cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
618
Views
5
Helpful
5
Replies

CPU Router

Robo123
Level 1
Level 1

hi Team,

 

Please help me to know why below command leads to high cpu.

access-list 115 deny   tcp any any log

5 Replies 5

Hi,

 


@vishnupalloormeethal wrote:

hi Team,

 

Please help me to know why below command leads to high cpu.

access-list 115 deny   tcp any any log


It is because of the log keyword. When you log, routing will be process switched, that will lead to high CPU load. Do not enable log in production; use it for troubleshooting only.

 

HTH,

Meheretab

HTH,
Meheretab

Please confirm N number of static route and ACL will cause high cpu if so  , please share the link where cisco suggested the maximum limit of static routes will cause an interrupts for Cisco 2800 series.

 

I am not sure whether it is a new question. It seems unrelated with the original question of why "high cpu utilization" when the command is "access-list 115 deny tcp any any log".

 

For the original question, you can look at the following link which could give you the general idea of "log" keyword (even if it is focused on 2960X platform): https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15-0_2_EX/security/configuration_guide/b_sec_152ex_2960-x_cg/b_sec_152ex_2960-x_cg_chapter_01011.html

 

For router ACLs, other factors can cause packets to be sent to the CPU:
- Using the log keyword
- Generating ICMP unreachable messages
When traffic flows are both logged and forwarded, forwarding is done by hardware, but logging must be done by software. Because of the difference in packet handling capacity between hardware and software, if the sum of all flows being logged (both permitted flows and denied flows) is of great enough bandwidth, not all of the packets that are forwarded can be logged.

 

HTH,
Meheretab

HTH,
Meheretab

hi ,

 

my  question is i have cisco 2811 with huge number of static routes.so is it will cause high cpu

Perhaps, perhaps not.

Much would depend on how deeply you typically process the ACEs. (I.e., if it doesn't impact your match logic, the ACEs should be in hit/match frequency sequence.)

Much also depends on other configuration options. For example, flow caching, I believe, short circuits the needs to process an ACL for every packet in a flow.
Review Cisco Networking for a $25 gift card