<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Shared Interfaces in a user context in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207557#M346467</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not completely sure what you situation is but I have never run into problems even when NOT using &lt;STRONG&gt;"mac-address auto"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the software level you are running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the NAT configurations used without &lt;STRONG&gt;"mac-address auto"&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share the Context configurations, wihtout any real public IP addresses ofcourse&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 13 Jul 2013 12:21:09 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-07-13T12:21:09Z</dc:date>
    <item>
      <title>Shared Interfaces in a user context</title>
      <link>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207556#M346466</link>
      <description>&lt;P&gt;Hello Cisco-ers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created 2 user contexts recently to two of my company's departments. I allocated a shared outside interface and separate unique inside interfaces to them both. Both contexts are working perfect after i issued the "mac-address auto" command in the sys. space. Before this command, both contexts didn't work at all. Now i need someone to explain to me, why the contexts didn't use the NAT entries as a method for identifying which context should the outside interface's classifier place the traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207556#M346466</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2019-03-12T02:11:47Z</dc:date>
    </item>
    <item>
      <title>Shared Interfaces in a user context</title>
      <link>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207557#M346467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not completely sure what you situation is but I have never run into problems even when NOT using &lt;STRONG&gt;"mac-address auto"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the software level you are running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the NAT configurations used without &lt;STRONG&gt;"mac-address auto"&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share the Context configurations, wihtout any real public IP addresses ofcourse&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 12:21:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207557#M346467</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-13T12:21:09Z</dc:date>
    </item>
    <item>
      <title>Re: Shared Interfaces in a user context</title>
      <link>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207558#M346470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thx for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The situation here is the appliance shares an interface across multiple contexts. Because of this, the same MAC address is used. As already known, there are 2 methods the appliance use to solve the issue of identifying to which context it should place a user's traffic on. First method, using NAT entries and Second method, using unique MAC addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, the first method didn't work and i have no idea why (see the config.). NAT entries are also unique just as MAC addresses i wonder why the appliance didn't use this method and forced me to use the second method.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the below config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;System Space:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2) &lt;SYSTEM&gt;&lt;/SYSTEM&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name test.com&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class default&lt;/P&gt;&lt;P&gt;&amp;nbsp; limit-resource All 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; limit-resource ASDM 5&lt;/P&gt;&lt;P&gt;&amp;nbsp; limit-resource SSH 5&lt;/P&gt;&lt;P&gt;&amp;nbsp; limit-resource Telnet 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin-context admin&lt;/P&gt;&lt;P&gt;context admin&lt;/P&gt;&lt;P&gt;&amp;nbsp; allocate-interface GigabitEthernet0&lt;/P&gt;&lt;P&gt;&amp;nbsp; allocate-interface GigabitEthernet1&lt;/P&gt;&lt;P&gt;&amp;nbsp; allocate-interface GigabitEthernet2&lt;/P&gt;&lt;P&gt;&amp;nbsp; config-url disk0:/admin.cfg&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;context CustA&lt;/P&gt;&lt;P&gt;&amp;nbsp; allocate-interface GigabitEthernet0 CustA_Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp; allocate-interface GigabitEthernet1 CustA_Outside&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; config-url t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://192.168.4.100/CustA.cfg" rel="nofollow"&gt;ftp://192.168.4.100/CustA.cfg&lt;/A&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;context CustB&lt;/P&gt;&lt;P&gt;&amp;nbsp; allocate-interface GigabitEthernet1 CustB_Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; allocate-interface GigabitEthernet2 CustB_Inside&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; config-url t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://192.168.4.100/CustB.cfg" rel="nofollow"&gt;ftp://192.168.3.100/CustB.cfg&lt;/A&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" rel="nofollow"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;crashinfo save disable&lt;/P&gt;&lt;P&gt;Cryptochecksum:bb370df4ae90ab9b782d9d6eea1c91a0&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CustA Context:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa/CustA# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2) &lt;CONTEXT&gt;&lt;/CONTEXT&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname CustA&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface CustA_Inside&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.4.3 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface CustA_Outside&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object-group network Internal&lt;/P&gt;&lt;P&gt; network-object 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network External&lt;/P&gt;&lt;P&gt; network-object 192.168.1.25 255.255.255.255&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (Inside,Outside) source dynamic Internal External&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:a54fb97947d70811a9437dae93bfeae4&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa/CustA#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 13:00:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207558#M346470</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2013-07-13T13:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: Shared Interfaces in a user context</title>
      <link>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207559#M346473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 15:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207559#M346473</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2013-07-13T15:31:00Z</dc:date>
    </item>
    <item>
      <title>Shared Interfaces in a user context</title>
      <link>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207560#M346477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are using the same software which we have on one of our ASAs for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It has around 100 Security Contexts which all share an interface and the connection work as usual. This interface is actually used for Logging and Monitoring purposes. It doesnt have any kind of Dynamic Translation but might have Static translations and not even them always.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you seeing some message on the ASA specifically when the connections fail that would indicate that the incoming packet wasnt classified?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure but mayb even the ASAs own "packet-tracer" might tell if this is actually the problem. Remember seeing such output once here on the forums. Though for that you coould try to configure a single Static NAT for example and use "packet-tracer" to simulate an incoming connection to that IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input Outside tcp 1.1.1.1 12345 &lt;NAT ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/NAT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe you could try the Dynamic PAT configuration using the actual interface IP address and see if that makes any different to what you are seeing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Inside,Outside) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The documents dont really state specific information about the NAT way of classifying the right context for the incoming packet. This would indicate that there should simply be a unique NAT (of any type) IP address on some context to which traffic is sent and the ASA should be able to determine that context on the basis of its NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 15:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207560#M346477</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-13T15:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: Shared Interfaces in a user context</title>
      <link>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207561#M346483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thx again for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, none of the solutions given worked for me. I have no clue what is going on. As you said, the appliance should be able to identify the context based on a unique NAT entry owned by that context. I used static NAT, static PAT, dynamic NAT, Interface overload, you name it. Nothing is working. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, i noticed many dropped packets in the inside interface when i issued the "show interface CustAInside" command. This is normal if the appliance has no clue to which context to place those packets on. But i still don't know what is the cause of the problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 19:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207561#M346483</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2013-07-13T19:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: Shared Interfaces in a user context</title>
      <link>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207562#M346487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is something else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using the VPN Plus license. I have a maximum of 2 contexts. I don't think this is the problem because i am using exactly 2 contexts only and the admin context is not counted among this number. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 19:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207562#M346487</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2013-07-13T19:25:58Z</dc:date>
    </item>
    <item>
      <title>Shared Interfaces in a user context</title>
      <link>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207563#M346490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you take any &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output when trying Static NAT or Static PAT on the Contexts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do seem to recall that "packet-tracer" should state in the output if there was a problem with classifying the correct Security Context (even though we are doing this under a certain context).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 19:30:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207563#M346490</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-13T19:30:05Z</dc:date>
    </item>
    <item>
      <title>Re: Shared Interfaces in a user context</title>
      <link>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207564#M346493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For unknown reason, i can't paste the tracer output here. It tells me "this message can not be displayed due to its content. Please use the contact us link with any questions."&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 19:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shared-interfaces-in-a-user-context/m-p/2207564#M346493</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2013-07-13T19:55:05Z</dc:date>
    </item>
  </channel>
</rss>

