<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 v.7 portmap creation failed for tcp src in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743572#M496270</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Netjess,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you run this command and gives us the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet-tracer input Wlan tcp 192.168.1.5 1025 4.2.2.2 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And by the way what is the purpose of these lines, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list wlan_nat0_inbound extended deny ip any any&lt;/P&gt;&lt;P&gt;nat (wlan) 0 access-list wlan_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide us this information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 08 Oct 2011 00:58:39 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2011-10-08T00:58:39Z</dc:date>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743571#M496268</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Spent many hours serching and unable to find answer that fits senario.&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/8/2/0/64028-wifi_network_layout.jpg" alt="wifi_network_layout.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried several ways to skin this cat but I always get either "portmap creation failed", "deny due to DDNS query" or "no translation group found".&lt;/P&gt;&lt;P&gt;The way it is currently configured it seems to almost work but when I try to connect, say to &lt;A href="https://community.cisco.com/www.google.com" target="_blank"&gt;www.google.com&lt;/A&gt;, from the Wireless Lan (wlan) I get an error like:&lt;/P&gt;&lt;P&gt;3|Oct 07 2011 13:03:48|305006: portmap translation creation failed for tcp src wlan:192.168.0.16/57203 dst outside:74.125.73.104/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config:&lt;/P&gt;&lt;P&gt;ASA Version 7.0(8)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;no dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 66.xx.xx.244 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description Wireless Network&lt;/P&gt;&lt;P&gt; nameif wlan&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description LAN/STATE Failover Interface&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit ip host 199.204.136.252 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit ip host 199.204.136.140 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit ip host 199.204.136.157 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host 66.xx.xx.230 eq smtp&lt;/P&gt;&lt;P&gt;access-list outside_acl remark DMZ incomming HTTP&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host 66.xx.xx.243 eq domain&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit udp any host 66.xx.xx.243 eq domain&lt;/P&gt;&lt;P&gt;access-list dns extended permit udp any eq domain any&lt;/P&gt;&lt;P&gt;access-list dns extended permit udp any any eq domain&lt;/P&gt;&lt;P&gt;access-list dns extended permit tcp any any eq domain&lt;/P&gt;&lt;P&gt;access-list wlan_access_in extended permit udp any any eq domain&lt;/P&gt;&lt;P&gt;access-list wlan_access_in extended permit tcp any any eq domain&lt;/P&gt;&lt;P&gt;access-list wlan_access_in extended permit tcp any any eq 9005&lt;/P&gt;&lt;P&gt;access-list wlan_access_in extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list wlan_access_in extended permit tcp any any eq https&lt;/P&gt;&lt;P&gt;access-list wlan_access_in extended permit udp any any eq ntp&lt;/P&gt;&lt;P&gt;access-list outside_access_out remark inside allow http out&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp any any eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit udp any any eq domain&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp any any eq domain&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp any any eq ssh&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list outside_access_out remark Wireless Internet&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list wlan_nat0_inbound extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq https&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq domain&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp any any eq domain&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq ssh&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list inside_pnat_outbound extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list wlan_pnat_outbound extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list wlan_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list wlan_pnat_outbound_V1 extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 15&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging facility 23&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.121&lt;/P&gt;&lt;P&gt;logging permit-hostdown&lt;/P&gt;&lt;P&gt;no logging message 305012&lt;/P&gt;&lt;P&gt;no logging message 305011&lt;/P&gt;&lt;P&gt;no logging message 710005&lt;/P&gt;&lt;P&gt;no logging message 302015&lt;/P&gt;&lt;P&gt;no logging message 302014&lt;/P&gt;&lt;P&gt;no logging message 302013&lt;/P&gt;&lt;P&gt;no logging message 304001&lt;/P&gt;&lt;P&gt;no logging message 609001&lt;/P&gt;&lt;P&gt;no logging message 302016&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu wlan 1500&lt;/P&gt;&lt;P&gt;ip local pool Remote 192.168.194.1-192.168.194.254&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface FAILOVER Management0/0&lt;/P&gt;&lt;P&gt;failover link FAILOVER Management0/0&lt;/P&gt;&lt;P&gt;failover interface ip FAILOVER 10.1.253.254 255.255.255.252 standby 10.1.253.253&lt;/P&gt;&lt;P&gt;monitor-interface outside&lt;/P&gt;&lt;P&gt;monitor-interface inside&lt;/P&gt;&lt;P&gt;monitor-interface dmz&lt;/P&gt;&lt;P&gt;no monitor-interface wlan&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-508.bin&lt;/P&gt;&lt;P&gt;asdm location 192.168.1.99 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 4 66.xx.xx.242&lt;/P&gt;&lt;P&gt;global (inside) 2 interface&lt;/P&gt;&lt;P&gt;global (wlan) 3 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list inside_pnat_outbound&lt;/P&gt;&lt;P&gt;nat (wlan) 0 access-list wlan_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (wlan) 0 access-list wlan_nat0_inbound outside&lt;/P&gt;&lt;P&gt;nat (wlan) 2 access-list wlan_pnat_outbound&lt;/P&gt;&lt;P&gt;nat (wlan) 4 access-list wlan_pnat_outbound_V1 dns&lt;/P&gt;&lt;P&gt;static (inside,outside) 66.xx.xx.131 192.168.1.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 66.xx.xx.132 192.168.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,wlan) 192.168.0.200 192.168.1.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,wlan) 192.168.0.201 192.168.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_acl in interface outside&lt;/P&gt;&lt;P&gt;access-group outside_access_out out interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group wlan_access_in in interface wlan&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 66.xx.xx.129 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;service resetinbound&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.0.1-192.168.0.51 wlan&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.0.200 192.168.0.201&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;dhcpd domain domain.local&lt;/P&gt;&lt;P&gt;dhcpd auto_config wlan&lt;/P&gt;&lt;P&gt;dhcpd enable wlan&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any assist.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743571#M496268</guid>
      <dc:creator>netjess</dc:creator>
      <dc:date>2019-03-26T00:47:08Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743572#M496270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Netjess,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you run this command and gives us the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet-tracer input Wlan tcp 192.168.1.5 1025 4.2.2.2 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And by the way what is the purpose of these lines, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list wlan_nat0_inbound extended deny ip any any&lt;/P&gt;&lt;P&gt;nat (wlan) 0 access-list wlan_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide us this information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Oct 2011 00:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743572#M496270</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-08T00:58:39Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743573#M496271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This has already been fixed. I'l post the working config later.&lt;/P&gt;&lt;P&gt;Now I just need to figure out why it is so slow. I think it could be a physical layer issue.&lt;/P&gt;&lt;P&gt;The lines you are asking about were automaticaly generated from the ASDM. That's also the cause of a lot of redunant rules.&lt;/P&gt;&lt;P&gt;I fixed it by getting a command line and starting over.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks for your attention.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Oct 2011 01:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743573#M496271</guid>
      <dc:creator>netjess73044</dc:creator>
      <dc:date>2011-10-08T01:56:56Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743574#M496273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You didn't elaborate on what flow is slow.&lt;/P&gt;&lt;P&gt;1. source and dest interfaces&lt;/P&gt;&lt;P&gt;2. protocol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. refer this link and use it as your check list: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-8982"&gt;https://supportforums.cisco.com/docs/DOC-8982&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Oct 2011 17:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743574#M496273</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-10-08T17:07:36Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743575#M496274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jesse,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is why there are sometimes where you would like to use the CLI instead of the ASDM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let us know the resolution of this, and also mark the question as answered you anyone having the same issue can take a llook at this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great weekend,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Oct 2011 20:56:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743575#M496274</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-08T20:56:22Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743576#M496275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@Sankar While your URL was good information it doesn't address my current issue, but thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I am not sure what I did but last week when I quit working on this I had loaded a web page but it took very long.&lt;/P&gt;&lt;P&gt;Today I cam in a started checking some things. I tried taking the switch/vlan out of the mix and connected my wlan ap directly to the line that goes to the ASA.That did not work. I could ping the AP and the ASA wlan interface but no further. I plugged the ASA and the AP back into the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went back to the basics of my config.&lt;/P&gt;&lt;P&gt;I made sure I had a NAT and corresponding rules for DNS and ICMP. I also have an NAT Exempt rule for inside outbound to wlan.&lt;/P&gt;&lt;P&gt;I have also test the configuration bypassing the AP by plugging in a laptop directly to the switch/vlan and I could again ping the AP and the wlan interface of the ASA but no further. I could also not get a DNS reply even though I have a translation rule for the DNS servers. This ASA is also the default route for our LAN so should not be a routing issue since ASA is aware of all the networks concerned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my current config:&lt;/P&gt;&lt;P&gt;ASA Version 7.0(8)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;no dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 66.xxx.xxx.244 255.255.255.128 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description Wireless Network&lt;/P&gt;&lt;P&gt; nameif wlan&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address 192.168.0.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description LAN/STATE Failover Interface&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit icmp interface outside host 66.xxx.xxx.132 &lt;/P&gt;&lt;P&gt;access-list outside_acl remark testing wlan&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit icmp any host 66.xxx.xxx.242 &lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host 66.xxx.xxx.243 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host 66.xxx.xxx.243 eq www &lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host 66.xxx.xxx.243 eq https &lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host 66.xxx.xxx.243 eq domain&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit udp any host 66.xxx.xxx.243 eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.1.0 255.255.255.