<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356800#M964722</link>
    <description>This happened a while ago and stopped when i thought i upgraded the firmware of the firewall, and then it appeared again, i can't find the command show host !&lt;BR /&gt;do you mean show local-host ? if yes how can i sort the output ?&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;</description>
    <pubDate>Wed, 28 Mar 2018 15:10:12 GMT</pubDate>
    <dc:creator>Neji Jihed</dc:creator>
    <dc:date>2018-03-28T15:10:12Z</dc:date>
    <item>
      <title>Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356464#M964608</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Our Cisco ASA 5520 firewall is running with 99% CPU, Processes&amp;nbsp;&lt;SPAN&gt;Dispatch Unit is using over 90 % of CPU, and&lt;/SPAN&gt;&amp;nbsp;capture is showing below drop reason :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Drop-reason: (nat-no-xlate-to-pat-pool) Connection to PAT address without pre-existing xlate&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;firewall(config)# show processes cpu-usage sorted non-zero&lt;BR /&gt;PC Thread 5Sec 1Min 5Min Process&lt;BR /&gt;0x082a430c 0x6edd4ee4 98.5% 98.5% 97.8% Dispatch Unit&lt;BR /&gt;0x0911063d 0x6edad768 0.2% 0.2% 0.4% ssh&lt;BR /&gt;0x082be9da 0x6edcb07c 0.1% 0.1% 0.1% Logger&lt;BR /&gt;0x08502b76 0x6edc0ff0 0.1% 0.1% 0.1% fover_health_monitoring_thread&lt;BR /&gt;firewall(config)#&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Any thoughts ?&lt;BR /&gt;Thank you,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:34:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356464#M964608</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2020-02-21T15:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356504#M964609</link>
      <description>&lt;P&gt;I do not think the it's the same problem.&lt;/P&gt;
&lt;P&gt;I usually see '&lt;SPAN&gt;PAT address without pre-existing xlate' for missconfigured&amp;nbsp;nat rules.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The dispatch unit is the central packet processing process and for high&amp;nbsp;dispatch&amp;nbsp;cpu you usually need to have a look at traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Show traffic, show&amp;nbsp;perfmon and sh asp drop can give you an idea where the problem is.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Bogdan&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 09:45:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356504#M964609</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-03-28T09:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356511#M964610</link>
      <description>Can you get the output of show perfmon detail?&lt;BR /&gt;&lt;BR /&gt;Clear asp drop then issue the command show asp drop 5 times and post the&lt;BR /&gt;output.&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Mar 2018 09:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356511#M964610</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-03-28T09:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356522#M964714</link>
      <description>Thank you for your reply, i have cleared the asp drop and issued the "show asp drop" five times, here is the output :&lt;BR /&gt;&lt;BR /&gt;firewall# show asp drop&lt;BR /&gt;&lt;BR /&gt;Frame drop:&lt;BR /&gt;  &amp;lt;snp_drop_first&amp;gt; (&amp;lt;snp_drop_first&amp;gt;)                                     156238&lt;BR /&gt;  Invalid encapsulation (invalid-encap)                                    11421&lt;BR /&gt;  Invalid TCP Length (invalid-tcp-hdr-length)                                 15&lt;BR /&gt;  No valid adjacency (no-adjacency)                                          686&lt;BR /&gt;  Flow is denied by configured rule (acl-drop)                            699140&lt;BR /&gt;  First TCP packet not SYN (tcp-not-syn)                                   16580&lt;BR /&gt;  Bad TCP flags (bad-tcp-flags)                                               84&lt;BR /&gt;  TCP data send after FIN (tcp-data-past-fin)                                 25&lt;BR /&gt;  TCP failed 3 way handshake (tcp-3whs-failed)                             31654&lt;BR /&gt;  TCP RST/FIN out of order (tcp-rstfin-ooo)                               102300&lt;BR /&gt;  TCP SEQ in SYN/SYNACK invalid (tcp-seq-syn-diff)                            10&lt;BR /&gt;  TCP SYNACK on established conn (tcp-synack-ooo)                             91&lt;BR /&gt;  TCP packet SEQ past window (tcp-seq-past-win)                              172&lt;BR /&gt;  TCP invalid ACK (tcp-invalid-ack)                                        18683&lt;BR /&gt;  TCP replicated flow pak drop (tcp-fo-drop)                                 646&lt;BR /&gt;  TCP Out-of-Order packet buffer full (tcp-buffer-full)                     8910&lt;BR /&gt;  TCP Out-of-Order packet buffer timeout (tcp-buffer-timeout)               1762&lt;BR /&gt;  TCP RST/SYN in window (tcp-rst-syn-in-win)                               77771&lt;BR /&gt;  TCP dup of packet in Out-of-Order queue (tcp-dup-in-queue)                 687&lt;BR /&gt;  Slowpath security checks failed (sp-security-failed)                    293388&lt;BR /&gt;  Expired flow (flow-expired)                                                  1&lt;BR /&gt;  DNS Inspect packet too long (inspect-dns-pak-too-long)                   98526&lt;BR /&gt;  DNS Inspect id not matched (inspect-dns-id-not-matched)                     45&lt;BR /&gt;  FP L2 rule drop (l2_acl)                                                981246&lt;BR /&gt;  Interface is down (interface-down)                                         165&lt;BR /&gt;  Dropped pending packets in a closed socket (np-socket-closed)                6&lt;BR /&gt;  Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool)                           33903&lt;BR /&gt;  Received a multicast packet in the non-active device (mcast-in-nonactive-device)                          53592&lt;BR /&gt;&lt;BR /&gt;Last clearing: Never&lt;BR /&gt;&lt;BR /&gt;Flow drop:&lt;BR /&gt;  Inspection failure (inspect-fail)                                          168&lt;BR /&gt;  Failed to allocate inspection (no-inspect)                               10882&lt;BR /&gt;  Inspect scansafe server not reachable (inspect-scansafe-server-not-reachable)                             12548&lt;BR /&gt;&lt;BR /&gt;Last clearing: Never&lt;BR /&gt;&lt;BR /&gt;firewall# clear asp drop&lt;BR /&gt;firewall# show asp drop&lt;BR /&gt;&lt;BR /&gt;Frame drop:&lt;BR /&gt;  &amp;lt;snp_drop_first&amp;gt; (&amp;lt;snp_drop_first&amp;gt;)                                         15&lt;BR /&gt;  Invalid encapsulation (invalid-encap)                                        1&lt;BR /&gt;  Flow is denied by configured rule (acl-drop)                                19&lt;BR /&gt;  First TCP packet not SYN (tcp-not-syn)                                       1&lt;BR /&gt;  TCP failed 3 way handshake (tcp-3whs-failed)                                 1&lt;BR /&gt;  TCP RST/FIN out of order (tcp-rstfin-ooo)                                   32&lt;BR /&gt;  TCP RST/SYN in window (tcp-rst-syn-in-win)                                  43&lt;BR /&gt;  Slowpath security checks failed (sp-security-failed)                         4&lt;BR /&gt;  DNS Inspect packet too long (inspect-dns-pak-too-long)                      16&lt;BR /&gt;  FP L2 rule drop (l2_acl)                                                    22&lt;BR /&gt;  Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool)                               3&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;&lt;BR /&gt;Flow drop:&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;firewall# show asp drop&lt;BR /&gt;&lt;BR /&gt;Frame drop:&lt;BR /&gt;  &amp;lt;snp_drop_first&amp;gt; (&amp;lt;snp_drop_first&amp;gt;)                                         41&lt;BR /&gt;  Invalid encapsulation (invalid-encap)                                        1&lt;BR /&gt;  Flow is denied by configured rule (acl-drop)                                42&lt;BR /&gt;  First TCP packet not SYN (tcp-not-syn)                                       2&lt;BR /&gt;  TCP failed 3 way handshake (tcp-3whs-failed)                                15&lt;BR /&gt;  TCP RST/FIN out of order (tcp-rstfin-ooo)                                   46&lt;BR /&gt;  TCP RST/SYN in window (tcp-rst-syn-in-win)                                  88&lt;BR /&gt;  Slowpath security checks failed (sp-security-failed)                         5&lt;BR /&gt;  DNS Inspect packet too long (inspect-dns-pak-too-long)                      48&lt;BR /&gt;  FP L2 rule drop (l2_acl)                                                    38&lt;BR /&gt;  Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool)                               6&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;&lt;BR /&gt;Flow drop:&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;firewall# show asp drop&lt;BR /&gt;&lt;BR /&gt;Frame drop:&lt;BR /&gt;  &amp;lt;snp_drop_first&amp;gt; (&amp;lt;snp_drop_first&amp;gt;)                                         94&lt;BR /&gt;  Invalid encapsulation (invalid-encap)                                        1&lt;BR /&gt;  Flow is denied by configured rule (acl-drop)                                69&lt;BR /&gt;  First TCP packet not SYN (tcp-not-syn)                                       2&lt;BR /&gt;  TCP failed 3 way handshake (tcp-3whs-failed)                                30&lt;BR /&gt;  TCP RST/FIN out of order (tcp-rstfin-ooo)                                   66&lt;BR /&gt;  TCP invalid ACK (tcp-invalid-ack)                                            1&lt;BR /&gt;  TCP RST/SYN in window (tcp-rst-syn-in-win)                                 148&lt;BR /&gt;  TCP dup of packet in Out-of-Order queue (tcp-dup-in-queue)                   4&lt;BR /&gt;  Slowpath security checks failed (sp-security-failed)                        11&lt;BR /&gt;  DNS Inspect packet too long (inspect-dns-pak-too-long)                      76&lt;BR /&gt;  FP L2 rule drop (l2_acl)                                                    70&lt;BR /&gt;  Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool)                              11&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;&lt;BR /&gt;Flow drop:&lt;BR /&gt;  Failed to allocate inspection (no-inspect)                                   2&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;firewall# show