Calculate throughput on the ASA

While scoping out new ASA’s for a project it dawned on me that I really had no idea on where the throughput statistics that are quoted on all the marketing material Cisco has come from.  You can see some of the throughput stats located on datasheets like this one: http://www.cisco.com/c/en/us/products/security/asa-firepower-services/models-comparison.html.  I was unable to find anything online that showed how exactly one would calculate these stats so I ended up opening a TAC case.  Here’s what TAC had to say:

Calculating Throughput

Unfortunately there is no single spot to go to see the current throughput of the ASA.  You can access the stats through the use of some math and the CLI.  It would be best to run this during a time where you expect your average amount of traffic to be going through the firewall, or run it when you think you will see a peak in traffic so you have a maximum throughput value to go off of.

  1.  Login to the ASA via the CLI and run the ‘clear traffic’ and ‘clear interface’ commands to zero out the statistics.  This won’t impact any traffic.
  2. Wait about 5 minutes for ASA to gather statistics on traffic traversing the firewall
  3. Run the ‘show traffic’ command
  4. Go to the section “Aggregated Traffic on Physical Interface”
  5. In that section gather the received bytes/sec and transmitted bytes/sec on all the physical interfaces (management included,  internal data interfaces not included)
  6. Then add all the data gather received and transmitted
  7. Since the result is in bytes/sec, multiply the result by 8 to get it on bits/sec
  8. Divide the result by 1024 to get it on kbps
  9. Finally divide again the result by 1024 to get it on Mbps

Here’s an example of the output from the ‘Aggregated Traffic’ section of my ‘show traffic’ command, highlighting in bold the values you need to add up in step 5 and 6 above.

—————————————-

Aggregated Traffic on Physical Interface
----------------------------------------
GigabitEthernet0/0:
        received (in 313.200 secs):
                3974936 packets 4421004800 bytes
                12691 pkts/sec  14115596 bytes/sec
        transmitted (in 313.200 secs):
                2504824 packets 652176414 bytes
                7997 pkts/sec   2082300 bytes/sec
      1 minute input rate 11450 pkts/sec,  12411522 bytes/sec
      1 minute output rate 7341 pkts/sec,  1936331 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 3248 pkts/sec,  3543329 bytes/sec
      5 minute output rate 2104 pkts/sec,  558594 bytes/sec
      5 minute drop rate, 0 pkts/sec
GigabitEthernet0/1:
        received (in 313.440 secs):
                2484960 packets 646085090 bytes
                7928 pkts/sec   2061271 bytes/sec
        transmitted (in 313.440 secs):
                4405564 packets 4352007757 bytes
                14055 pkts/sec  13884659 bytes/sec
      1 minute input rate 7451 pkts/sec,  1932038 bytes/sec
      1 minute output rate 13124 pkts/sec,  12648429 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 2113 pkts/sec,  555686 bytes/sec
      5 minute output rate 3687 pkts/sec,  3593754 bytes/sec
      5 minute drop rate, 0 pkts/sec
GigabitEthernet0/2:
        received (in 313.440 secs):
                10315 packets   4225880 bytes
                32 pkts/sec     13482 bytes/sec
        transmitted (in 313.440 secs):
                10961 packets   4229214 bytes
                34 pkts/sec     13492 bytes/sec
      1 minute input rate 26 pkts/sec,  10650 bytes/sec
      1 minute output rate 29 pkts/sec,  9610 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 8 pkts/sec,  3196 bytes/sec
      5 minute output rate 8 pkts/sec,  3342 bytes/sec
      5 minute drop rate, 0 pkts/sec
GigabitEthernet0/3:
        received (in 314.840 secs):
                87198 packets   11346440 bytes
                276 pkts/sec    36038 bytes/sec
        transmitted (in 314.840 secs):
                152634 packets  191774213 bytes
                484 pkts/sec    609116 bytes/sec
      1 minute input rate 111 pkts/sec,  19918 bytes/sec
      1 minute output rate 158 pkts/sec,  152740 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 40 pkts/sec,  10201 bytes/sec
      5 minute output rate 56 pkts/sec,  56747 bytes/sec
      5 minute drop rate, 0 pkts/sec
Internal-Control0/0:
        received (in 315.070 secs):
                728 packets     115926 bytes
                2 pkts/sec      367 bytes/sec
        transmitted (in 315.070 secs):
                871 packets     63736 bytes
                2 pkts/sec      202 bytes/sec
      1 minute input rate 2 pkts/sec,  366 bytes/sec
      1 minute output rate 2 pkts/sec,  201 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 0 pkts/sec,  102 bytes/sec
      5 minute output rate 0 pkts/sec,  56 bytes/sec
      5 minute drop rate, 0 pkts/sec
Internal-Data0/0:
        received (in 315.320 secs):
                6541313 packets 5424615442 bytes
                20744 pkts/sec  17203524 bytes/sec
        transmitted (in 315.320 secs):
                6541381 packets 5424661914 bytes
                20745 pkts/sec  17203672 bytes/sec
      1 minute input rate 18798 pkts/sec,  15250485 bytes/sec
      1 minute output rate 18798 pkts/sec,  15250444 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 5358 pkts/sec,  4362296 bytes/sec
      5 minute output rate 5358 pkts/sec,  4362296 bytes/sec
      5 minute drop rate, 0 pkts/sec
Management0/0:
        received (in 315.530 secs):
                501 packets     67986 bytes
                1 pkts/sec      215 bytes/sec
        transmitted (in 315.530 secs):
                51582 packets   69296696 bytes
                163 pkts/sec    219619 bytes/sec
      1 minute input rate 1 pkts/sec,  218 bytes/sec
      1 minute output rate 157 pkts/sec,  211434 bytes/sec
      1 minute drop rate, 0 pkts/sec
      5 minute input rate 0 pkts/sec,  60 bytes/sec
      5 minute output rate 45 pkts/sec,  61297 bytes/sec
      5 minute drop rate, 0 pkts/sec

