In the Adaptive Security Appliance (ASA) version 7.1(2), HTTP accounting causes constant high CPU usage.
This issue is documented in Cisco bug ID CSSsd72617.
Secure Sockets Layer (SSL) VPN causes the ASA to freeze when a connected user tries to map a drive or browse the network. The ASA shows that 128MB of memory is used when WebVPN is enabled, but no users are connected.
The Access Control List (ACL) used to specify traffic for HTTP accounting must specify the IP pool used for WebVPN. This ACL must not specify all IP addresses. A change to this ACL, in order to specify the IP pool as the source, reduces the CPU utilization to acceptable levels.
As a workaround, upgrade from ASA 7.1(2) to 7.1(2)4. To specify the amount of memory assigned to WebVPN processes, issue the memory-size command under the WebVPN configuration as shown in this example:
Hi Guys, just want to double check with you. In FTD, I have 2 subnet and if I need to have intervlan for those 2 VLAN, do I still need to configure an identity NAT or any NAT?My target is doing intervlan routing between the 2 VLAN without any IP change.th...
Hi,I set up DVTI in EVE with 2 routers. HUB------SPOKE.Virtual-template is not showing up/down. Instead of up/up.Checked Phase1 and Phase2 parameters but not sure where I made a mistake.Attached diagram and configuration.Please take a look.
I tested using both Cisco ISE 2.4 (patch 9) and Cisco ISE 2.6 (patch 1). I have a user who successfully authenticated via RADIUS against ISE. Under ISE, Operations > Live Logs (and Live sessions), I see the user authenticated. After the accounting requ...