asp drop&lt;BR /&gt;&lt;BR /&gt;Frame drop:&lt;BR /&gt;  &amp;lt;snp_drop_first&amp;gt; (&amp;lt;snp_drop_first&amp;gt;)                                        140&lt;BR /&gt;  Invalid encapsulation (invalid-encap)                                        2&lt;BR /&gt;  Flow is denied by configured rule (acl-drop)                               114&lt;BR /&gt;  First TCP packet not SYN (tcp-not-syn)                                       2&lt;BR /&gt;  TCP failed 3 way handshake (tcp-3whs-failed)                                35&lt;BR /&gt;  TCP RST/FIN out of order (tcp-rstfin-ooo)                                   80&lt;BR /&gt;  TCP invalid ACK (tcp-invalid-ack)                                            4&lt;BR /&gt;  TCP RST/SYN in window (tcp-rst-syn-in-win)                                 193&lt;BR /&gt;  TCP dup of packet in Out-of-Order queue (tcp-dup-in-queue)                   5&lt;BR /&gt;  Slowpath security checks failed (sp-security-failed)                        16&lt;BR /&gt;  DNS Inspect packet too long (inspect-dns-pak-too-long)                      92&lt;BR /&gt;  FP L2 rule drop (l2_acl)                                                    91&lt;BR /&gt;  Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool)                              14&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;&lt;BR /&gt;Flow drop:&lt;BR /&gt;  Failed to allocate inspection (no-inspect)                                   2&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;firewall# show asp drop&lt;BR /&gt;&lt;BR /&gt;Frame drop:&lt;BR /&gt;  &amp;lt;snp_drop_first&amp;gt; (&amp;lt;snp_drop_first&amp;gt;)                                        194&lt;BR /&gt;  Invalid encapsulation (invalid-encap)                                        2&lt;BR /&gt;  Flow is denied by configured rule (acl-drop)                               169&lt;BR /&gt;  First TCP packet not SYN (tcp-not-syn)                                       3&lt;BR /&gt;  TCP failed 3 way handshake (tcp-3whs-failed)                                39&lt;BR /&gt;  TCP RST/FIN out of order (tcp-rstfin-ooo)                                  103&lt;BR /&gt;  TCP invalid ACK (tcp-invalid-ack)                                           21&lt;BR /&gt;  TCP RST/SYN in window (tcp-rst-syn-in-win)                                 251&lt;BR /&gt;  TCP dup of packet in Out-of-Order queue (tcp-dup-in-queue)                   5&lt;BR /&gt;  Slowpath security checks failed (sp-security-failed)                        26&lt;BR /&gt;  DNS Inspect packet too long (inspect-dns-pak-too-long)                     113&lt;BR /&gt;  FP L2 rule drop (l2_acl)                                                   110&lt;BR /&gt;  Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool)                              21&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;&lt;BR /&gt;Flow drop:&lt;BR /&gt;  Failed to allocate inspection (no-inspect)                                   2&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;firewall# show asp drop&lt;BR /&gt;&lt;BR /&gt;Frame drop:&lt;BR /&gt;  &amp;lt;snp_drop_first&amp;gt; (&amp;lt;snp_drop_first&amp;gt;)                                        254&lt;BR /&gt;  Invalid encapsulation (invalid-encap)                                        2&lt;BR /&gt;  Flow is denied by configured rule (acl-drop)                               213&lt;BR /&gt;  First TCP packet not SYN (tcp-not-syn)                                       3&lt;BR /&gt;  TCP failed 3 way handshake (tcp-3whs-failed)                                51&lt;BR /&gt;  TCP RST/FIN out of order (tcp-rstfin-ooo)                                  122&lt;BR /&gt;  TCP invalid ACK (tcp-invalid-ack)                                           37&lt;BR /&gt;  TCP RST/SYN in window (tcp-rst-syn-in-win)                                 289&lt;BR /&gt;  TCP dup of packet in Out-of-Order queue (tcp-dup-in-queue)                   5&lt;BR /&gt;  Slowpath security checks failed (sp-security-failed)                        32&lt;BR /&gt;  DNS Inspect packet too long (inspect-dns-pak-too-long)                     128&lt;BR /&gt;  FP L2 rule drop (l2_acl)                                                   141&lt;BR /&gt;  Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool)                              25&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;&lt;BR /&gt;Flow drop:&lt;BR /&gt;  Failed to allocate inspection (no-inspect)                                   2&lt;BR /&gt;&lt;BR /&gt;Last clearing: 11:16:18 met_dst Mar 28 2018 by jihed.neji&lt;BR /&gt;firewall#&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Mar 2018 10:19:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356522#M964714</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2018-03-28T10:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356523#M964715</link>