If you add up all the bold values and run through the steps above you come out with about 252Mbps, which in this case is < the 650Mbps the ASA 5540 is rated for.

Advertisement

X-Forwarded-For, proxies, and IPS

When deploying an IPS appliance I saw a challenge that might come up if you are installing the IPS appliance in addition to a web proxy. One of the by-products of using the default settings of the proxy is that all user traffic going through the proxy ends up being NATted to the IP address of the proxy prior to going to the firewall.  Normally this wouldn’t cause a problem but when you want to setup the IPS appliance to look at all traffic between the inside and firewall it presents an issue.  We lose visibility into what the original client IP address is, all traffic appears as it is coming from one single IP address of the web proxy making IPS logs less useful. In an ideal situation you would be able to place the IPS in a position where it would examine the actual source IP address but not all networks may be able to accommodate this.  One workaround is to utilize the x-forwarded-for header option on your proxy.

X-Forwarded-For Header

There is an industry standard(but not RFC) header available for HTTP called x-forwarded-for, that identifies the originating IP address of an HTTP request, regardless of if it goes through a proxy or load balancer. This header would typically be added by the proxy or load-balancer, but it’s worth noting that there are plugins out there that let a web browser insert this field(whether it is real or spoofed).

Current State

Our current state and traffic flow looks something like this:

before

The IP starts as the original ‘real’ client IP, and as it goes through the proxy(websense in this case) it gets changed to the IP of websense.  As it goes through the firewall it then gets changed to the IP of the firewall prior to hitting the Internet. Here’s a screenshot of a HTTP GET in wireshark, without any header:

no xforward

Adding in the header

To add the header in Websense you can find the option here in the content gateway GUI:

x-forwarded-for

X-Forwarded State

After enabling the addition of x-forwarded-for headers in Websense this is what our traffic looks like:

After

Here’s a screenshot of an HTTP GET in Wireshark that includes the header, spoofed to 1.2.3.4:

xforward

Inspection

Once this header is added it allows some IPS appliances/software to inspect the x-forwarded-for header and report on the actual client IP address.  Snort currently supports this and there is more detail here. I believe that other IPS appliances such as Cisco’s Sourcefire also supports this option through enabling the HTTP inspect preprocessor and checking ‘Extract Original IP address’ option.  Will work on confirming this and updating the post sometime soon. If you want to look at this traffic in wireshark there is a display filter ‘http.x_forwarded_for’ that will let you filter on x-forwarded-for.

Risks

I’d like to point out that the x-forwarded-for header gets carried in the packet out into the Internet which may or may not concern some people as it releases more information about your internal IP addresses structure than you might have wanted.  I tried to see if there was an ASA feature to strip this header out but couldn’t find anything that looked like it fit besides this Cisco bug report/request for the feature. Also, as mentioned above you can spoof this header pretty easily, it is not authenticated or signed, and is presented in plain text.  Each deployment will be unique and you’ll have to weigh out the risks and whether this is a feature that is worth implementing for your specific environment.