<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX syslog paradox in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-syslog-paradox/m-p/543969#M527827</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We had the same problem here when syslog server or snmp-server (trap) went under maintenance. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command on the pix solved the issue.&lt;/P&gt;&lt;P&gt;icmp permit host _ip_server_ unreachable inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1026574" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1026574&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Feb 2006 14:50:56 GMT</pubDate>
    <dc:creator>mpalardy</dc:creator>
    <dc:date>2006-02-08T14:50:56Z</dc:date>
    <item>
      <title>PIX syslog paradox</title>
      <link>https://community.cisco.com/t5/network-security/pix-syslog-paradox/m-p/543967#M527825</link>
      <description>&lt;P&gt;We have a pix 515E pix fos ver 7 configured to syslog to 2 hosts on trap level info.We have noticed whenever any one syslog is stopped...and do a icmp debug  trace..the pix is found to be receiving icmp  voluminous destination unreachable from the syslog server which is down and the other syslog hosts register icmp type code 3 from the downed syslog server hitting the pix interface.This maked our PIX util peak to 99% &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this mean PIX keeps &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)ICMP keepalives with every syslog hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)And how is it when one syslog server is down  the other syslog server registers icmp type 3 code requests from the syslog server whcih has been downed in such voluminous quantities that the PIX is overwhelmed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normal syslog udp is being used in this setup , as soon as we  drop the logging to warning..the problem disappears&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls advise&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:41:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-syslog-paradox/m-p/543967#M527825</guid>
      <dc:creator>mbalasubramanian</dc:creator>
      <dc:date>2020-02-21T08:41:52Z</dc:date>
    </item>
    <item>
      <title>Re: PIX syslog paradox</title>
      <link>https://community.cisco.com/t5/network-security/pix-syslog-paradox/m-p/543968#M527826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;have you had a look at the number of syslog messages from the PIX and the content? Each syslog message and each ICMP message to the PIX have to be processed, many of them and you might have high CPU utilization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am assuming, that for each syslog message sent to the downed server you get a port unreachable back to the PIX. This means roughly twice the amount of CPU utilization compared to no ICMP (server nod being down). Are you sure about the ICMP message being really destination unreachable? Then I would assume a router to be the source of them. The PIX does not use ICMP keepalives with syslog servers, afaik.&lt;/P&gt;&lt;P&gt;Changing the logging level should simply reduce the number of messages logged and therefore reduce the CPU load. In case you do not need the info level messages this would be the recommendation - do not log, what you are not using in some way, it will only waste ressources like CPU in the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps! Please rate all posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Feb 2006 18:57:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-syslog-paradox/m-p/543968#M527826</guid>
      <dc:creator>mheusinger</dc:creator>
      <dc:date>2006-02-07T18:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: PIX syslog paradox</title>
      <link>https://community.cisco.com/t5/network-security/pix-syslog-paradox/m-p/543969#M527827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We had the same problem here when syslog server or snmp-server (trap) went under maintenance. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command on the pix solved the issue.&lt;/P&gt;&lt;P&gt;icmp permit host _ip_server_ unreachable inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1026574" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1026574&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2006 14:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-syslog-paradox/m-p/543969#M527827</guid>
      <dc:creator>mpalardy</dc:creator>
      <dc:date>2006-02-08T14:50:56Z</dc:date>
    </item>
  </channel>
</rss>

