<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: pix 535 hitting 98% in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172701#M861055</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I apologize, enabling reverse path forwarding is a viable config for the outside interface. It ensures that packets sourced from the outside are not spoofed packets. Perhaps there is a large amount of spoofed traffic hitting the outside interface of your ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the source IP of the traffic in the log message? Is it an address that is used on the inside of the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the confusion, not sur ewhat i was thinking about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 Apr 2009 01:54:44 GMT</pubDate>
    <dc:creator>mjohnson</dc:creator>
    <dc:date>2009-04-09T01:54:44Z</dc:date>
    <item>
      <title>pix 535 hitting 98%</title>
      <link>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172698#M861040</link>
      <description>&lt;P&gt;We have our firewall hitting 98% at some occasions and it has pretty huge connection count 15561 and this was usual and utilization used to stay at 50 tp 60 % but suddenly it pikes up to 98% a day and come back to 50 next morning.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i tried all i can but we are not able to figure out what was happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But here is what the log shows:&lt;/P&gt;&lt;P&gt;Deny ICMP reverse path check from x.x.x.x to x.x.x.x on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have reverse path specified to outside and this message is the only one we have in the log and this is suppose to be informational,,can someone help me out with this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thnk uou so much in advance&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:16:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172698#M861040</guid>
      <dc:creator>dbellamkonda</dc:creator>
      <dc:date>2019-03-11T15:16:13Z</dc:date>
    </item>
    <item>
      <title>Re: pix 535 hitting 98%</title>
      <link>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172699#M861043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should not be doing reverse path checking on the outside interface. Reverse path checking is typically done on interior interfaces to ensure traffic recieved at the FW interface was sourced from the network the FW interface is confgiured for. This stops interior hosts from spoofing addresses. Mostly all traffic hitting the outside interface will be sourced from a different network then the outside interface ip range. So this is not needed and will be resource intensive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Apr 2009 18:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172699#M861043</guid>
      <dc:creator>mjohnson</dc:creator>
      <dc:date>2009-04-08T18:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: pix 535 hitting 98%</title>
      <link>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172700#M861048</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would this be the reason for high cpu..&lt;/P&gt;&lt;P&gt;Cpu stays good for few days and suddenly pikes up to 98 a day. everything seems fine.&lt;/P&gt;&lt;P&gt;Do you think verify path on inside would redce our cpu utilization without any impact. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Apr 2009 19:06:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172700#M861048</guid>
      <dc:creator>dbellamkonda</dc:creator>
      <dc:date>2009-04-08T19:06:48Z</dc:date>
    </item>
    <item>
      <title>Re: pix 535 hitting 98%</title>
      <link>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172701#M861055</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I apologize, enabling reverse path forwarding is a viable config for the outside interface. It ensures that packets sourced from the outside are not spoofed packets. Perhaps there is a large amount of spoofed traffic hitting the outside interface of your ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the source IP of the traffic in the log message? Is it an address that is used on the inside of the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the confusion, not sur ewhat i was thinking about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Apr 2009 01:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172701#M861055</guid>
      <dc:creator>mjohnson</dc:creator>
      <dc:date>2009-04-09T01:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: pix 535 hitting 98%</title>
      <link>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172702#M861058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think that source IP is from outside.&lt;/P&gt;&lt;P&gt;We had a issue a month back with IP from inside.&lt;/P&gt;&lt;P&gt;Can you help me of what should i do in both cases&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Apr 2009 13:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172702#M861058</guid>
      <dc:creator>dbellamkonda</dc:creator>
      <dc:date>2009-04-09T13:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: pix 535 hitting 98%</title>
      <link>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172703#M861060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does the output of teh following command yeild?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show asp drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Apr 2009 12:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172703#M861060</guid>
      <dc:creator>mjohnson</dc:creator>
      <dc:date>2009-04-10T12:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: pix 535 hitting 98%</title>
      <link>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172704#M861062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show ip verify statistics &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Apr 2009 13:00:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172704#M861062</guid>
      <dc:creator>mjohnson</dc:creator>
      <dc:date>2009-04-10T13:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: pix 535 hitting 98%</title>