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dns extended permit udp any eq domain any &lt;/P&gt;&lt;P&gt;access-list dns extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list dns extended permit tcp any any eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list wlan_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list wlan_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_out remark inside allow http out&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp any any eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp any any eq domain &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_out remark Wireless Internet&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_pnat_outbound extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark DNS tcp COX forward&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.1.3 host 68.12.16.25 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark DNS tcp COX forward&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.1.10 host 68.12.16.25 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark DNS tcp COX forward&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.1.3 host 68.12.16.30 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark DNS tcp COX forward&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.1.10 host 68.12.16.30 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark DNS udp COX forward&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp host 192.168.1.3 host 68.12.16.25 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark DNS udp COX forward&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp host 192.168.1.10 host 68.12.16.25 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark DNS udp COX forward&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp host 192.168.1.3 host 68.12.16.30 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark DNS udp COX forward&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp host 192.168.1.10 host 68.12.16.30 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark wlan DNS tcp&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.1.3 192.168.0.0 255.255.255.0 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark wlan DNS tcp&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.1.10 192.168.0.0 255.255.255.0 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark wlan DNS udp&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp host 192.168.1.3 192.168.0.0 255.255.255.0 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark wlan DNS udp&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp host 192.168.1.10 192.168.0.0 255.255.255.0 eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in remark testing from wlan&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp any any eq https&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;pager lines 15&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging facility 23&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.121&lt;/P&gt;&lt;P&gt;logging permit-hostdown&lt;/P&gt;&lt;P&gt;no logging message 305012&lt;/P&gt;&lt;P&gt;no logging message 305011&lt;/P&gt;&lt;P&gt;no logging message 710005&lt;/P&gt;&lt;P&gt;no logging message 302015&lt;/P&gt;&lt;P&gt;no logging message 302014&lt;/P&gt;&lt;P&gt;no logging message 302013&lt;/P&gt;&lt;P&gt;no logging message 304001&lt;/P&gt;&lt;P&gt;no logging message 609001&lt;/P&gt;&lt;P&gt;no logging message 302016&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu wlan 1500&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface FAILOVER Management0/0&lt;/P&gt;&lt;P&gt;failover link FAILOVER Management0/0&lt;/P&gt;&lt;P&gt;failover interface ip FAILOVER 10.1.253.254 255.255.255.252 standby 10.1.253.253&lt;/P&gt;&lt;P&gt;monitor-interface outside&lt;/P&gt;&lt;P&gt;monitor-interface inside&lt;/P&gt;&lt;P&gt;monitor-interface dmz&lt;/P&gt;&lt;P&gt;no monitor-interface wlan&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 2 66.xxx.xxx.241&lt;/P&gt;&lt;P&gt;global (outside) 3 66.xxx.xxx.242&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list inside_pnat_outbound&lt;/P&gt;&lt;P&gt;nat (dmz) 2 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (wlan) 3 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 66.xxx.xxx.131 192.168.1.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 66.xxx.xxx.132 192.168.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,wlan) 192.168.0.200 192.168.1.3 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,wlan) 192.168.0.201 192.168.1.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_acl in interface outside&lt;/P&gt;&lt;P&gt;access-group outside_access_out out interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group wlan_access_in in interface wlan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 66.xxx.xxx.129 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns maximum-length 512 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate your time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 00:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743576#M496275</guid>
      <dc:creator>netjess73044</dc:creator>
      <dc:date>2011-10-11T00:10:43Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743577#M496276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;BTW, Part of my hurdle and the whole reason I am trying to set it up this way is to secure the wireless access to the LAN but still be able to control access to LAN resources from wireless when needed.&lt;/P&gt;&lt;P&gt;If you notice I change the security level of the wlan to 75 to protect the LAN and that is also why I made a NAT for the DNS servers to the wlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 00:17:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743577#M496276</guid>
      <dc:creator>netjess73044</dc:creator>
