Solved

Cisco IOU High CPU Usuage

Posted on 2016-08-12
6
72 Views
Last Modified: 2016-08-13
Hello Experts,

I use Cisco IOU provided by flyxy.cn at http://91sec.blogspot.co.uk/2014/03/my-cisco-iou-racks-from-flyxj-iouv3.html

The Cisco L2 IOU 12 causes a lot of CPU usage causes high CPU usage. The high CPU usage is System not Users: more debugging shows that L2 IOU causes a lot of loopback traffic. It was suggested to use the following commands:

class-map match-all ARP
  match protocol arp

policy-map ARP-limit
  class ARP
   police rate 2 pps burst 20 packets peak-rate 7 pps
     conform-action transmit
     exceed-action drop
     violate-action drop

http://www.routereflector.com/2012/09/l2-iou-high-cpu-usage/

However, I don't see where to apply to policy. Can someone shed some light

Cheers

cpatte7372
0
Comment
Question by:Member_2_7966113
  • 3
  • 2
6 Comments
 
LVL 26

Accepted Solution

by:
Predrag Jovic earned 500 total points
Comment Utility
Most likely you should apply it on loopback interface (since it is loopback traffic)  :)

interface loopback0
service-policy output ARP-limit

Most likely you need to restrict traffic from loopback in out direction,.
0
 
LVL 3

Expert Comment

by:Steven Roman
Comment Utility
Hello

This is still going to use processing to try to limited the traffic

Try to determine why this is going on.  ARP could be MAC address flooding on your IOU Lab.

If that does not show any thing try GNS3 or Cisoc VIRL

Hope this helps.

Thanks
0
 

Author Comment

by:Member_2_7966113
Comment Utility
Hello Steven

Does Cisco VIRL do switching?

Regards
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 26

Expert Comment

by:Predrag Jovic
Comment Utility
Yes, but you need to pay for it. Check prices on Virl page.
0
 

Author Comment

by:Member_2_7966113
Comment Utility
Hi Steven,

I've just checked out Cisco VIRL, its not for me.

Cheers
0
 

Author Closing Comment

by:Member_2_7966113
Comment Utility
Thanks for responding. That solved the problem
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now