      <description>Thank you for your reply, here is the output of the commands :&lt;BR /&gt;firewall# show asp drop&lt;BR /&gt;&lt;BR /&gt;Frame drop:&lt;BR /&gt;&amp;lt;snp_drop_first&amp;gt; (&amp;lt;snp_drop_first&amp;gt;) 156238&lt;BR /&gt;Invalid encapsulation (invalid-encap) 11421&lt;BR /&gt;Invalid TCP Length (invalid-tcp-hdr-length) 15&lt;BR /&gt;No valid adjacency (no-adjacency) 686&lt;BR /&gt;Flow is denied by configured rule (acl-drop) 699140&lt;BR /&gt;First TCP packet not SYN (tcp-not-syn) 16580&lt;BR /&gt;Bad TCP flags (bad-tcp-flags) 84&lt;BR /&gt;TCP data send after FIN (tcp-data-past-fin) 25&lt;BR /&gt;TCP failed 3 way handshake (tcp-3whs-failed) 31654&lt;BR /&gt;TCP RST/FIN out of order (tcp-rstfin-ooo) 102300&lt;BR /&gt;TCP SEQ in SYN/SYNACK invalid (tcp-seq-syn-diff) 10&lt;BR /&gt;TCP SYNACK on established conn (tcp-synack-ooo) 91&lt;BR /&gt;TCP packet SEQ past window (tcp-seq-past-win) 172&lt;BR /&gt;TCP invalid ACK (tcp-invalid-ack) 18683&lt;BR /&gt;TCP replicated flow pak drop (tcp-fo-drop) 646&lt;BR /&gt;TCP Out-of-Order packet buffer full (tcp-buffer-full) 8910&lt;BR /&gt;TCP Out-of-Order packet buffer timeout (tcp-buffer-timeout) 1762&lt;BR /&gt;TCP RST/SYN in window (tcp-rst-syn-in-win) 77771&lt;BR /&gt;TCP dup of packet in Out-of-Order queue (tcp-dup-in-queue) 687&lt;BR /&gt;Slowpath security checks failed (sp-security-failed) 293388&lt;BR /&gt;Expired flow (flow-expired) 1&lt;BR /&gt;DNS Inspect packet too long (inspect-dns-pak-too-long) 98526&lt;BR /&gt;DNS Inspect id not matched (inspect-dns-id-not-matched) 45&lt;BR /&gt;FP L2 rule drop (l2_acl) 981246&lt;BR /&gt;Interface is down (interface-down) 165&lt;BR /&gt;Dropped pending packets in a closed socket (np-socket-closed) 6&lt;BR /&gt;Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool) 33903&lt;BR /&gt;Received a multicast packet in the non-active device (mcast-in-nonactive-device) 53592&lt;BR /&gt;&lt;BR /&gt;Last clearing: Never&lt;BR /&gt;&lt;BR /&gt;Flow drop:&lt;BR /&gt;Inspection failure (inspect-fail) 168&lt;BR /&gt;Failed to allocate inspection (no-inspect) 10882&lt;BR /&gt;Inspect scansafe server not reachable (inspect-scansafe-server-not-reachable) 12548&lt;BR /&gt;&lt;BR /&gt;Last clearing: Never&lt;BR /&gt;firewall# show perfmon&lt;BR /&gt;&lt;BR /&gt;PERFMON STATS:                     Current      Average&lt;BR /&gt;Xlates                              765/s          5/s&lt;BR /&gt;Connections                        2419/s         29/s&lt;BR /&gt;TCP Conns                          2393/s         17/s&lt;BR /&gt;UDP Conns                            24/s         10/s&lt;BR /&gt;URL Access                            0/s          0/s&lt;BR /&gt;URL Server Req                        0/s          0/s&lt;BR /&gt;TCP Fixup                           234/s         20/s&lt;BR /&gt;TCP Intercept Established Conns       0/s          0/s&lt;BR /&gt;TCP Intercept Attempts                0/s          0/s&lt;BR /&gt;TCP Embryonic Conns Timeout          32/s          0/s&lt;BR /&gt;HTTP Fixup                          234/s         20/s&lt;BR /&gt;FTP Fixup                             0/s          0/s&lt;BR /&gt;AAA Authen                            0/s          0/s&lt;BR /&gt;AAA Author                            0/s          0/s&lt;BR /&gt;AAA Account                           0/s          0/s&lt;BR /&gt;&lt;BR /&gt;VALID CONNS RATE in TCP INTERCEPT:    Current      Average&lt;BR /&gt;                                       N/A         94.44%&lt;BR /&gt;firewall#&lt;BR /&gt;firewall# show traffic&lt;BR /&gt;outside:&lt;BR /&gt;        received (in 145000.180 secs):&lt;BR /&gt;                157445561 packets       87290108247 bytes&lt;BR /&gt;                1026 pkts/sec   601022 bytes/sec&lt;BR /&gt;        transmitted (in 145000.180 secs):&lt;BR /&gt;                160008603 packets       51506826224 bytes&lt;BR /&gt;                1014 pkts/sec   355011 bytes/sec&lt;BR /&gt;      1 minute input rate 10087 pkts/sec,  6751982 bytes/sec&lt;BR /&gt;      1 minute output rate 8947 pkts/sec,  2867252 bytes/sec&lt;BR /&gt;      1 minute drop rate, 29 pkts/sec&lt;BR /&gt;      5 minute input rate 10337 pkts/sec,  7120569 bytes/sec&lt;BR /&gt;      5 minute output rate 9269 pkts/sec,  2889681 bytes/sec&lt;BR /&gt;      5 minute drop rate, 36 pkts/sec&lt;BR /&gt;inside:&lt;BR /&gt;        received (in 145000.140 secs):&lt;BR /&gt;                245590275 packets       53353651093 bytes&lt;BR /&gt;                1012 pkts/sec   367008 bytes/sec&lt;BR /&gt;        transmitted (in 145000.140 secs):&lt;BR /&gt;                247605323 packets       89356654158 bytes&lt;BR /&gt;                1026 pkts/sec   616015 bytes/sec&lt;BR /&gt;      1 minute input rate 12949 pkts/sec,  2883846 bytes/sec&lt;BR /&gt;      1 minute output rate 13753 pkts/sec,  6539266 bytes/sec&lt;BR /&gt;      1 minute drop rate, 3 pkts/sec&lt;BR /&gt;      5 minute input rate 13019 pkts/sec,  2931288 bytes/sec&lt;BR /&gt;      5 minute output rate 13480 pkts/sec,  6204603 bytes/sec&lt;BR /&gt;      5 minute drop rate, 3 pkts/sec&lt;BR /&gt;dmz-front-in:&lt;BR /&gt;        received (in 145048.060 secs):&lt;BR /&gt;                1120220 packets 141630196 bytes&lt;BR /&gt;                7 pkts/sec      28 bytes/sec&lt;BR /&gt;        transmitted (in 145048.060 secs):&lt;BR /&gt;                1008390 packets 318832727 bytes&lt;BR /&gt;                6 pkts/sec      2020 bytes/sec&lt;BR /&gt;      1 minute input rate 11 pkts/sec,  1618 bytes/sec&lt;BR /&gt;      1 minute output rate 11 pkts/sec,  4643 bytes/sec&lt;BR /&gt;      