<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Bug within the fwsm? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262248#M763789</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls. check this article if your server specification matches. &lt;/P&gt;&lt;PRE&gt; &lt;BR /&gt;Turn off TCP Chimney by using the Netsh.exe tool by following these steps:&lt;BR /&gt;&lt;BR /&gt;1. Click Start, click Run, type cmd, and then click OK.&lt;BR /&gt;&lt;BR /&gt;2. At the command prompt, type Netsh int ip set chimney DISABLED, and then press ENTER.&lt;BR /&gt;&lt;BR /&gt;If you want to read further information about this issue, you can consult the following&lt;BR /&gt;link from Microsoft Technet:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://support.microsoft.com/?kbid=912222" target="_blank" title="http://support.microsoft.com/?kbid=912222"&gt;http://support.microsoft.com/?kbid=912222&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Also, pls. take a look at this defect CSCsj56795 here: &lt;A href="http://tools.cisco.com/Support/BugToolKit/" target="_blank"&gt;http://tools.cisco.com/Support/BugToolKit/&lt;/A&gt; &lt;BR /&gt;and upgrade the code to the latest inerim and implement the fix&lt;BR /&gt;&lt;BR /&gt;sysopt np completion-unit&lt;BR /&gt;&lt;BR /&gt;test the file copy again.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 21 Nov 2009 04:31:40 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2009-11-21T04:31:40Z</dc:date>
    <item>
      <title>Bug within the fwsm?</title>
      <link>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262247#M763783</link>
      <description>&lt;P&gt;I have this problem with slow performance one way copying files from one server to another.&lt;/P&gt;&lt;P&gt;Iperf also shows this performance.&lt;/P&gt;&lt;P&gt;Server1 is connected to a 3560 giga-port in vlan 670, and there is a 1 gig trunk to a 6509.&lt;/P&gt;&lt;P&gt;The 6509 is configured with vrf and  fwsm, and this is connected to another 6509 with at 10 gig trunk.&lt;/P&gt;&lt;P&gt;In this last 6509 the other server is connected in vlan 650.&lt;/P&gt;&lt;P&gt;Vlan 650 and 670 belongs to different vrf's, and needs to go thru the fwsm.&lt;/P&gt;&lt;P&gt;One way shows nice perfomance (iperf shows 800-900Mbit/s), but the other way is about half the performance.&lt;/P&gt;&lt;P&gt;There is big and difficult configuration on the switches or the fwsm.&lt;/P&gt;&lt;P&gt;Why does it behave like this?&lt;/P&gt;&lt;P&gt;The accessports are configured auto/auto and has 1000/full, the trunks is a dot1q trunks and the fwsm is permitting ip any any.&lt;/P&gt;&lt;P&gt;Could there be a bug in the fwsm (or is it related to the switches)?&lt;/P&gt;&lt;P&gt;Could it be some buffer problem in the fwsm?  The configuration of the fwsm is rather plain allowing any-any ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;server1(vlan650/vrf storage)-3560-6509-fwsm-6509-server2(vlan 670/vrf client)&lt;/P&gt;&lt;P&gt;The first 6509 has the fwsm installed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh.. having the servers in the same VRF's og VLAN does not give this reduction in performance one way.  Doing this makes good performance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br&lt;/P&gt;&lt;P&gt;Geir&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:36:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262247#M763783</guid>
      <dc:creator>pd.politiet.no</dc:creator>
      <dc:date>2019-03-11T16:36:35Z</dc:date>
    </item>
    <item>
      <title>Re: Bug within the fwsm?</title>
      <link>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262248#M763789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls. check this article if your server specification matches. &lt;/P&gt;&lt;PRE&gt; &lt;BR /&gt;Turn off TCP Chimney by using the Netsh.exe tool by following these steps:&lt;BR /&gt;&lt;BR /&gt;1. Click Start, click Run, type cmd, and then click OK.&lt;BR /&gt;&lt;BR /&gt;2. At the command prompt, type Netsh int ip set chimney DISABLED, and then press ENTER.&lt;BR /&gt;&lt;BR /&gt;If you want to read further information about this issue, you can consult the following&lt;BR /&gt;link from Microsoft Technet:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://support.microsoft.com/?kbid=912222" target="_blank" title="http://support.microsoft.com/?kbid=912222"&gt;http://support.microsoft.com/?kbid=912222&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Also, pls. take a look at this defect CSCsj56795 here: &lt;A href="http://tools.cisco.com/Support/BugToolKit/" target="_blank"&gt;http://tools.cisco.com/Support/BugToolKit/&lt;/A&gt; &lt;BR /&gt;and upgrade the code to the latest inerim and implement the fix&lt;BR /&gt;&lt;BR /&gt;sysopt np completion-unit&lt;BR /&gt;&lt;BR /&gt;test the file copy again.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Nov 2009 04:31:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262248#M763789</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-11-21T04:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: Bug within the fwsm?</title>
      <link>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262249#M763794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt;Turn off TCP Chimney&lt;/P&gt;&lt;P&gt;The Windows server 2008 R2 Enterprise does not have this command. So I cannot disabled tcp chimney. Unless there is another command to use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;upgrade the code to the latest inerim and implement the fix&lt;BR /&gt;The fwsm has been upgraded to the latest release and the "sysopt np completion-unit" has been implemented.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Status is that there is no differense in the file copy.&amp;nbsp; One way throughput is ok, the otherway the throughput is a litle over half the speed.&lt;/P&gt;&lt;P&gt;So in other word, no changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br&lt;/P&gt;&lt;P&gt;Geir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Dec 2009 14:27:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262249#M763794</guid>
      <dc:creator>pd.politiet.no</dc:creator>
      <dc:date>2009-12-08T14:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Bug within the fwsm?</title>
      <link>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262250#M763800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have smartnet I suggest that you open a TAC case. We need to collect captures and see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know if SACK is negotiated by the host? If so, you can disable that by the keyword "noramdomseq" in the tail end of the static line and see if that works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Dec 2009 23:02:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262250#M763800</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-08T23:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: Bug within the fwsm?</title>
      <link>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262251#M763804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SACK is negogotiated between the hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you mean with the norandomseq is putting it at the end of the nat-line? like this:&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_exeption norandomseq&lt;/P&gt;&lt;P&gt;The config on the fwsm is for the moment very simple.&amp;nbsp; It allows all trafikk between the different interfaces and doesn't do any NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as for the cisco information of this command, it says not use this option unless you have another firewall inline.&amp;nbsp; I only have traffic traffic traversing the fwsm in the 6509.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br&lt;/P&gt;&lt;P&gt;Geir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Dec 2009 08:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262251#M763804</guid>
      <dc:creator>pd.politiet.no</dc:creator>
      <dc:date>2009-12-09T08:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: Bug within the fwsm?</title>
      <link>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262252#M763809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't believe the norandomseq takes effect in the nat exemption line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. add identity static and add the keyword in the end.&amp;nbsp; Clear local for the two involved IP addresses and try the flow again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Dec 2009 16:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bug-within-the-fwsm/m-p/1262252#M763809</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-10T16:13:10Z</dc:date>
    </item>
  </channel>
</rss>

