When a firewall exhibits signs of resource depletion, it might be experiencing an
that is sending an overwhelming number of packets. In such events, the firewall starts buffering inbound packets. Now you can quickly identify the sessions that are using an
excessive percentage of the packet buffer
and mitigate their impact by discarding them.
Perform the following task on any hardware-based firewall platform (not a VM-Series firewall) to identify the packet buffer percentage used, the top five sessions using more than two percent of the packet buffer, and the source IP addresses associated with those sessions; this information allows you to take appropriate actions.
Perform this task to permanently
discard a session, such as a session that is overloading the packet buffer. No commit is required; the session is discarded immediately after executing the command. The commands apply to both offloaded and non-offloaded sessions.