1 minute drop rate, 0 pkts/sec&lt;BR /&gt;      5 minute input rate 11 pkts/sec,  1320 bytes/sec&lt;BR /&gt;      5 minute output rate 10 pkts/sec,  4419 bytes/sec&lt;BR /&gt;      5 minute drop rate, 0 pkts/sec&lt;BR /&gt;dmz-front-out:&lt;BR /&gt;        received (in 145048.090 secs):&lt;BR /&gt;                291645583 packets       68016082615 bytes&lt;BR /&gt;                2010 pkts/sec   468002 bytes/sec&lt;BR /&gt;        transmitted (in 145048.090 secs):&lt;BR /&gt;                303334413 packets       64088215895 bytes&lt;BR /&gt;                2002 pkts/sec   441012 bytes/sec&lt;BR /&gt;      1 minute input rate 14567 pkts/sec,  3913761 bytes/sec&lt;BR /&gt;      1 minute output rate 15518 pkts/sec,  3722192 bytes/sec&lt;BR /&gt;      1 minute drop rate, 31 pkts/sec&lt;BR /&gt;      5 minute input rate 14637 pkts/sec,  3944269 bytes/sec&lt;BR /&gt;      5 minute output rate 15595 pkts/sec,  3762372 bytes/sec&lt;BR /&gt;      5 minute drop rate, 29 pkts/sec&lt;BR /&gt;dmz-back:&lt;BR /&gt;        received (in 145048.120 secs):&lt;BR /&gt;                46612 packets   4903621 bytes&lt;BR /&gt;                0 pkts/sec      4 bytes/sec&lt;BR /&gt;        transmitted (in 145048.120 secs):&lt;BR /&gt;                42585 packets   2940933 bytes&lt;BR /&gt;                0 pkts/sec      20 bytes/sec&lt;BR /&gt;      1 minute input rate 0 pkts/sec,  13 bytes/sec&lt;BR /&gt;      1 minute output rate 0 pkts/sec,  21 bytes/sec&lt;BR /&gt;      1 minute drop rate, 0 pkts/sec&lt;BR /&gt;      5 minute input rate 0 pkts/sec,  37 bytes/sec&lt;BR /&gt;      5 minute output rate 0 pkts/sec,  26 bytes/sec&lt;BR /&gt;      5 minute drop rate, 0 pkts/sec&lt;BR /&gt;AP-Network:&lt;BR /&gt;        received (in 145048.150 secs):&lt;BR /&gt;                1190192 packets 334681204 bytes&lt;BR /&gt;                8 pkts/sec      2011 bytes/sec&lt;BR /&gt;        transmitted (in 145048.150 secs):&lt;BR /&gt;                225612 packets  82728425 bytes&lt;BR /&gt;                1 pkts/sec      7 bytes/sec&lt;BR /&gt;      1 minute input rate 20 pkts/sec,  7265 bytes/sec&lt;BR /&gt;      1 minute output rate 11 pkts/sec,  4077 bytes/sec&lt;BR /&gt;      1 minute drop rate, 11 pkts/sec&lt;BR /&gt;      5 minute input rate 20 pkts/sec,  6536 bytes/sec&lt;BR /&gt;      5 minute output rate 13 pkts/sec,  7639 bytes/sec&lt;BR /&gt;      5 minute drop rate, 10 pkts/sec&lt;BR /&gt;GUEST:&lt;BR /&gt;        received (in 145048.190 secs):&lt;BR /&gt;                8912092 packets 1782711057 bytes&lt;BR /&gt;                2 pkts/sec      12023 bytes/sec&lt;BR /&gt;        transmitted (in 145048.190 secs):&lt;BR /&gt;                14924003 packets        17921670138 bytes&lt;BR /&gt;                14 pkts/sec     123023 bytes/sec&lt;BR /&gt;      1 minute input rate 615 pkts/sec,  135517 bytes/sec&lt;BR /&gt;      1 minute output rate 1017 pkts/sec,  1140473 bytes/sec&lt;BR /&gt;      1 minute drop rate, 18 pkts/sec&lt;BR /&gt;      5 minute input rate 876 pkts/sec,  144216 bytes/sec&lt;BR /&gt;      5 minute output rate 1527 pkts/sec,  1859723 bytes/sec&lt;BR /&gt;      5 minute drop rate, 15 pkts/sec&lt;BR /&gt;FAILOVER-LINK:&lt;BR /&gt;        received (in 144996.240 secs):&lt;BR /&gt;                214410 packets  17186932 bytes&lt;BR /&gt;                1 pkts/sec      0 bytes/sec&lt;BR /&gt;        transmitted (in 144996.240 secs):&lt;BR /&gt;                214784 packets  16716916 bytes&lt;BR /&gt;                1 pkts/sec      26 bytes/sec&lt;BR /&gt;      1 minute input rate 1 pkts/sec,  105 bytes/sec&lt;BR /&gt;      1 minute output rate 1 pkts/sec,  123 bytes/sec&lt;BR /&gt;      1 minute drop rate, 0 pkts/sec&lt;BR /&gt;      5 minute input rate 1 pkts/sec,  107 bytes/sec&lt;BR /&gt;      5 minute output rate 1 pkts/sec,  125 bytes/sec&lt;BR /&gt;      5 minute drop rate, 0 pkts/sec&lt;BR /&gt;STATE-LINK:&lt;BR /&gt;        received (in 145048.250 secs):&lt;BR /&gt;                90770328 packets        108984956920 bytes&lt;BR /&gt;                3 pkts/sec      751015 bytes/sec&lt;BR /&gt;        transmitted (in 145048.250 secs):&lt;BR /&gt;                35940252 packets        43712386930 bytes&lt;BR /&gt;                10 pkts/sec     301009 bytes/sec&lt;BR /&gt;      1 minute input rate 1 pkts/sec,  46 bytes/sec&lt;BR /&gt;      1 minute output rate 1775 pkts/sec,  2171295 bytes/sec&lt;BR /&gt;      1 minute drop rate, 0 pkts/sec&lt;BR /&gt;      5 minute input rate 1 pkts/sec,  46 bytes/sec&lt;BR /&gt;      5 minute output rate 1775 pkts/sec,  2170648 bytes/sec&lt;BR /&gt;      5 minute drop rate, 0 pkts/sec&lt;BR /&gt;&lt;BR /&gt;----------------------------------------&lt;BR /&gt;Aggregated Traffic on Physical Interface&lt;BR /&gt;----------------------------------------&lt;BR /&gt;GigabitEthernet0/0:&lt;BR /&gt;        received (in 145048.290 secs):&lt;BR /&gt;                157513370 packets       90448517054 bytes&lt;BR /&gt;                1026 pkts/sec   623012 bytes/sec&lt;BR /&gt;        transmitted (in 145048.290 secs):&lt;BR /&gt;                160011233 packets       54892280096 bytes&lt;BR /&gt;                1014 pkts/sec   378026 bytes/sec&lt;BR /&gt;      1 minute input rate 10084 pkts/sec,  6945147 bytes/sec&lt;BR /&gt;      1 minute output rate 8946 pkts/sec,  3055433 bytes/sec&lt;BR /&gt;      1 minute drop rate, 0 pkts/sec&lt;BR /&gt;      5 minute input rate 10337 pkts/sec,  7318134 bytes/sec&lt;BR /&gt;      5 minute output rate 9268 pkts/sec,  3082815 bytes/sec&lt;BR /&gt;      5 minute drop rate, 0 pkts/sec&lt;BR /&gt;GigabitEthernet0/1:&lt;BR /&gt;        received (in 145048.320 secs):&lt;BR /&gt;                245649397 packets       58616975884 bytes&lt;BR /&gt;                1012 pkts/sec   404001 bytes/sec&lt;BR /&gt;        transmitted (in 145048.320 secs):&lt;BR /&gt;                247609055 packets       94322080391 bytes&lt;BR /&gt;                1026 pkts/sec   650013 bytes/sec&lt;BR /&gt;      1 minute input rate 12954 pkts/sec,  3163926 bytes/sec&lt;BR /&gt;      1 minute output rate 13754 pkts/sec,  6808964 bytes/sec&lt;BR /&gt;      1 minute drop rate, 0 pkts/sec&lt;BR /&gt;      5 minute input rate 13019 pkts/sec,  3203949 bytes/sec&lt;BR /&gt;      5 minute output rate 13480 pkts/sec,  6470336 bytes/sec&lt;BR /&gt;      5 minute drop rate, 0 pkts/sec&lt;BR /&gt;GigabitEthernet0/2:&lt;BR /&gt;        received (in 145048.360 secs):&lt;BR /&gt;                292818281 packets       75392769089 bytes&lt;BR /&gt;                2018 pkts/sec   519006 bytes/sec&lt;BR /&gt;        transmitted (in 145048.360 secs):&lt;BR /&gt;                304389224 packets       71394235471 bytes&lt;BR /&gt;                2009 pkts/sec   492002 bytes/sec&lt;BR /&gt;      1 minute input rate 14582 pkts/sec,  4277611 bytes/sec&lt;BR /&gt;      1 minute output rate 15536 pkts/sec,  4091740 bytes/sec&lt;BR /&gt;      1 minute drop rate, 0 pkts/sec&lt;BR /&gt;      5 minute input rate 14648 pkts/sec,  4305440 bytes/sec&lt;BR /&gt;      5 minute output rate 15606 pkts/sec,  4123903 bytes/sec&lt;BR /&gt;      5 minute drop rate, 0 pkts/sec&lt;BR /&gt;GigabitEthernet0/3:&lt;BR /&gt;        received (in 145048.390 secs):&lt;BR /&gt;                10118109 packets        2354688844 bytes&lt;BR /&gt;                10 pkts/sec     16026 bytes/sec&lt;BR /&gt;        transmitted (in 145048.390 secs):&lt;BR /&gt;                15150063 packets        18340611647 bytes&lt;BR /&gt;                15 pkts/sec     126000 bytes/sec&lt;BR /&gt;      1 minute input rate 636 pkts/sec,  157778 bytes/sec&lt;BR /&gt;      1 minute output rate 1030 pkts/sec,  1170485 bytes/sec&lt;BR /&gt;      1 minute drop rate, 0 pkts/sec&lt;BR /&gt;      5 minute input rate 897 pkts/sec,  171564 bytes/sec&lt;BR /&gt;      5 minute output rate 1541 pkts/sec,  1902028 bytes/sec&lt;BR /&gt;      5 minute drop rate, 0 pkts/sec&lt;BR /&gt;Management0/0:&lt;BR /&gt;        received (in 145048.420 secs):&lt;BR /&gt;                90732754 packets        112448610200 bytes&lt;BR /&gt;                3 pkts/sec      775011 bytes/sec&lt;BR /&gt;        transmitted (in 145048.420 secs):&lt;BR /&gt;                36068682 packets        44382019856 bytes&lt;BR /&gt;                11 pkts/sec     305003 bytes/sec&lt;BR /&gt;      1 minute input rate 2 pkts/sec,  213 bytes/sec&lt;BR /&gt;      1 minute output rate 1776 pkts/sec,  2203227 bytes/sec&lt;BR /&gt;      1 minute drop rate, 0 pkts/sec&lt;BR /&gt;      5 minute input rate 2 pkts/sec,  213 bytes/sec&lt;BR /&gt;      5 minute output rate 1776 pkts/sec,  2202748 bytes/sec&lt;BR /&gt;      5 minute drop rate, 0 pkts/sec&lt;BR /&gt;firewall#&lt;BR /&gt;&lt;BR /&gt;Regards,</description>
      <pubDate>Wed, 28 Mar 2018 10:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356523#M964715</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2018-03-28T10:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356565#M964716</link>
      <description>&lt;P&gt;Following counters seem to be incriminating pretty fast:&amp;nbsp;TCP RST/FIN out of order , TCP RST/SYN in window , DNS Inspect packet too long.&lt;/P&gt;
&lt;P&gt;You could configure a capture to see exactly who is doing the traffic and verify if it is legitimate or not and if it can be stopped.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cap CAP-RST-SYN type asp-drop tcp-rst-syn-in-win buffer 1000000 circular-buffer&lt;BR /&gt;cap CAP-RST-FIN type asp-drop tcp-rstfin-ooo buffer 1000000 circular-buffer&lt;BR /&gt;cap CAP-DNS type asp-drop inspect-dns-pak-too-long buffer 1000000 circular-buffer&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 11:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356565#M964716</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-03-28T11:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356596#M964717</link>
