<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic question about asa5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question-about-asa5505/m-p/2262370#M346078</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; interface then the only thing you really have to look out for is that the amount of hosts behind those interfaces dont go over 10. Then you will see that some single host wont be able to form connections through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"show local-host"&lt;/STRONG&gt; command (as said before) should show how close to that limit you are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remember to mark a reply as the correct reply if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 20 Jul 2013 16:42:04 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-07-20T16:42:04Z</dc:date>
    <item>
      <title>question about asa5505</title>
      <link>https://community.cisco.com/t5/network-security/question-about-asa5505/m-p/2262367#M346075</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I have read several posts, but i can't find one that helps with my doubts&lt;BR /&gt;I know if a have a 5505 with a 10 user license y will limit to 10 the IPs that pass from inside to outside, but from inside to dmz? Also this are users not connections? Is that right.&lt;BR /&gt;The last doubt is if i have a sitetosite vpn to an asa 5520, will the 10 user limit applies to the vpn?.&lt;BR /&gt;Hope sonebody can help me with thie&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Juan Pablo Hidalgo&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-asa5505/m-p/2262367#M346075</guid>
      <dc:creator>rbarreir</dc:creator>
      <dc:date>2019-03-12T02:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: question about asa5505</title>
      <link>https://community.cisco.com/t5/network-security/question-about-asa5505/m-p/2262368#M346076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a quote from a Cisco document&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;In routed mode, hosts on the inside (Business and&amp;nbsp; Home VLANs) count towards the limit when they communicate with the&amp;nbsp; outside (Internet VLAN), including when the inside initiates a&amp;nbsp; connection to the outside as well as when the outside initiates a&amp;nbsp; connection to the inside. Note that even when the outside initiates a&amp;nbsp; connection to the inside, outside hosts are &lt;EM&gt;not&lt;/EM&gt; counted towards the limit; only the inside hosts count. Hosts that&amp;nbsp; initiate traffic between Business and Home are also not counted towards&amp;nbsp; the limit. The interface associated with the default route is considered&amp;nbsp; to be the outside Internet interface. If there is no default route,&amp;nbsp; hosts on all interfaces are counted toward the limit. In transparent&amp;nbsp; mode, the interface with the lowest number of hosts is counted towards&amp;nbsp; the host limit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See the &lt;STRONG&gt;show local-host&lt;/STRONG&gt; command to view host limits. &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/specs.html#wp1150495"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/specs.html#wp1150495&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So basically only the number of hosts behind the interfaces which DONT have the default route are counted towards your user limit no matter how many different destination IP addresses you are connecting to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in the case of your L2L VPN, the remote site and the amount of hosts it has doesnt really matter. As long as the combined amount of hosts behind your ASAs local interfaces dont go over the user limit of the license, you should be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As the quote says, you can check the &lt;STRONG&gt;"show local-host" &lt;/STRONG&gt;command output what your limit is and how many hosts are currently counted towards that limit. The output is at the very start.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Jul 2013 14:28:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-asa5505/m-p/2262368#M346076</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-20T14:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: question about asa5505</title>
      <link>https://community.cisco.com/t5/network-security/question-about-asa5505/m-p/2262369#M346077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, thanks forbyour reply,&lt;BR /&gt;So that means if the vpn users from rhe asa 5505 are 11 the last one won't be able to connect to the vpn peers, so the user limit user is important for this matter&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Juan Pablo&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Jul 2013 15:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-asa5505/m-p/2262369#M346077</guid>
      <dc:creator>rbarreir</dc:creator>
      <dc:date>2013-07-20T15:10:11Z</dc:date>
    </item>
    <item>
      <title>question about asa5505</title>
      <link>https://community.cisco.com/t5/network-security/question-about-asa5505/m-p/2262370#M346078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; interface then the only thing you really have to look out for is that the amount of hosts behind those interfaces dont go over 10. Then you will see that some single host wont be able to form connections through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"show local-host"&lt;/STRONG&gt; command (as said before) should show how close to that limit you are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remember to mark a reply as the correct reply if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Jul 2013 16:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-asa5505/m-p/2262370#M346078</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-20T16:42:04Z</dc:date>
    </item>
  </channel>
</rss>

