2811 high cpu utilization!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-30-2013 03:30 PM - edited 03-04-2019 07:46 PM
12.4.24T4
I have a 2811 that is really hitting the CPU hard. Nothing shows on CPU processes. It has an IPsec VPN tunnel back to HQ which also has a 2811 that terminates the VPN. The HQ has 2-3 IPsec tunnels to other remote sites. The CPU at the HQ avg 50% utilization during business hrs, peaks at about 80%. The remote one is very high 95% peaks, avg 80%-95% during business hours with bandwidth utilization of only 10-20Mbps. I read somewhere that its possible that fragmentation could be causing this. My question is, if I set the MTU to 1450 on the remote, I am guessing I will need to do all the other routers as well, the HQ and other remote sites? Siince they use the same outside interface to my HQ, is that correct?
- Labels:
-
Other Routing
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-30-2013 05:31 PM
Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
You may want to review: http://www.cisco.com/en/US/tech/tk827/tk369/technologies_white_paper09186a00800d6979.shtml
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-30-2013 08:46 PM
I read that document not one scenario with a multi site config. Mostly GRE tunnels. I did see an IPsec tunnel but nothing specific about the MTU configuration. This is the document that said the IP fragmentation will cause the cpu to go very high. The NOTE: just before scenario 7. My question is if I have multiple sites terminating on to the same 2811 at the HQ do all the sites need the MTU configured the same on the outside interface correct?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-01-2013 02:48 AM
Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
From a tunnel usage and MTU perspective, doesn't matter if just a pair of site or mutli-sites. What's important is whether fragmentation is happening on any tunnel.
Thought whitepaper had MTU recommendations, including a generic recommendation of using an IP MTU of 1400 to allow for GRE/IPSec tunnel overhead; but I haven't recently re-read it.
No, all sites don't have to have the same IP MTU configuration, although it's somewhat unusual if they don't.
The key take always are:
- Setting IP MTU, on tunnel interface, to allow for overhead.
- Setting PMTUD on tunnel interface to keep tunnel from fragmenting packets with DF bit set and to also deal with physical path with a MTU less than expected.
- Using the TCP mss-adjust command to get TCP sessions on optimal MTU starting at TCP session handshake.
I've done lots of tunneling, the above won't 100% guarantee all cases will avoid fragmentation. For example, recently I had a fragmentation issue across a VTI tunnel because of video from security camera. Traffic was non-TCP, and didn't set DF and exceeded tunnel's MTU.