      <description>Thanks, i managed to resolve the DNS maximum length by increasing DNS maximum allowed packet lenght on the global policy&lt;BR /&gt;&lt;BR /&gt;=====================================================================&lt;BR /&gt;&lt;BR /&gt;===============&lt;BR /&gt;CAP-RST-SYN&lt;BR /&gt;===============&lt;BR /&gt;&lt;BR /&gt;8418: 13:00:29.182745       802.1Q vlan#200 P0 @PROXY1.40100 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: SWE 3026483265:3026483265(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;8419: 13:00:29.242709       802.1Q vlan#200 P0 @PROXY4.19775 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: SWE 2933989033:2933989033(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;8420: 13:00:29.256822       802.1Q vlan#200 P0 @PROXY4.19781 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: SWE 493632163:493632163(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;8421: 13:00:29.304763       802.1Q vlan#200 P0 @PROXY2.27091 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: SWE 2077561914:2077561914(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;8422: 13:00:29.401621       802.1Q vlan#200 P0 @PROXY1.40162 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: SWE 1893318:1893318(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;8423: 13:00:29.431038       802.1Q vlan#200 P0 @PROXY1.40173 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: SWE 2389956696:2389956696(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;8424: 13:00:29.463827       802.1Q vlan#200 P0 @PROXY4.19828 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: SWE 479335951:479335951(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;8425: 13:00:29.480367       802.1Q vlan#200 P0 @PROXY4.19831 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: SWE 646829171:646829171(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;8426: 13:00:29.494710       802.1Q vlan#200 P0 @PROXY1.40192 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: SWE 706034794:706034794(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;8427: 13:00:29.496892       802.1Q vlan#200 P0 @PROXY1.40194 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: SWE 3571270395:3571270395(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;8427 packets shown&lt;BR /&gt;firewall#&lt;BR /&gt;=====================================================================&lt;BR /&gt;&lt;BR /&gt;===============&lt;BR /&gt;CAP-RST-FIN&lt;BR /&gt;===============&lt;BR /&gt;&lt;BR /&gt;2572: 13:05:12.888717       802.1Q vlan#200 P0 @PROXY-HA.8080 &amp;gt; @PROXY-CLIENT.50713: R 3028373259:3028373259(0) win 0 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2573: 13:05:12.889373       @PROXY-CLIENT.52951 &amp;gt; @PROXY-HA.8080: R 891534262:891534262(0) win 0 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2574: 13:05:12.959697       802.1Q vlan#200 P0 @PROXY-HA.8080 &amp;gt; @PROXY-CLIENT.49165: R 4143752165:4143752165(0) win 0 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2575: 13:05:13.444206       802.1Q vlan#200 P0 @PROXY-HA.8080 &amp;gt; @PROXY-CLIENT.53390: R 1844042984:1844042984(0) win 0 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2576: 13:05:13.569337       802.1Q vlan#800 P0 @PUBLIC-IP-FOR-GUEST-NETWORK.39692 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: F 1248479373:1248479373(0) ack 3675873403 win 1369 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2577: 13:05:13.581375       802.1Q vlan#800 P0 @PUBLIC-IP-FOR-GUEST-NETWORK.34243 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: F 272944704:272944704(0) ack 878609742 win 1369 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2578: 13:05:14.257112       802.1Q vlan#800 P0 &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/258821"&gt;@guest&lt;/a&gt;-NETWORK-CLIENT.46753 &amp;gt; 23.57.89.142.443: R 2360057826:2360057826(0) win 0 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2579: 13:05:14.621504       802.1Q vlan#800 P0 @PUBLIC-IP-FOR-GUEST-NETWORK.34243 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: FP 272944672:272944704(32) ack 878609742 win 1369 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2580: 13:05:14.753821       802.1Q vlan#200 P0 @PROXY-HA.8080 &amp;gt; @PROXY-CLIENT.49856: R 2014518163:2014518163(0) win 0 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2581: 13:05:16.683222       @UPSTREAM-PROXY-SERVER-CONNECTOR.8080 &amp;gt; @PUBLIC-IP-FOR-GUEST-NETWORK.57977: R 2455327392:2455327392(0) ack 1952478637 win 131&lt;BR /&gt;2582: 13:05:16.852739       802.1Q vlan#200 P0 @PROXY-HA.8080 &amp;gt; @PROXY-CLIENT.50884: R 59380247:59380247(0) win 0 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2583: 13:05:17.617842       802.1Q vlan#200 P0 @PROXY-HA.8080 &amp;gt; @PROXY-CLIENT.54416: R 1401204225:1401204225(0) win 0 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2584: 13:05:17.817477       802.1Q vlan#200 P0 @PROXY-HA.8080 &amp;gt; @PROXY-CLIENT.62737: R 1993565555:1993565555(0) win 0 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2585: 13:05:17.894195       802.1Q vlan#800 P0 @PUBLIC-IP-FOR-GUEST-NETWORK.42977 &amp;gt; @UPSTREAM-PROXY-SERVER-CONNECTOR.8080: F 2689946459:2689946459(0) ack 1628644842 win 685 Drop-reason: (tcp-rstfin-ooo) TCP RST/FIN out of order&lt;BR /&gt;2585 packets shown&lt;BR /&gt;=====================================================================&lt;BR /&gt;&lt;BR /&gt;Regards,</description>
      <pubDate>Wed, 28 Mar 2018 12:11:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356596#M964717</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2018-03-28T12:11:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356679#M964718</link>
      <description>&lt;P&gt;Based on the output it seems something is wrong with the proxy setup.&lt;/P&gt;
&lt;P&gt;You could disable tcp inspection on the asa, but the problem is not on the asa.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TCP RST/SYN in window:&lt;BR /&gt;SYN flag should not be used in data transfer. Only the first packet sent from each end should have this flag set.&lt;/P&gt;
&lt;P&gt;TCP RST/FIN out of order:&lt;BR /&gt;TCP RST or TCP FIN packet received after the tcp session was closed. It could be caused by a host trying to use a closed tcp session, the other host would normally respond to that with a RST.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 13:21:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356679#M964718</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-03-28T13:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356740#M964719</link>
      <description>I fact it's a windows server 2012, there are no proxy rules on the proxy, all it's doing is forwarding the traffic to the upstream server collector.&lt;BR /&gt;How can i check if something is wrong on the proxy server ?</description>
      <pubDate>Wed, 28 Mar 2018 14:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356740#M964719</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2018-03-28T14:20:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356782#M964720</link>
      <description>&lt;P&gt;Windows is unfortunately&amp;nbsp;not my area of expertise.&lt;/P&gt;
&lt;P&gt;You could maybe have a look at the system logs.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 14:51:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356782#M964720</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-03-28T14:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356794#M964721</link>
      <description>I think the problem is high tcp conn. You conn rate is 2300 per sec. Is&lt;BR /&gt;this normal. Is it a heavy environment.&lt;BR /&gt;&lt;BR /&gt;Check show host command with sort option to see who is causing this&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Mar 2018 15:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356794#M964721</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-03-28T15:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356800#M964722</link>
      <description>This happened a while ago and stopped when i thought i upgraded the firmware of the firewall, and then it appeared again, i can't find the command show host !&lt;BR /&gt;do you mean show local-host ? if yes how can i sort the output ?&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Mar 2018 15:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356800#M964722</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2018-03-28T15:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356801#M964723</link>
      <description>I have tried system logs, but they are not showing anything unusual !&lt;BR /&gt;&lt;BR /&gt;Regards,</description>
      <pubDate>Wed, 28 Mar 2018 15:10:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356801#M964723</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2018-03-28T15:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 High CPU usage | nat-no-xlate-to-pat-pool</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356835#M964724</link>
      <description>I have sorted out the output of show local-host using Excel :&lt;BR /&gt;&lt;BR /&gt;local host: &amp;lt;@PROXY-HA&amp;gt;,		&lt;BR /&gt;    TCP flow count/limit 	1412	unlimited&lt;BR /&gt;    TCP embryonic count to host 	69	&lt;BR /&gt;    TCP intercept watermark 	 unlimited	&lt;BR /&gt;    UDP flow count/limit 	0	unlimited&lt;BR /&gt;local host: &amp;lt;@PROXY3&amp;gt;,		&lt;BR /&gt;    TCP flow count/limit 	1741	unlimited&lt;BR /&gt;    TCP embryonic count to host 	1	&lt;BR /&gt;    TCP intercept watermark 	 unlimited	&lt;BR /&gt;    UDP flow count/limit 	0	unlimited&lt;BR /&gt;local host: &amp;lt;@PROXY2&amp;gt;,		&lt;BR /&gt;    TCP flow count/limit 	2147	unlimited&lt;BR /&gt;    TCP embryonic count to host 	1	&lt;BR /&gt;    TCP intercept watermark 	 unlimited	&lt;BR /&gt;    UDP flow count/limit 	0	unlimited&lt;BR /&gt;local host: &amp;lt;@PROXY1&amp;gt;,		&lt;BR /&gt;    TCP flow count/limit 	3102	unlimited&lt;BR /&gt;    TCP embryonic count to host 	12	&lt;BR /&gt;    TCP intercept watermark 	 unlimited	&lt;BR /&gt;    UDP flow count/limit 	0	unlimited&lt;BR /&gt;local host: &amp;lt;@PROXY4&amp;gt;,		&lt;BR /&gt;    TCP flow count/limit 	2350	unlimited&lt;BR /&gt;    TCP embryonic count to host 	2	&lt;BR /&gt;    TCP intercept watermark 	 unlimited	&lt;BR /&gt;    UDP flow count/limit 	1	unlimited&lt;BR /&gt;local host: &amp;lt;@PROXY-COLLECTOR-PUBLIC-IP&amp;gt;,		&lt;BR /&gt;    TCP flow count/limit 	7935	unlimited&lt;BR /&gt;    TCP embryonic count to host 	906	&lt;BR /&gt;    TCP intercept watermark 	 unlimited	&lt;BR /&gt;    UDP flow count/limit 	0	unlimited&lt;BR /&gt;&lt;BR /&gt;Wanted to mention that we are using scansafe as webfilter.&lt;BR /&gt;Thank you,</description>
      <pubDate>Wed, 28 Mar 2018 15:40:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-high-cpu-usage-nat-no-xlate-to-pat-pool/m-p/3356835#M964724</guid>
      <dc:creator>Neji Jihed</dc:creator>
      <dc:date>2018-03-28T15:40:54Z</dc:date>
    </item>
  </channel>
</rss>

