<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA High CPU Utilization in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383349#M958160</link>
    <description>Frame drop:&lt;BR /&gt;  NAT-T keepalive message (natt-keepalive)                                    23&lt;BR /&gt;  No valid adjacency (no-adjacency)                                         3987&lt;BR /&gt;  Flow is denied by configured rule (acl-drop)                          12419988&lt;BR /&gt;  Flow denied due to resource limitation (unable-to-create-flow)              14&lt;BR /&gt;  First TCP packet not SYN (tcp-not-syn)                                     538&lt;BR /&gt;  Bad TCP flags (bad-tcp-flags)                                                1&lt;BR /&gt;  TCP failed 3 way handshake (tcp-3whs-failed)                               557&lt;BR /&gt;  TCP RST/FIN out of order (tcp-rstfin-ooo)                                  719&lt;BR /&gt;  TCP RST/SYN in window (tcp-rst-syn-in-win)                                   4&lt;BR /&gt;  TCP packet failed PAWS test (tcp-paws-fail)                                  6&lt;BR /&gt;  Slowpath security checks failed (sp-security-failed)                     17943&lt;BR /&gt;  DNS Inspect id not matched (inspect-dns-id-not-matched)                      6&lt;BR /&gt;  FP L2 rule drop (l2_acl)                                                    28&lt;BR /&gt;  Interface is down (interface-down)                                        5291&lt;BR /&gt;  Dropped pending packets in a closed socket (np-socket-closed)               20&lt;BR /&gt;  Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool)</description>
    <pubDate>Tue, 15 May 2018 10:46:41 GMT</pubDate>
    <dc:creator>HHeydarov</dc:creator>
    <dc:date>2018-05-15T10:46:41Z</dc:date>
    <item>
      <title>ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3382790#M958151</link>
      <description>&lt;P&gt;I have trouble with ASA 5520. Dispatch unit consumes 99% of CPU.&lt;/P&gt;
&lt;P&gt;When I shut down all interface other than inside, CPU turns normal. When I turn on outside and others, same thing occur. What is the reason? I need expert advice.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:45:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3382790#M958151</guid>
      <dc:creator>HHeydarov</dc:creator>
      <dc:date>2020-02-21T15:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3382836#M958152</link>
      <description>&lt;P&gt;Having only one interface up on the ASA, basically means no traffic will be forwarded so that does not help with finding out the cause.&lt;BR /&gt;Does the CPU rise when bringing up one of the other interfaces?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Further steps for troubleshooting: &lt;BR /&gt;show processes cpu-usage sorted non-zero - identify the process taking up the most of the CPU&lt;BR /&gt;show interface - check for input or output errors&lt;BR /&gt;show traffic - check interfaces with unusual high traffic&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Bogdan&lt;/P&gt;</description>
      <pubDate>Mon, 14 May 2018 14:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3382836#M958152</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-05-14T14:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383175#M958153</link>
      <description>&lt;P&gt;I have seen cases where SYN attacks / flooding causes this. check you logs to see if you pickup any flooding/syn attack events, just a thought&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 03:32:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383175#M958153</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-05-15T03:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383188#M958154</link>
      <description>&lt;P&gt;show processes cpu-usage sorted non-zero&lt;/P&gt;
&lt;P&gt;0x08283a1a&amp;nbsp;&amp;nbsp; 0x6d5d2e4c&amp;nbsp;&amp;nbsp;&amp;nbsp; 97.1%&amp;nbsp;&amp;nbsp;&amp;nbsp; 96.8%&amp;nbsp;&amp;nbsp;&amp;nbsp; 94.0%&amp;nbsp;&amp;nbsp; Dispatch Unit&lt;BR /&gt;0x090f9f8c&amp;nbsp;&amp;nbsp; 0x6d5c9aec&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.2%&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.2%&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.2%&amp;nbsp;&amp;nbsp; Logger&lt;BR /&gt;0x08f567cd&amp;nbsp;&amp;nbsp; 0x6d5bce3c&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.2%&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.2%&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.2%&amp;nbsp;&amp;nbsp; IP SLA Mon Event Processor&lt;BR /&gt;0x08c751b0&amp;nbsp;&amp;nbsp; 0x6d5b2458&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.1%&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.1%&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.1%&amp;nbsp;&amp;nbsp; Unicorn Admin Handler&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show interfaces&lt;/P&gt;
&lt;P&gt;Interface GigabitEthernet0/0.30 "INSIDE", is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Hardware is i82546GB rev03, BW 1000 Mbps, DLY 10 usec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN identifier 30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address 70ca.9b85.06ce, MTU 1500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address X.X.X.X, subnet mask 255.255.255.0&lt;BR /&gt;&amp;nbsp; Traffic Statistics for "INSIDE":&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 519451485 packets input, 31134611586 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 553307749 packets output, 92540681141 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 496212188 packets dropped&lt;BR /&gt;Interface GigabitEthernet0/0.80 "OUTSIDE", is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Hardware is i82546GB rev03, BW 1000 Mbps, DLY 10 usec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN identifier 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address 70ca.9b85.06ce, MTU 1500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address X.X.X.X, subnet mask 255.255.255.240&lt;BR /&gt;&amp;nbsp; Traffic Statistics for "OUTSIDE":&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10447437 packets input, 7170429891 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9174785 packets output, 4363070281 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 173728 packets dropped&lt;/P&gt;
&lt;P&gt;This is a result of commands.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 05:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383188#M958154</guid>
      <dc:creator>HHeydarov</dc:creator>
      <dc:date>2018-05-15T05:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383189#M958155</link>
