05-14-2018 06:21 AM - edited 02-21-2020 07:45 AM
I have trouble with ASA 5520. Dispatch unit consumes 99% of CPU.
When I shut down all interface other than inside, CPU turns normal. When I turn on outside and others, same thing occur. What is the reason? I need expert advice.
Solved! Go to Solution.
05-14-2018 08:32 PM
I have seen cases where SYN attacks / flooding causes this. check you logs to see if you pickup any flooding/syn attack events, just a thought
05-14-2018 07:25 AM
Having only one interface up on the ASA, basically means no traffic will be forwarded so that does not help with finding out the cause.
Does the CPU rise when bringing up one of the other interfaces?
Further steps for troubleshooting:
show processes cpu-usage sorted non-zero - identify the process taking up the most of the CPU
show interface - check for input or output errors
show traffic - check interfaces with unusual high traffic
HTH
Bogdan
05-14-2018 10:15 PM
show processes cpu-usage sorted non-zero
0x08283a1a 0x6d5d2e4c 97.1% 96.8% 94.0% Dispatch Unit
0x090f9f8c 0x6d5c9aec 0.2% 0.2% 0.2% Logger
0x08f567cd 0x6d5bce3c 0.2% 0.2% 0.2% IP SLA Mon Event Processor
0x08c751b0 0x6d5b2458 0.1% 0.1% 0.1% Unicorn Admin Handler
show interfaces
Interface GigabitEthernet0/0.30 "INSIDE", is up, line protocol is up
Hardware is i82546GB rev03, BW 1000 Mbps, DLY 10 usec
VLAN identifier 30
MAC address 70ca.9b85.06ce, MTU 1500
IP address X.X.X.X, subnet mask 255.255.255.0
Traffic Statistics for "INSIDE":
519451485 packets input, 31134611586 bytes
553307749 packets output, 92540681141 bytes
496212188 packets dropped
Interface GigabitEthernet0/0.80 "OUTSIDE", is up, line protocol is up
Hardware is i82546GB rev03, BW 1000 Mbps, DLY 10 usec
VLAN identifier 80
MAC address 70ca.9b85.06ce, MTU 1500
IP address X.X.X.X, subnet mask 255.255.255.240
Traffic Statistics for "OUTSIDE":
10447437 packets input, 7170429891 bytes
9174785 packets output, 4363070281 bytes
173728 packets dropped
This is a result of commands.
05-14-2018 08:32 PM
I have seen cases where SYN attacks / flooding causes this. check you logs to see if you pickup any flooding/syn attack events, just a thought
05-14-2018 10:16 PM
I use Manageengine Firewall Analyzer and I can`t see any attack log.
05-15-2018 01:56 AM
There are a lot of packets being dropped by the ASA, you could use the show asp drop to further investigate why are the packets being dropped.
It would also be a good idea to enable unicast RPF on all interface.
05-15-2018 02:14 AM - edited 05-15-2018 02:17 AM
I enabled it, but did not give a result.
What is your recommendation after enabling it?
05-15-2018 02:41 AM
Do a clear asp drop, wait a couple of minutes and do show asp drop a couple of times, post the output.
05-15-2018 03:35 AM
05-15-2018 03:46 AM
05-15-2018 03:52 AM
It looks like a lot of packets are dropped by the acls, especially for a inside interface.
Do you have a deny any log statement at the end of the acl ?
If not configure it and monitor the logs.
05-15-2018 03:57 AM - edited 05-15-2018 03:58 AM
ACLs Logging is set by default when you create it.
05-15-2018 05:35 AM
05-15-2018 06:46 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide