Solved

Cisco ASA 5510 Enabling Top Usage Status Resource Utilization?

Posted on 2014-03-06
1
578 Views
Last Modified: 2014-03-07
Does anyone have experience with what kind of effect enabling Top Usage Status has on system resources on a Cisco ASA 5510 with 256 MB of RAM and CPU?

Currently we are using low amounts of CPU, below 20%.  But we are using about 141MB of RAM.

It seems like an interesting feature to use, I am hoping that it will allow me to check basic usage statistics for bandwidth hogs and then I can walk over and yell at them.

I found this Cisco forum post, it's short with only one response.  The responder seems to indicate that it uses quite a bit of RAM resources...
https://supportforums.cisco.com/thread/2089141

Has anyone actually enabled this on an ASA 5510 with 256 MB of RAM?  Did they have any issues?  Did it cause the ASA to freeze or lockup in anyway?

Also, I am guessing that like with all things Cisco, such a change would not automatically be committed to flash memory unless I instructed it to save running config to flash, so that in worst case scenario, I can simply restart the ASA and it would revert back to start-up configuration before I had enabled the feature?

Thanks
0
Comment
Question by:CnicNV
1 Comment
 
LVL 34

Accepted Solution

by:
Istvan Kalmar earned 500 total points
ID: 39912655
Hi,

It depends on your current configs and users... but:

I advise to upgrade your ram to 1G:

http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/product_bulletin_c25-586414.html

http://www.amazon.com/Cisco-ASA5510-MEM-1GB-Memory-Asa-5510/dp/B003DYMR1U

I advise to try it on running config, and monitor your ASA memory and CPU via SNMP, if there is no problem within one week you save it!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How does VLAN work? Scenario: (please read the question) 11 105
Defaulting a Branch Juniper SRX240 5 32
Fortigate 100D NTP Issue 4 54
Firewall report connections 8 32
Occasionally, we encounter connectivity issues that appear to be isolated to cable internet service.  The issues we typically encountered were reset errors within Internet Explorer when accessing web sites or continually dropped or failing VPN conne…
Network ports are the threads that hold network communication together. They are an essential part of networking that can be easily ignore or misunderstood, my goals is to show those who don't have a strong network foundation how network ports opera…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now