      <description>&lt;P&gt;I use Manageengine Firewall Analyzer and I can`t see any attack log.&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 05:16:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383189#M958155</guid>
      <dc:creator>HHeydarov</dc:creator>
      <dc:date>2018-05-15T05:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383289#M958156</link>
      <description>&lt;P&gt;There are a lot of packets being dropped by the ASA, you could use the&amp;nbsp;show asp drop to further investigate why are the packets being dropped.&lt;/P&gt;
&lt;P&gt;It would also be a good idea to&amp;nbsp;enable unicast RPF on all interface.&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 08:56:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383289#M958156</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-05-15T08:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383300#M958157</link>
      <description>&lt;P&gt;&amp;nbsp;I enabled it, but did not give a result.&lt;/P&gt;
&lt;P&gt;What is your recommendation after enabling it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 09:17:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383300#M958157</guid>
      <dc:creator>HHeydarov</dc:creator>
      <dc:date>2018-05-15T09:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383314#M958158</link>
      <description>&lt;P&gt;Do a clear asp drop, wait a couple of minutes and do show asp drop a couple of times, post the output.&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 09:41:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383314#M958158</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-05-15T09:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383339#M958159</link>
      <description>Frame drop:&lt;BR /&gt;  NAT-T keepalive message (natt-keepalive)                                     2&lt;BR /&gt;  No valid adjacency (no-adjacency)                                          939&lt;BR /&gt;  Flow is denied by configured rule (acl-drop)                           2802544&lt;BR /&gt;  Flow denied due to resource limitation (unable-to-create-flow)              12&lt;BR /&gt;  First TCP packet not SYN (tcp-not-syn)                                      84&lt;BR /&gt;  TCP failed 3 way handshake (tcp-3whs-failed)                                40&lt;BR /&gt;  TCP RST/FIN out of order (tcp-rstfin-ooo)                                   85&lt;BR /&gt;  TCP RST/SYN in window (tcp-rst-syn-in-win)                                   2&lt;BR /&gt;  TCP packet failed PAWS test (tcp-paws-fail)                                  1&lt;BR /&gt;  Slowpath security checks failed (sp-security-failed)                      3467&lt;BR /&gt;  DNS Inspect id not matched (inspect-dns-id-not-matched)                      2&lt;BR /&gt;  FP L2 rule drop (l2_acl)                                                     6&lt;BR /&gt;  Interface is down (interface-down)                                        1164&lt;BR /&gt;  Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool)                             139&lt;BR /&gt;&lt;BR /&gt;Last clearing: 14:34:24 GMT May 15 2018 by enable_15&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 15 May 2018 10:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383339#M958159</guid>
      <dc:creator>HHeydarov</dc:creator>
      <dc:date>2018-05-15T10:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383349#M958160</link>
      <description>Frame drop:&lt;BR /&gt;  NAT-T keepalive message (natt-keepalive)                                    23&lt;BR /&gt;  No valid adjacency (no-adjacency)                                         3987&lt;BR /&gt;  Flow is denied by configured rule (acl-drop)                          12419988&lt;BR /&gt;  Flow denied due to resource limitation (unable-to-create-flow)              14&lt;BR /&gt;  First TCP packet not SYN (tcp-not-syn)                                     538&lt;BR /&gt;  Bad TCP flags (bad-tcp-flags)                                                1&lt;BR /&gt;  TCP failed 3 way handshake (tcp-3whs-failed)                               557&lt;BR /&gt;  TCP RST/FIN out of order (tcp-rstfin-ooo)                                  719&lt;BR /&gt;  TCP RST/SYN in window (tcp-rst-syn-in-win)                                   4&lt;BR /&gt;  TCP packet failed PAWS test (tcp-paws-fail)                                  6&lt;BR /&gt;  Slowpath security checks failed (sp-security-failed)                     17943&lt;BR /&gt;  DNS Inspect id not matched (inspect-dns-id-not-matched)                      6&lt;BR /&gt;  FP L2 rule drop (l2_acl)                                                    28&lt;BR /&gt;  Interface is down (interface-down)                                        5291&lt;BR /&gt;  Dropped pending packets in a closed socket (np-socket-closed)               20&lt;BR /&gt;  Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool)</description>
      <pubDate>Tue, 15 May 2018 10:46:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383349#M958160</guid>
      <dc:creator>HHeydarov</dc:creator>
      <dc:date>2018-05-15T10:46:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383361#M958161</link>
      <description>&lt;P&gt;It looks like a lot of packets are dropped by the acls, especially for a inside interface.&lt;BR /&gt;Do you have a deny any log statement at the end of the acl ?&lt;BR /&gt;If not configure it and monitor the logs.&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 10:52:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383361#M958161</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-05-15T10:52:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383364#M958162</link>
      <description>&lt;P&gt;ACLs Logging is set by default when you create it.&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 10:58:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383364#M958162</guid>
      <dc:creator>HHeydarov</dc:creator>
      <dc:date>2018-05-15T10:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383436#M958163</link>
      <description>Still 90% CPU loaded.</description>
      <pubDate>Tue, 15 May 2018 12:35:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383436#M958163</guid>
      <dc:creator>HHeydarov</dc:creator>
      <dc:date>2018-05-15T12:35:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA High CPU Utilization</title>
      <link>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383498#M958164</link>
      <description>What if the last rule doesn't use log so logging toll goes away from the firewall?</description>
      <pubDate>Tue, 15 May 2018 13:46:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-high-cpu-utilization/m-p/3383498#M958164</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-05-15T13:46:45Z</dc:date>
    </item>
  </channel>
</rss>

