08-18-2023 11:27 AM
I have had the performance issue with Cisco ASR 1001-X. We received a lot of log messages like "%IOSXE_QFP-2-LOAD_EXCEED: Slot: 0, QFP:0, Load 99% exceeds the setting threshold." few time per day but not all days.
Router throughput is 20 Gbps with 2x10Gbps port bonding LACP, and peak traffic was about 7-8 Gbps.
It seens the issue was about QuantumFlow Processor and tried to find bottlenecks with command "show platform hardware qfp active datapath infra sw-cio" as in live BRKRST-3404 https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2020/pdf/BRKRST-3404.pdf . However, ASR did not support this command.
My device is "Chassis", DESCR: "Cisco ASR1001-X Chassis" PID: ASR1001-X
Cisco IOS XE Software, Version 16.09.05
Cisco IOS Software [Fuji], ASR1000 Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 16.9.5, RELEASE SOFTWARE (fc1)
License Type: Permanent
License Level: adventerprise
Next reload license Level: adventerprise
The current throughput level is 20000000 kbps
cisco ASR1001-X (1NG) processor (revision 1NG) with 6925044K/6147K bytes of memory.
Anyone has the same issue ?
Solved! Go to Solution.
07-05-2024 01:15 PM
Have you check out this?
I'm cheking out this.
08-18-2023 06:16 PM - edited 08-18-2023 06:16 PM
Post the complete output to the following commands:
08-21-2023 08:33 PM
@Leo Laohoo wrote:Post the complete output to the following commands:
- sh platform resource
- sh platform software status con brief
- sh crypto pki trustpool | include cn=
Thank for your reply.
sh platform resource
#sh platform resource
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.649 Hanoi Tue Aug 22 2023
**State Acronym: H - Healthy, W - Warning, C - Critical
Resource Usage Max Warning Critical State
----------------------------------------------------------------------------------------------------
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.652 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.661 Hanoi Tue Aug 22 2023
RP0 (ok, active) H
Control Processor 2.21% 100% 80% 90% H
DRAM 2485MB(15%) 15914MB 88% 93% H
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.671 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.678 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.686 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.694 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.703 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.711 Hanoi Tue Aug 22 2023
ESP0(ok, active) H
QFP H
TCAM 50cells(0%) 131072cells 65% 85% H
DRAM 534897KB(14%) 3670016KB 80% 90% H
IRAM 10709KB(8%) 131072KB 80% 90% H
CPU Utilization 14.00% 100% 90% 95% H
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.721 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.729 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.737 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.745 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.752 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.760 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.767 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.774 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.782 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.789 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.796 Hanoi Tue Aug 22 2023
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:29:46.804 Hanoi Tue Aug 22 2023
sh platform software status con brief
Load for five secs: 2%/0%; one minute: 2%; five minutes: 1%
Time source is NTP, 10:32:09.628 Hanoi Tue Aug 22 2023
Load Average
Slot Status 1-Min 5-Min 15-Min
RP0 Healthy 0.07 0.08 0.09
Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 16296268 2547428 (16%) 13748840 (84%) 8620772 (53%)
CPU Utilization
Slot CPU User System Nice Idle IRQ SIRQ IOwait
RP0 0 0.90 0.40 0.00 98.69 0.00 0.00 0.00
1 0.00 0.00 0.00 100.00 0.00 0.00 0.00
2 1.10 0.50 0.00 98.39 0.00 0.00 0.00
3 0.00 0.00 0.00 100.00 0.00 0.00 0.00
4 1.09 0.39 0.00 98.50 0.00 0.00 0.00
5 0.00 0.00 0.00 100.00 0.00 0.00 0.00
6 2.00 0.50 0.00 97.50 0.00 0.00 0.00
7 0.00 0.00 0.00 100.00 0.00 0.00 0.00
sh crypto pki trustpool | include cn=
cn=QuoVadis Root CA 2
cn=QuoVadis Root CA 2
cn=VeriSign Class 3 Public Primary Certification Authority - G5
cn=VeriSign Class 3 Public Primary Certification Authority - G5
cn=Cisco RXC-R2
cn=Cisco RXC-R2
cn=Cisco Root CA 2048
cn=ACT2 SUDI CA
cn=Cisco Licensing Root CA
cn=Cisco Licensing Root CA
cn=Licensing Root - DEV
cn=Licensing Root - DEV
cn=Cisco Root CA M2
cn=Cisco Manufacturing CA SHA2
cn=Cisco Root CA M2
cn=Cisco Root CA M2
cn=Cisco Root CA 2048
cn=Cisco Manufacturing CA
cn=Cisco Root CA 2048
cn=Cisco Root CA 2048
cn=Cisco Root CA M1
cn=Cisco Root CA M1
08-21-2023 09:29 PM - edited 08-24-2023 05:07 AM
@kwuenP wrote:sh crypto pki trustpool | include cn= cn=QuoVadis Root CA 2 cn=QuoVadis Root CA 2
Whether the appliance is using Cisco Smart License or not, the expired certificate will cause a memory leak of the firmware is not upgraded or the workaround not implemented.
And another one: FN - 72578 - Cisco IOS XE - Smart Licensing Using Policy Might Cause High CPU/Memory Usage
Same as above. Cisco Smart License can cause CPU Hog and/or Memory Leak which, if left unattended, can cause the appliance to crash.
10-30-2023 10:37 AM
Hi Leo,
Sorry for a long delay. I've done update cert following this topic https://www.cisco.com/c/en/us/support/docs/field-notices/723/fn72323.html and waited to reboot the devices. However, it appears not to be our case
We also migrated BGP workload to other routers, and ASRs are used to NAT traffic, peak bandwidth was about 300 Mbps but log "%IOSXE_QFP-2-LOAD_EXCEED" happened .
10-30-2023 02:52 PM
@kwuenP wrote:
%IOSXE_QFP-2-LOAD_EXCEED
This potentially means that the router is pushing more than what it is allowed.
@kwuenP wrote:
waited to reboot the devices. However, it appears not to be our case
Please read Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature.
Either upgrade the firmware of the router or apply the workaround. There are >28,000 routers compromised worldwide.
Ask yourself this: Is your router any one of them?
10-30-2023 09:19 PM
Be sure that HTTP Server feature was disabled at the first time configuration.
So if it is about router performance, it is quite disappointing that ASR1001-X with truly 20Gbps throughput and 16GB RAM can not do some basic NAT.
Total number of translations are between 100K to 700K but traffic loss about 0.1 - 0.3% . I'm sure that the NAT session per IP below 65K .
ip nat settings gatekeeper-size 65536
ip nat settings nonpatdrop
ip nat translation timeout 600
ip nat translation tcp-timeout 180
However, is there any limitation with nat for ASR ?
@Leo Laohoo wrote:
@kwuenP wrote:
%IOSXE_QFP-2-LOAD_EXCEEDThis potentially means that the router is pushing more than what it is allowed.
@kwuenP wrote:
waited to reboot the devices. However, it appears not to be our casePlease read Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature.
Either upgrade the firmware of the router or apply the workaround. There are >28,000 routers compromised worldwide.
Ask yourself this: Is your router any one of them?
07-05-2024 01:15 PM
Have you check out this?
I'm cheking out this.
07-02-2024 06:33 PM
@kwuenP did you got any solution?
07-09-2024 09:08 PM
yes. we've tried. We did both separate the NATed and non-NATed traffic from the same interface and Increase the size of the cache on the NAT Gatekeeper feature as Cisco recommend. It did not work. We think the main reason is our heavy NAT workload.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide