I have a 4235 appliance running 4.1(1)S47 For a long time a device worked normally, but suddenly it began to give out strange statistics. Particularly, on CLI command " show interface sensing" appears the following message:
"Sensing int0 is up
Hardware is eth0, TX
MAC statistics from the Gig Ethernet Interface int0
Missed Packet Percentage = 99
Link Status = Up
Total Packets Received = 214
Total Bytes Received = 61661
Total Receive Errors = 49718
Total Receive FIFO Errors = 49718 (?????)
Total Receive Missed Errors = 49718"
In addition to this appliance detects the following alert events.
"signature: sigId=993 sigName=Missed Packet Count subSigId=0 version=S37 The packet drop rate has exceeded the threshold
addr: locality=OUT 0.0.0.0
addr: locality=OUT 0.0.0.0
alertDetails: Traffic Source: int0 ; Missed 100% of packets in the last 30 seconds"
Security Monitor running on VMS 2.2 (with patch fcs-idsmdc-v2.0.1-w2k) don't recieve any security or audit massages from appliance. The recovery procedure haven't gave any positive results. Situation is the same.
Any comments or suggestions would be highly appreciated.
I too am having a problem which resembles this...(Cisco 4250) Events or traps were no longer being sent by this device. show events on console of the sensor reported packet loss and a percentage of missed packets in the 8000% range... yes 8000 percent
I went ahead and switched out the fiber cables to make sure I wasn't having a physical layer problem. The thing that bugs me is that the switch is reporting that the errors off of the port are on the receiving end. However, the switch port is a monitor port, it should only be sending copies of the packets seen. Changing out the cable did not fix this problem. I ended up rebooting the sensor, the events started to show up on the console and the missed packet percentage disappeared. The only problem is that the switch is still reporting receive errors for that span port. This problem will eventually come back.
PS... Dont you hate it when you update your sensors signatures and it blows out the sensor configuration...what a tool.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :