<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Zone Based Firewall Performance issues on ASR 1004 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787969#M531107</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I forgot to say, that the problem was caused by malicious trafiic flowing from inside to outside - small UDP packets with destination port 0. Maybe it was some virus or worm ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Aug 2012 10:20:46 GMT</pubDate>
    <dc:creator>pavel.jenicek</dc:creator>
    <dc:date>2012-08-29T10:20:46Z</dc:date>
    <item>
      <title>Zone Based Firewall Performance issues on ASR 1004</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787964#M531102</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;we are experiencing performance issues on ASR 1004 with ZBF as our campus edge router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Symptoms:&lt;/P&gt;&lt;P&gt;- sending small packets from inside zone to outside zone, for example UDP packets without payload&lt;/P&gt;&lt;P&gt;- this way I can generate up to 150.000 pps traffic (testing with packeth software, but we have had a real example with some kind of worm/virus)&lt;/P&gt;&lt;P&gt;- CPU load is about 1% (yes one!) to 2% all time !! (weird)&lt;/P&gt;&lt;P&gt;- ASR response to pings rises very quickly up to 5 seconds which makes box unusable dropping everything what goes through ZBF (so internet connection is gone)&lt;/P&gt;&lt;P&gt;- if I do the ping directly from box, it seems to work fine (no rules from self to outside zone in ZBF)&lt;/P&gt;&lt;P&gt;- if I remove interfaces from inside and outside zone (so disabling ZBF) and do the test again, ASR response goes from normal (0.2ms) up to 2ms (still sending 150.000 pps) and everything seems to work fine)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- two inside interfaces&lt;/P&gt;&lt;P&gt;- one outside interfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZBF:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Policy Map type inspect IN2OUT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class I2O-DENY&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Drop log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class I2O-SSH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect TCP12H&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class I2O-PERMIT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect NORMAL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Drop log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Policy Map type inspect OUT2IN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class O2I-FTP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class O2I-H323&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class O2I-DNS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class O2I-SSH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect TCP12H&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class O2I-PERMIT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect NORMAL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The most campus traffic to internet goes through class "I2O-PERMIT" with inspection:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show class-map ty inspect I2O-PERMIT&lt;/P&gt;&lt;P&gt; Class Map type inspect match-any I2O-PERMIT (id 1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match protocol&amp;nbsp; ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match protocol&amp;nbsp; sip&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match protocol&amp;nbsp; icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match protocol&amp;nbsp; tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match protocol&amp;nbsp; udp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Match access-group name&amp;nbsp; I2O-PERMIT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show parameter-map type inspect NORMAL&lt;/P&gt;&lt;P&gt; parameter-map type inspect NORMAL&lt;/P&gt;&lt;P&gt;&amp;nbsp; log dropped-packet off&lt;/P&gt;&lt;P&gt;&amp;nbsp; audit-trail off&lt;/P&gt;&lt;P&gt;&amp;nbsp; alert on&lt;/P&gt;&lt;P&gt;&amp;nbsp; max-incomplete low&amp;nbsp; unlimited &lt;/P&gt;&lt;P&gt;&amp;nbsp; max-incomplete high unlimited &lt;/P&gt;&lt;P&gt;&amp;nbsp; one-minute low&amp;nbsp; unlimited &lt;/P&gt;&lt;P&gt;&amp;nbsp; one-minute high unlimited &lt;/P&gt;&lt;P&gt;&amp;nbsp; sessions rate low&amp;nbsp; unlimited &lt;/P&gt;&lt;P&gt;&amp;nbsp; sessions rate high unlimited &lt;/P&gt;&lt;P&gt;&amp;nbsp; udp idle-time 30 ageout-time 30&lt;/P&gt;&lt;P&gt;&amp;nbsp; udp