      <link>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172705#M861064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only thing I can think of is that your routing table on the ASa is routing packets receeived on the outside out a different interface (i.e not the outside interface?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;could be the following;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Someone is directing spoofed traffic to the outside interface , verify via commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Routing on the ASA is asymmetrical causing issues&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link on urpf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html" target="_blank"&gt;http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Apr 2009 13:08:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172705#M861064</guid>
      <dc:creator>mjohnson</dc:creator>
      <dc:date>2009-04-10T13:08:12Z</dc:date>
    </item>
    <item>
      <title>Re: pix 535 hitting 98%</title>
      <link>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172706#M861066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Frame drop:&lt;/P&gt;&lt;P&gt;  Invalid TCP Length (invalid-tcp-hdr-length)                                 40&lt;/P&gt;&lt;P&gt;  Invalid UDP Length (invalid-udp-length)                                   2418&lt;/P&gt;&lt;P&gt;  No valid adjacency (no-adjacency)                                         1595&lt;/P&gt;&lt;P&gt;  Reverse-path verify failed (rpf-violated)                                 3488&lt;/P&gt;&lt;P&gt;  Flow is denied by configured rule (acl-drop)                         200124160&lt;/P&gt;&lt;P&gt;  Flow denied due to resource limitation (unable-to-create-flow)               6&lt;/P&gt;&lt;P&gt;  First TCP packet not SYN (tcp-not-syn)                                15433941&lt;/P&gt;&lt;P&gt;  Bad TCP flags (bad-tcp-flags)                                            13406&lt;/P&gt;&lt;P&gt;  Bad option length in TCP (tcp-bad-option-len)                             1386&lt;/P&gt;&lt;P&gt;  TCP data exceeded MSS (tcp-mss-exceeded)                               2744046&lt;/P&gt;&lt;P&gt;  TCP data send after FIN (tcp-data-past-fin)                                 29&lt;/P&gt;&lt;P&gt;  TCP failed 3 way handshake (tcp-3whs-failed)                           1089609&lt;/P&gt;&lt;P&gt;  TCP RST/FIN out of order (tcp-rstfin-ooo)                               762692&lt;/P&gt;&lt;P&gt;  TCP SEQ in SYN/SYNACK invalid (tcp-seq-syn-diff)                         35774&lt;/P&gt;&lt;P&gt;  TCP SYNACK on established conn (tcp-synack-ooo)                              5&lt;/P&gt;&lt;P&gt;  TCP packet SEQ past window (tcp-seq-past-win)                              265&lt;/P&gt;&lt;P&gt;  TCP invalid ACK (tcp-invalid-ack)                                         6200&lt;/P&gt;&lt;P&gt;  TCP replicated flow pak drop (tcp-fo-drop)                                3236&lt;/P&gt;&lt;P&gt;  TCP ACK in 3 way handshake invalid (tcp-discarded-ooo)                      24&lt;/P&gt;&lt;P&gt;  TCP Out-of-Order packet buffer full (tcp-buffer-full)                   192174&lt;/P&gt;&lt;P&gt;  TCP Out-of-Order packet buffer timeout (tcp-buffer-timeout)             189557&lt;/P&gt;&lt;P&gt;  TCP RST/SYN in window (tcp-rst-syn-in-win)                              967336&lt;/P&gt;&lt;P&gt;  TCP DUP and has been ACKed (tcp-acked)                                 4614408&lt;/P&gt;&lt;P&gt;  TCP packet failed PAWS test (tcp-paws-fail)                              18666&lt;/P&gt;&lt;P&gt;  IPSEC tunnel is down (ipsec-tun-down)                                      429&lt;/P&gt;&lt;P&gt;  Early security checks failed (security-failed)                              17&lt;/P&gt;&lt;P&gt;  Slowpath security checks failed (sp-security-failed)                     11519&lt;/P&gt;&lt;P&gt;  ICMP Error Inspect no existing conn (inspect-icmp-error-no-existing-conn)                                 48483&lt;/P&gt;&lt;P&gt;  DNS Guard id not matched (dns-guard-id-not-matched)                  194207284&lt;/P&gt;&lt;P&gt;  Interface is down (interface-down)                                         252&lt;/P&gt;&lt;P&gt;  Invalid app length (invalid-app-length)                                   4584&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last clearing: Never&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Flow drop:&lt;/P&gt;&lt;P&gt;  NAT failed (nat-failed)                                                 265228&lt;/P&gt;&lt;P&gt;  Need to start IKE negotiation (need-ike)                                 63888&lt;/P&gt;&lt;P&gt;  Inspection failure (inspect-fail)                                     98752656&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface outside: 3488 unicast rpf drops&lt;/P&gt;&lt;P&gt;interface inside: 0 unicast rpf drops&lt;/P&gt;&lt;P&gt;interface IDMZ: 0 unicast rpf drops&lt;/P&gt;&lt;P&gt;interface PUB-DMZ: 0 unicast rpf drops&lt;/P&gt;&lt;P&gt;interface inside2-failover: 0 unicast rpf drops&lt;/P&gt;&lt;P&gt;interface VDMZ-SprintVPN: 0 unicast rpf drops&lt;/P&gt;&lt;P&gt;interface VDMZ-SprintDNS: 0 unicast rpf drops&lt;/P&gt;&lt;P&gt;interface VDMZ-CSG: 0 unicast rpf drops&lt;/P&gt;&lt;P&gt;interface intf5: 0 unicast rpf drops&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Apr 2009 13:44:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172706#M861066</guid>
      <dc:creator>dbellamkonda</dc:creator>
      <dc:date>2009-04-10T13:44:56Z</dc:date>
    </item>
    <item>
      <title>Re: pix 535 hitting 98%</title>
      <link>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172707#M861067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there more than 100 object groups  and acls are configred then try following command on your PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list &lt;ACL_NAME&gt; object-group-search&lt;/ACL_NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Apr 2009 10:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-535-hitting-98/m-p/1172707#M861067</guid>
      <dc:creator>abhijit.kasarekar</dc:creator>
      <dc:date>2009-04-13T10:45:46Z</dc:date>
    </item>
  </channel>
</rss>

