = 451ms&lt;/P&gt;&lt;P&gt;C:\Users\sysadmin&amp;gt;ping 1.1.1.1&lt;/P&gt;&lt;P&gt;Pinging 1.1.1.1 with 32 bytes of data:&lt;BR /&gt;Reply from 1.1.1.1: bytes=32 time=466ms TTL=59&lt;BR /&gt;Reply from 1.1.1.1: bytes=32 time=463ms TTL=59&lt;BR /&gt;Reply from 1.1.1.1: bytes=32 time=465ms TTL=59&lt;BR /&gt;Reply from 1.1.1.1: bytes=32 time=465ms TTL=59&lt;/P&gt;&lt;P&gt;Ping statistics for 1.1.1.1:&lt;BR /&gt;Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;BR /&gt;Approximate round trip times in milli-seconds:&lt;BR /&gt;Minimum = 463ms, Maximum = 466ms, Average = 464ms&lt;/P&gt;&lt;P&gt;Testing Core to Edge Firewall is Too many Latency&lt;BR /&gt;..............................................................................&lt;BR /&gt;mmcorefw01# ping outside 172.12.1.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 172.12.1.1, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 360/370/380 ms&lt;BR /&gt;mmcorefw01# ping outside 172.12.1.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 172.12.1.1, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 370/378/380 ms&lt;BR /&gt;mmcorefw01#&lt;/P&gt;&lt;P&gt;Testing Core Firewall Inter-vlan network is Fine&lt;BR /&gt;........................................................................&lt;BR /&gt;mmcorefw01# ping 10.30.4.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.30.4.1, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;mmcorefw01# ping 10.30.1.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.30.1.1, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;mmcorefw01# ping 10.30.2.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.30.2.1, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;mmcorefw01#&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Interface Output Details for Core Firewall&lt;BR /&gt;................................................................&lt;/P&gt;&lt;P&gt;mmcorefw01# show int gigabitEthernet 1/6 detail&lt;BR /&gt;Interface GigabitEthernet1/6 "outside", is up, line protocol is up&lt;BR /&gt;Hardware is Accelerator rev01, BW 1000 Mbps, DLY 10 usec&lt;BR /&gt;Auto-Duplex(Full-duplex), Auto-Speed(1000 Mbps)&lt;BR /&gt;Input flow control is unsupported, output flow control is off&lt;BR /&gt;Description: To_external_Firewall&lt;BR /&gt;MAC address 4c77.6ddb.0d17, MTU 1500&lt;BR /&gt;IP address 172.12.1.2, subnet mask 255.255.255.252&lt;BR /&gt;4470321914307 packets input, 557350686697772 bytes, 0 no buffer&lt;BR /&gt;Received 0 broadcasts, 0 runts, 0 giants&lt;BR /&gt;0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;0 pause input, 0 resume input&lt;BR /&gt;0 L2 decode drops&lt;BR /&gt;4463793158460 packets output, 548767561908401 bytes, 0 underruns&lt;BR /&gt;0 pause output, 0 resume output&lt;BR /&gt;0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;0 late collisions, 0 deferred&lt;BR /&gt;0 input reset drops, 112 output reset drops&lt;BR /&gt;input queue (blocks free curr/low): hardware (1845/1785)&lt;BR /&gt;output queue (blocks free curr/low): hardware (1957/1543)&lt;BR /&gt;Traffic Statistics for "outside":&lt;BR /&gt;4470297536508 packets input, 476862988019735 bytes&lt;BR /&gt;4463793158462 packets output, 468407354516332 bytes&lt;BR /&gt;3891468 packets dropped&lt;BR /&gt;1 minute input rate 44920 pkts/sec, 4679338 bytes/sec&lt;BR /&gt;1 minute output rate 44912 pkts/sec, 4681721 bytes/sec&lt;BR /&gt;1 minute drop rate, 0 pkts/sec&lt;BR /&gt;5 minute input rate 46776 pkts/sec, 4777599 bytes/sec&lt;BR /&gt;5 minute output rate 46782 pkts/sec, 4771532 bytes/sec&lt;BR /&gt;5 minute drop rate, 0 pkts/sec&lt;BR /&gt;Control Point Interface States:&lt;BR /&gt;Interface number is 7&lt;BR /&gt;Interface config status is active&lt;BR /&gt;Interface state is active&lt;BR /&gt;mmcorefw01#&lt;/P&gt;&lt;P&gt;Many Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jan 2025 06:01:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243244#M1118570</guid>
      <dc:creator>Pyie Phyo Htay</dc:creator>
      <dc:date>2025-01-04T06:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to ASA firewall Transit link Latency Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243273#M1118571</link>
      <description>&lt;P&gt;This slow of asa' mean issue here is asa have high cpu utilize.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jan 2025 09:52:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243273#M1118571</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-04T09:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to ASA firewall Transit link Latency Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243438#M1118578</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I checked the Core and Edge Firewall CPU usage, it was below 64%.&lt;/P&gt;&lt;P&gt;Yesterday, I replaced it with a new UTP cable, and the latency returned to 1-5 ms. However, several hours ago, the latency increased significantly to 130-300 ms.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Jan 2025 04:35:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243438#M1118578</guid>
      <dc:creator>Pyie Phyo Htay</dc:creator>
      <dc:date>2025-01-05T04:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to ASA firewall Transit link Latency Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243474#M1118579</link>
      <description>&lt;P&gt;can I see show interface detail for interface connect to inside SW&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 05 Jan 2025 09:28:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243474#M1118579</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-05T09:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to ASA firewall Transit link Latency Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243782#M1118582</link>
      <description>&lt;P&gt;sure bro, please kindly see the output&lt;BR /&gt;Core Firewall to Core Switch are connected via gi 1/1 - 1/2 by using portchannel 1.&lt;/P&gt;&lt;P&gt;Edge Firewall CPU Usage&lt;BR /&gt;.......................................&lt;BR /&gt;mmedgefw01# show cpu usage&lt;BR /&gt;CPU utilization for 5 seconds = 71%; 1 minute: 71%; 5 minutes: 70%&lt;/P&gt;&lt;P&gt;Core Firewall CPU Usage&lt;BR /&gt;.......................................&lt;BR /&gt;mmcorefw01# show cpu usage&lt;BR /&gt;CPU utilization for 5 seconds = 52%; 1 minute: 53%; 5 minutes: 52%&lt;/P&gt;&lt;P&gt;Core Firewall to Core Switch Interfaces Details&lt;BR /&gt;.......................................................................&lt;BR /&gt;mmcorefw01# show int gigabitEthernet 1/1 detail&lt;BR /&gt;Interface GigabitEthernet1/1 "", is up, line protocol is up&lt;BR /&gt;Hardware is Accelerator rev01, BW 1000 Mbps, DLY 10 usec&lt;BR /&gt;Auto-Duplex(Full-duplex), Auto-Speed(1000 Mbps)&lt;BR /&gt;Input flow control is unsupported, output flow control is off&lt;BR /&gt;Description: From_mmcoresw01-Gi1/0/45&lt;BR /&gt;Active member of Port-channel1&lt;BR /&gt;MAC address 4c77.6ddb.0d12, MTU not set&lt;BR /&gt;IP address unassigned&lt;BR /&gt;75939910780 packets input, 85920472514775 bytes, 0 no buffer&lt;BR /&gt;Received 89191516 broadcasts, 0 runts, 0 giants&lt;BR /&gt;0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;0 pause input, 0 resume input&lt;BR /&gt;0 L2 decode drops&lt;BR /&gt;27428808800 packets output, 18627299086259 bytes, 0 underruns&lt;BR /&gt;0 pause output, 0 resume output&lt;BR /&gt;0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;0 late collisions, 0 deferred&lt;BR /&gt;0 input reset drops, 0 output reset drops&lt;BR /&gt;input queue (blocks free curr/low): hardware (1933/1820)&lt;BR /&gt;output queue (blocks free curr/low): hardware (2047/947)&lt;BR /&gt;Control Point Interface States:&lt;BR /&gt;Interface number is 2&lt;BR /&gt;Interface config status is active&lt;BR /&gt;Interface state is active&lt;BR /&gt;mmcorefw01# show int gigabitEthernet 1/2 de&lt;BR /&gt;mmcorefw01# show int gigabitEthernet 1/2 detail&lt;BR /&gt;Interface GigabitEthernet1/2 "", is up, line protocol is up&lt;BR /&gt;Hardware is Accelerator rev01, BW 1000 Mbps, DLY 10 usec&lt;BR /&gt;Auto-Duplex(Full-duplex), Auto-Speed(1000 Mbps)&lt;BR /&gt;Input flow control is unsupported, output flow control is off&lt;BR /&gt;Description: From_mmcoresw01-Gi1/0/46&lt;BR /&gt;Active member of Port-channel1&lt;BR /&gt;MAC address 4c77.6ddb.0d13, MTU not set&lt;BR /&gt;IP address unassigned&lt;BR /&gt;14563444842 packets input, 8378972393927 bytes, 0 no buffer&lt;BR /&gt;Received 44973209 broadcasts, 0 runts, 0 giants&lt;BR /&gt;0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;0 pause input, 0 resume input&lt;BR /&gt;0 L2 decode drops&lt;BR /&gt;857264089413 packets output, 190654612789646 bytes, 0 underruns&lt;BR /&gt;0 pause output, 0 resume output&lt;BR /&gt;0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;0 late collisions, 0 deferred&lt;BR /&gt;0 input reset drops, 0 output reset drops&lt;BR /&gt;input queue (blocks free curr/low): hardware (1978/1820)&lt;BR /&gt;output queue (blocks free curr/low): hardware (2047/1087)&lt;BR /&gt;Control Point Interface States:&lt;BR /&gt;Interface number is 3&lt;BR /&gt;Interface config status is active&lt;BR /&gt;Interface state is active&lt;BR /&gt;mmcorefw01#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 03:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243782#M1118582</guid>
      <dc:creator>Pyie Phyo Htay</dc:creator>
      <dc:date>2025-01-06T03:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to ASA firewall Transit link Latency Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243783#M1118583</link>
      <description>&lt;P&gt;Core Firewall to Core Switch Interfaces&lt;BR /&gt;..........................................................&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;description From_mmcoresw01-Gi1/0/45&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;description From_mmcoresw01-Gi1/0/46&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;lacp max-bundle 8&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.10&lt;BR /&gt;description WEB_VLAN Interface&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif WEB_VLAN&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.30.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.20&lt;BR /&gt;description Application_VLAN Interface&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif APP_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.30&lt;BR /&gt;description Database_VLAN Interface&lt;BR /&gt;vlan 30&lt;BR /&gt;nameif DB_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.3.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.40&lt;BR /&gt;description Management_VLAN Interface&lt;BR /&gt;vlan 40&lt;BR /&gt;nameif MGMT_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.4.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.60&lt;BR /&gt;description VPN_Vlan Interface&lt;BR /&gt;vlan 60&lt;BR /&gt;nameif VPN_Vlan&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.6.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.70&lt;BR /&gt;description API_VLAN&lt;BR /&gt;vlan 70&lt;BR /&gt;nameif API_VLAN&lt;BR /&gt;security-level 20&lt;BR /&gt;ip address 10.30.7.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.80&lt;BR /&gt;description Virtualization VLAN Interface&lt;BR /&gt;vlan 80&lt;BR /&gt;nameif Virtualization_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.8.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.110&lt;BR /&gt;description Inter_VLAN Interface&lt;BR /&gt;vlan 110&lt;BR /&gt;nameif Inter_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.30.11.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.237&lt;BR /&gt;description Inter_JUMP&lt;BR /&gt;vlan 237&lt;BR /&gt;nameif Inter_JUMP&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.30.237.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.238&lt;BR /&gt;description P_WIFI3&lt;BR /&gt;vlan 238&lt;BR /&gt;nameif P_WIFI3&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.30.238.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.239&lt;BR /&gt;description Inter_JUMP_Share_Acc&lt;BR /&gt;vlan 239&lt;BR /&gt;nameif Jump_SHARE_ACCESS&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.30.239.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 03:27:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243783#M1118583</guid>
