<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-during-flooding-test/m-p/3002216#M148233</link>
    <description>&lt;P&gt;Hi.&lt;/P&gt;
&lt;P&gt;Yes, when you're reaching limit it rises CPU. So you can use CPU stats as a indirect information about hiting a limit (for example I saw 80% CPU load at the ASA 5515-X at the 1Gbit speed of the traffic).&lt;/P&gt;
&lt;P&gt;All you can do for rising a limit is to change device to a better one or to buy one (two, tree or more) more and do a cluster with them (in active/active mode devices are reaching 70% of total bandwith of all devices).&lt;/P&gt;
&lt;P&gt;Best Regards.&lt;/P&gt;</description>
    <pubDate>Mon, 26 Dec 2016 15:46:03 GMT</pubDate>
    <dc:creator>AllertGen</dc:creator>
    <dc:date>2016-12-26T15:46:03Z</dc:date>
    <item>
      <title>High CPU utilization during Flooding test</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-during-flooding-test/m-p/3002213#M148230</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have one 5555-X firewall.&amp;nbsp; Usually the CPU usage is around 25%. Recently just done using TCP flooding test. Which is simply using hping3 to produce TCP flooding forward to firewall inside interface&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;When initiated attack traffic I noticed very high packet drop on inside and interface and a huge spike in ACL drops. The ACL drop was due to invalid TCP packet being used in attack traffic.&amp;nbsp; Keep to find log from firewall syslog&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;SPAN&gt;Dec 23&lt;/SPAN&gt; 2016 12:32:39: %ASA-4-500004: Invalid transport field for protocol=TCP, from 1.1.1.1/44704 to 2.2.2.2/0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;SPAN&gt;Dec 23&lt;/SPAN&gt; 2016 12:32:39: %ASA-4-500004: Invalid transport field for protocol=TCP, from 1.1.1.1/44781 to 2.2.2.2/0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;SPAN&gt;Dec 23&lt;/SPAN&gt; 2016 12:32:39: %ASA-4-500004: Invalid transport field for protocol=TCP, from 1.1.1.1/44908 to 2.2.2.2/0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;SPAN&gt;Dec 23&lt;/SPAN&gt; 2016 12:32:39: %ASA-4-500004: Invalid transport field for protocol=TCP, from 1.1.1.1/44926 to 2.2.2.2/0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;The ASA like was bombarded with high packets/sec which results in packets not being processed at the rate at which they arrive resulting in packet drop and high CPU.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;Also each of the received packet by processed by CPU and discarded which again adds up to CPU spike. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;That's I guess it is a reason for spike in CPU when small size and high packet rate attack.&amp;nbsp; Also, during the testing &lt;/SPAN&gt;I found the CPU usage raised to around 70%. &lt;/P&gt;
&lt;P&gt;Most surprise is that why such high performance firewall will comes with worse result.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you please advise is it expected result? and how can improve the protection at ASA?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-during-flooding-test/m-p/3002213#M148230</guid>
      <dc:creator>Machi Ma</dc:creator>
      <dc:date>2019-03-12T08:42:23Z</dc:date>
    </item>
    <item>
      <title>Hi.</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-during-flooding-test/m-p/3002214#M148231</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;
&lt;P&gt;It highly depends on the level of the packet rate. What packet rate was at your test?&lt;/P&gt;
&lt;P&gt;Just for information: http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-x-series-next-generation-firewalls/data-sheet-c78-729807.html&lt;/P&gt;
&lt;P&gt;Look at the "New connections per second" line.&lt;/P&gt;
&lt;P&gt;Best Regards.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2016 11:36:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-during-flooding-test/m-p/3002214#M148231</guid>
      <dc:creator>AllertGen</dc:creator>
      <dc:date>2016-12-26T11:36:29Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-during-flooding-test/m-p/3002215#M148232</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I saw the max incoming traffic is around 29,000 pkts/sec which I think is reach to limit of 30,000 by spec show.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However, is it CPU really high impact when over or near to limit it can handle?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Anything I can do to improvement?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2016 15:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-during-flooding-test/m-p/3002215#M148232</guid>
      <dc:creator>Machi Ma</dc:creator>
      <dc:date>2016-12-26T15:28:19Z</dc:date>
    </item>
    <item>
      <title>Hi.</title>
      <link>https://community.cisco.com/t5/network-security/high-cpu-utilization-during-flooding-test/m-p/3002216#M148233</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;
&lt;P&gt;Yes, when you're reaching limit it rises CPU. So you can use CPU stats as a indirect information about hiting a limit (for example I saw 80% CPU load at the ASA 5515-X at the 1Gbit speed of the traffic).&lt;/P&gt;
&lt;P&gt;All you can do for rising a limit is to change device to a better one or to buy one (two, tree or more) more and do a cluster with them (in active/active mode devices are reaching 70% of total bandwith of all devices).&lt;/P&gt;
&lt;P&gt;Best Regards.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2016 15:46:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-cpu-utilization-during-flooding-test/m-p/3002216#M148233</guid>
      <dc:creator>AllertGen</dc:creator>
      <dc:date>2016-12-26T15:46:03Z</dc:date>
    </item>
  </channel>
</rss>