halfopen idle-time 30000 ms ageout-time 30000 ms&lt;/P&gt;&lt;P&gt;&amp;nbsp; icmp idle-time 10 ageout-time 10&lt;/P&gt;&lt;P&gt;&amp;nbsp; dns-timeout 5&lt;/P&gt;&lt;P&gt;&amp;nbsp; tcp idle-time 3600 ageout-time 3600&lt;/P&gt;&lt;P&gt;&amp;nbsp; tcp finwait-time 5 ageout-time 5&lt;/P&gt;&lt;P&gt;&amp;nbsp; tcp synwait-time 30 ageout-time 30&lt;/P&gt;&lt;P&gt;&amp;nbsp; tcp max-incomplete host unlimited block-time 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; sessions maximum unlimited&lt;/P&gt;&lt;P&gt;&amp;nbsp; gtp permit error off&lt;/P&gt;&lt;P&gt;&amp;nbsp; gtp&amp;nbsp; request-queue 40000&lt;/P&gt;&lt;P&gt;&amp;nbsp; gtp&amp;nbsp; tunnel-limit 40000&lt;/P&gt;&lt;P&gt;&amp;nbsp; gtp&amp;nbsp; gsn timeout 30&lt;/P&gt;&lt;P&gt;&amp;nbsp; gtp&amp;nbsp; pdp-context timeout 30&lt;/P&gt;&lt;P&gt;&amp;nbsp; gtp&amp;nbsp; request-queue timeout 60&lt;/P&gt;&lt;P&gt;&amp;nbsp; gtp&amp;nbsp; signaling timeout 30&lt;/P&gt;&lt;P&gt;&amp;nbsp; gtp&amp;nbsp; tunnel timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to Cisco Datasheets: routing, Qos, Zbf ... on ASR 1000 with RP1, ESP10 should be done in hardware with up to 17.000.000 pps performance (and our box can kill only 150.000 pps)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas what could be worng? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your suggestions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards &lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787964#M531102</guid>
      <dc:creator>pavel.jenicek</dc:creator>
      <dc:date>2019-03-11T21:23:32Z</dc:date>
    </item>
    <item>
      <title>Zone Based Firewall Performance issues on ASR 1004</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787965#M531103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pavel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any news yet on this problem? Or even better, a solution? I'm having the exact same thing. Firewall enalabled = no performance...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;KR,&lt;/P&gt;&lt;P&gt;Jan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 15:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787965#M531103</guid>
      <dc:creator>js</dc:creator>
      <dc:date>2011-09-29T15:13:23Z</dc:date>
    </item>
    <item>
      <title>Zone Based Firewall Performance issues on ASR 1004</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787966#M531104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;unfortunately no solution yet &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope some cisco guy can help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Sep 2011 03:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787966#M531104</guid>
      <dc:creator>pavel.jenicek</dc:creator>
      <dc:date>2011-09-30T03:57:58Z</dc:date>
    </item>
    <item>
      <title>Zone Based Firewall Performance issues on ASR 1004</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787967#M531105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pavel &lt;/P&gt;&lt;P&gt;anything new since this post ?&lt;/P&gt;&lt;P&gt;did you manage getting over 150000 ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 09:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787967#M531105</guid>
      <dc:creator>HummusChipsSalat</dc:creator>
      <dc:date>2012-08-29T09:45:35Z</dc:date>
    </item>
    <item>
      <title>Zone Based Firewall Performance issues on ASR 1004</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787968#M531106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no, there are no news, we used the workaround - acl denying all packets with destination port 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 10:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787968#M531106</guid>
      <dc:creator>pavel.jenicek</dc:creator>
      <dc:date>2012-08-29T10:18:59Z</dc:date>
    </item>
    <item>
      <title>Zone Based Firewall Performance issues on ASR 1004</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787969#M531107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I forgot to say, that the problem was caused by malicious trafiic flowing from inside to outside - small UDP packets with destination port 0. Maybe it was some virus or worm ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 10:20:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-performance-issues-on-asr-1004/m-p/1787969#M531107</guid>
      <dc:creator>pavel.jenicek</dc:creator>
      <dc:date>2012-08-29T10:20:46Z</dc:date>
    </item>
  </channel>
</rss>