      <dc:creator>Pyie Phyo Htay</dc:creator>
      <dc:date>2025-01-06T03:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to ASA firewall Transit link Latency Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243811#M1118585</link>
      <description>&lt;P&gt;&lt;SPAN&gt;asa# show processes cpu-usage sorted non-zero &amp;lt;&amp;lt;- share this the cpu is 71% this little high we need to know which process run in cpu&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 06:34:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243811#M1118585</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-06T06:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to ASA firewall Transit link Latency Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243816#M1118586</link>
      <description>&lt;P&gt;mmedgefw01# show cpu usage&lt;BR /&gt;CPU utilization for 5 seconds = 69%; 1 minute: 69%; 5 minutes: 70%&lt;BR /&gt;mmedgefw01# show processes cpu-usage sorted non-zero&lt;BR /&gt;Hardware: ASA5516&lt;BR /&gt;Cisco Adaptive Security Appliance Software Version 9.8(4)25&lt;BR /&gt;ASLR enabled, text region 7f8db8529000-7f8dbc8c7e5c&lt;BR /&gt;PC Thread 5Sec 1Min 5Min Process&lt;BR /&gt;- - 29.5% 29.5% 29.6% DATAPATH-0-2045&lt;BR /&gt;- - 29.3% 29.4% 29.4% DATAPATH-1-2046&lt;BR /&gt;0x00007f8dba9b46dc 0x00007f8da12ca000 7.0% 7.0% 7.2% Logger&lt;BR /&gt;0x00007f8db937beb9 0x00007f8da12b9b00 3.1% 3.0% 3.1% CP Processing&lt;BR /&gt;0x00007f8dbaa3b3ab 0x00007f8da12ad740 0.2% 0.1% 0.0% snmp&lt;BR /&gt;0x00007f8dba7cf35a 0x00007f8da12ad3a0 0.1% 0.1% 0.1% IP SLA Mon Event Processor&lt;BR /&gt;0x00007f8dbaa71718 0x00007f8da12adae0 0.0% 0.1% 0.1% Unicorn Proxy Thread&lt;BR /&gt;mmedgefw01# show processes cpu-usage sorted non-zero&lt;BR /&gt;Hardware: ASA5516&lt;BR /&gt;Cisco Adaptive Security Appliance Software Version 9.8(4)25&lt;BR /&gt;ASLR enabled, text region 7f8db8529000-7f8dbc8c7e5c&lt;BR /&gt;PC Thread 5Sec 1Min 5Min Process&lt;BR /&gt;- - 29.5% 29.5% 29.5% DATAPATH-0-2045&lt;BR /&gt;- - 29.4% 29.4% 29.4% DATAPATH-1-2046&lt;BR /&gt;0x00007f8dba9b46dc 0x00007f8da12ca000 7.2% 7.1% 7.2% Logger&lt;BR /&gt;0x00007f8db937beb9 0x00007f8da12b9b00 3.1% 3.1% 3.1% CP Processing&lt;BR /&gt;0x00007f8dba7cf35a 0x00007f8da12ad3a0 0.1% 0.1% 0.1% IP SLA Mon Event Processor&lt;BR /&gt;0x00007f8dbaa71718 0x00007f8da12adae0 0.0% 0.1% 0.0% Unicorn Proxy Thread&lt;BR /&gt;0x00007f8dbaa3b3ab 0x00007f8da12ad740 0.0% 0.1% 0.0% snmp&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 07:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5243816#M1118586</guid>
      <dc:creator>Pyie Phyo Htay</dc:creator>
      <dc:date>2025-01-06T07:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to ASA firewall Transit link Latency Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5245011#M1118644</link>
      <description>&lt;P&gt;Finally, I found the solution: the issue was caused by spiking CPU usage in the logger and data path, as shown below:&lt;/P&gt;&lt;P&gt;PC Thread 5Sec 1Min 5Min Process&lt;BR /&gt;- - 29.5% 29.5% 29.5% DATAPATH-0-2045&lt;BR /&gt;- - 29.4% 29.4% 29.4% DATAPATH-1-2046&lt;BR /&gt;0x00007f8dba9b46dc 0x00007f8da12ca000 7.2% 7.1% 7.2% Logger&lt;/P&gt;&lt;P&gt;mmedgefw01# show logging | inc ASA-2&lt;BR /&gt;%ASA-2-106016: Deny IP .30.4.99 on interface internal&lt;BR /&gt;%ASA-2-106016: Deny IP spoof from (172.12.1.1) to 10.30.4.99 on interface internal&lt;BR /&gt;%ASA-2-106016: Deny IP spoof from (172.12.1.1) to 10.30.4.99 on interface internal&lt;BR /&gt;%ASA-2-106016: Deny IP spoof from (172.12.1.1) to 10.30.4.99 on interface internal&lt;BR /&gt;%ASA-2-106016: Deny IP spoof from (172.12.1.1) to 10.30.4.99 on interface internal&lt;/P&gt;&lt;P&gt;mmcorefw01# show logging | inc ASA-4&lt;BR /&gt;0:08:53: %ASA-4-106023: Deny tcp src T1_Immg_Client:172.17.2.158/60166 dst outside:72.52.178.23/443 by access-group "imm-client-acl" [0x0, 0x0]&lt;BR /&gt;Jan 07 2025 00:08:53: %ASA-4-106023: Deny tcp src T1_Immg_Client:172.17.2.162/49387 dst outside:172.202.163.200/443 by access-group "imm-client-acl" [0x0, 0x0]&lt;BR /&gt;Jan 07 2025 00:08:53: %ASA-4-106023: Deny tcp src T1_Immg_Client:172.17.2.162/49389 dst outside:172.202.163.200/443 by access-group "imm-client-acl" [0x0, 0x0]&lt;BR /&gt;Jan 07 2025 00:08:53: %ASA-4-106023: Deny tcp src T1_Immg_Client:172.17.2.144/51642 dst outside:23.202.180.199/443 by access-group "imm-client-acl" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;I attempted to look up the logged level with a "Deny" status due to a misconfiguration in the syslog server configuration on the firewall. The client PCs were sending some traffic to the internet, and the associated ACL was corrected.&lt;BR /&gt;To analyze the issue further, I used the show asp drop command and observed the output as shown below.&lt;BR /&gt;Subsequently, I executed the clear asp drop command, which resolved the latency issues.&lt;/P&gt;&lt;P&gt;mmedgefw01# show asp drop&lt;/P&gt;&lt;P&gt;Frame drop:&lt;BR /&gt;NAT-T keepalive message (natt-keepalive) 4967060&lt;BR /&gt;IPSEC tunnel is down (ipsec-tun-down) 4090&lt;BR /&gt;SVC Module does not have a channel for reinjection (mp-svc-no-channel) 3132&lt;BR /&gt;SVC Module does not have a session (mp-svc-no-session) 2882&lt;BR /&gt;SVC Module is in flow control (mp-svc-flow-control) 1255855&lt;BR /&gt;SVC Module unable to fragment packet (mp-svc-no-fragment) 194&lt;BR /&gt;VPN reclassify failed (vpn-reclassify-failed) 883&lt;BR /&gt;Invalid TCP Length (invalid-tcp-hdr-length) 347&lt;BR /&gt;Invalid UDP Length (invalid-udp-length) 180&lt;BR /&gt;No valid adjacency (no-adjacency) 8451140&lt;BR /&gt;No route to host (no-route) 4614275&lt;BR /&gt;Reverse-path verify failed (rpf-violated) 156&lt;BR /&gt;Flow is denied by configured rule (acl-drop) 2035733454858&lt;BR /&gt;Invalid SPI (np-sp-invalid-spi) 23982&lt;BR /&gt;First TCP packet not SYN (tcp-not-syn) 2847608&lt;BR /&gt;Bad TCP flags (bad-tcp-flags) 4&lt;BR /&gt;TCP Dual open denied (tcp-dual-open) 1489&lt;BR /&gt;TCP data send after FIN (tcp-data-past-fin) 7&lt;BR /&gt;TCP failed 3 way handshake (tcp-3whs-failed) 9586214&lt;BR /&gt;TCP RST/FIN out of order (tcp-rstfin-ooo) 3869990&lt;BR /&gt;TCP SEQ in SYN/SYNACK invalid (tcp-seq-syn-diff) 20856&lt;BR /&gt;TCP SYNACK on established conn (tcp-synack-ooo) 16115&lt;BR /&gt;TCP packet SEQ past window (tcp-seq-past-win) 147766&lt;BR /&gt;TCP invalid ACK (tcp-invalid-ack) 3161&lt;BR /&gt;TCP Out-of-Order packet buffer full (tcp-buffer-full) 2&lt;BR /&gt;TCP Out-of-Order packet buffer timeout (tcp-buffer-timeout) 100&lt;BR /&gt;TCP RST/SYN in window (tcp-rst-syn-in-win) 35868&lt;BR /&gt;TCP dup of packet in Out-of-Order queue (tcp-dup-in-queue) 416&lt;BR /&gt;TCP packet failed PAWS test (tcp-paws-fail) 6960&lt;BR /&gt;SSL first record invalid (ssl-first-record-invalid) 88&lt;BR /&gt;CTM returned error (ctm-error) 222&lt;BR /&gt;Early security checks failed (security-failed) 9938&lt;BR /&gt;Slowpath security checks failed (sp-security-failed) 161465&lt;BR /&gt;IP option drop (invalid-ip-option) 9890&lt;BR /&gt;ICMP Inspect bad icmp code (inspect-icmp-bad-code) 89&lt;BR /&gt;ICMP Inspect seq num not matched (inspect-icmp-seq-num-not-matched) 1625477&lt;BR /&gt;ICMP Error Inspect no existing conn (inspect-icmp-error-no-existing-conn) 4&lt;BR /&gt;DNS Inspect id not matched (inspect-dns-id-not-matched) 1023&lt;BR /&gt;FP L2 rule drop (l2_acl) 86852019&lt;BR /&gt;Unable to obtain connection lock (connection-lock) 3&lt;BR /&gt;Interface is down (interface-down) 29602393&lt;BR /&gt;Dropped pending packets in a closed socket (np-socket-closed) 2903&lt;BR /&gt;Dispatch queue tail drops (dispatch-queue-limit) 1258781304057&lt;BR /&gt;NAT failed (nat-xlate-failed) 37&lt;BR /&gt;Fragment reassembly failed (fragment-reassembly-failed) 1208748&lt;/P&gt;&lt;P&gt;Last clearing: Never&lt;/P&gt;&lt;P&gt;Flow drop:&lt;BR /&gt;Tunnel being brought up or torn down (tunnel-pending) 1766&lt;BR /&gt;SVC replacement connection established (svc-replacement-conn) 1138&lt;BR /&gt;VPN overlap conflict (vpn-overlap-conflict) 4&lt;BR /&gt;VPN decryption missing (vpn-missing-decrypt) 1660838&lt;BR /&gt;NAT reverse path failed (nat-rpf-failed) 3782&lt;BR /&gt;Inspection failure (inspect-fail) 202652&lt;BR /&gt;SSL bad record detected (ssl-bad-record-detect) 8684&lt;BR /&gt;SSL handshake failed (ssl-handshake-failed) 169547&lt;BR /&gt;DTLS hello processed and closed (dtls-hello-close) 4762&lt;BR /&gt;SSL record decryption failed (ssl-record-decrypt-error) 9&lt;BR /&gt;SVC inner policy mismatch failure (svc-selector-failure) 992856&lt;/P&gt;&lt;P&gt;Last clearing: Never&lt;/P&gt;&lt;P&gt;mmedgefw01# clear asp drop&lt;BR /&gt;mmedgefw01# show asp drop&lt;/P&gt;&lt;P&gt;Frame drop:&lt;BR /&gt;Flow is denied by configured rule (acl-drop) 101130&lt;BR /&gt;TCP RST/FIN out of order (tcp-rstfin-ooo) 2&lt;BR /&gt;FP L2 rule drop (l2_acl) 3&lt;BR /&gt;Interface is down (interface-down) 1&lt;BR /&gt;Dispatch queue tail drops (dispatch-queue-limit) 191&lt;/P&gt;&lt;P&gt;Last clearing: 11:51:17 RGN Jan 7 2025 by enable_15&lt;/P&gt;&lt;P&gt;Flow drop:&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 05:25:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5245011#M1118644</guid>
      <dc:creator>Pyie Phyo Htay</dc:creator>
      <dc:date>2025-01-09T05:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to ASA firewall Transit link Latency Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5245025#M1118645</link>
      <description>&lt;P&gt;Sorry but I dont think so'&lt;/P&gt;
&lt;P&gt;The issue come from datapth not from logger' logger is only 7% datapth around 55%&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- - 29.5% 29.5% &lt;STRONG&gt;29.5&lt;/STRONG&gt;% DATAPATH-0-2045&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- - 29.4% 29.4% &lt;STRONG&gt;29.4&lt;/STRONG&gt;% DATAPATH-1-2046&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;0x00007f8dba9b46dc 0x00007f8da12ca000 7.2% 7.1% 7.2% Logger&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;There was command to check stuck datapth but I forget it' I will search again to find it and update you' in same time if issue happened again open TAC.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Datapth stuck is hard to solve.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 06:24:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5245025#M1118645</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-09T06:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to ASA firewall Transit link Latency Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5245027#M1118646</link>
      <description>&lt;P&gt;Good job fixing it yourself &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;clear asp drop by itself does nothing other just clear the counters.. i presume&amp;nbsp; you reduced the load by fixing some logging also ACL which was constantly blocking some legitimate.. also you have some ip spoof you may want to look at it and fix it to again reduce the load.. ..Is that right ?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 06:36:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-firewall-transit-link-latency-issues/m-p/5245027#M1118646</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2025-01-09T06:36:33Z</dc:date>
    </item>
  </channel>
</rss>