      <dc:date>2011-10-11T00:17:00Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743578#M496277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jesse,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So at this point everything seems to be ok, the Wlan has a lower security level than the inside., you have created the Nat statements and the ACLs required to allow the comunication between these two interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the outside interface you have two different ACLs, one applied on the inbound direction and the other one outbound.They do not block the connections created by the Wlan users. I would use just one ACL on the Outside interface ( Inbound direction).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now regarding why the connections are slow, are the connections on the DMZ zone as slow as the ones being generated on the Wlan?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 00:37:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743578#M496277</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-11T00:37:42Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743579#M496278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@ jcarvaja &lt;/P&gt;&lt;P&gt;I am unable to run the packet-tracer command. My ASA v7.0(8) returns "Invalid input". If I issue a ? it is not in the command list. Only ping but here is what I get from that:&lt;/P&gt;&lt;P&gt;PrimaryASA5510# ping inside 192.168.1.3 size 1024&lt;/P&gt;&lt;P&gt;Sending 5, 1024-byte ICMP Echos to 192.168.1.3, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There does seem to be some latency from my AP (0.253)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PrimaryASA5510# ping wlan 192.168.0.253 size 1024&lt;/P&gt;&lt;P&gt;Sending 5, 1024-byte ICMP Echos to 192.168.0.253, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!?!!!&lt;/P&gt;&lt;P&gt;Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;PrimaryASA5510# ping wlan 192.168.0.253 size 1024&lt;/P&gt;&lt;P&gt;Sending 5, 1024-byte ICMP Echos to 192.168.0.253, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!??&lt;/P&gt;&lt;P&gt;Success rate is 60 percent (3/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;PrimaryASA5510# ping wlan 192.168.0.253 size 1024&lt;/P&gt;&lt;P&gt;Sending 5, 1024-byte ICMP Echos to 192.168.0.253, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?!??!&lt;/P&gt;&lt;P&gt;Success rate is 40 percent (2/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 00:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743579#M496278</guid>
      <dc:creator>netjess73044</dc:creator>
      <dc:date>2011-10-11T00:44:31Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743580#M496279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jesse,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct there seems to be an issue with the Wlan interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the output of the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Show interface&amp;nbsp;&amp;nbsp; Ethernet 0/3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also place the following command on the ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Debug icmp trace&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And finally ping from the Wlan computer to the ASA and share the debug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 00:48:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743580#M496279</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-11T00:48:21Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743581#M496280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From my Android phone I can ping all the way to 192.168.0.254 (ASA wlan interface) but I cannot get a reply from 192.168.1.254 (ASA inside interface) or any other inside network address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also tried with a laptop connected to wireless network and same result when both wired and wireless to wlan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 01:18:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743581#M496280</guid>
      <dc:creator>netjess73044</dc:creator>
      <dc:date>2011-10-11T01:18:33Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743582#M496281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I posted about results from my phone before I realized you had updated your assistance.&lt;/P&gt;&lt;P&gt;I eliminated some of the latency by removing the Dell 3548 switch that I had vlan'd a few ports for the wireless and connected a small 8 port 10/100 switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PrimaryASA5510# sh int eth0/3&lt;/P&gt;&lt;P&gt;Interface Ethernet0/3 "wlan", is up, line protocol is up&lt;/P&gt;&lt;P&gt;&amp;nbsp; Hardware is i82546GB rev03, BW 100 Mbps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Description: Wireless Network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address 0024.1413.7d95, MTU 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address 192.168.0.254, subnet mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 38239417 packets input, 3647292409 bytes, 0 no buffer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 9167 broadcasts, 0 runts, 0 giants&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 L2 decode drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 188086570 packets output, 99110793673 bytes, 1247 underruns&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 89 interface resets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 late collisions, 0 deferred&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input reset drops, 0 output reset drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input queue (curr/max packets): hardware (4/9)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; output queue (curr/max packets): hardware (0/1)&lt;/P&gt;&lt;P&gt;&amp;nbsp; Traffic Statistics for "wlan":&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63766 packets input, 5205778 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 47556 packets output, 26495681 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31130 packets dropped&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute input rate 0 pkts/sec,&amp;nbsp; 0 bytes/sec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute output rate 0 pkts/sec,&amp;nbsp; 0 bytes/sec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute drop rate, 0 pkts/sec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute input rate 0 pkts/sec,&amp;nbsp; 20 bytes/sec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute output rate 0 pkts/sec,&amp;nbsp; 3 bytes/sec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute drop rate, 0 pkts/sec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some pings:&lt;/P&gt;&lt;P&gt;PrimaryASA5510# ping wlan 192.168.0.253 size 1024 repeat 20&lt;/P&gt;&lt;P&gt;Sending 20, 1024-byte ICMP Echos to 192.168.0.253, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!!!!!!!!!!?!!!!?&lt;/P&gt;&lt;P&gt;Success rate is 90 percent (18/20), round-trip min/avg/max = 1/2/10 ms&lt;/P&gt;&lt;P&gt;PrimaryASA5510# ping wlan 192.168.0.253 size 1024 repeat 20&lt;/P&gt;&lt;P&gt;Sending 20, 1024-byte ICMP Echos to 192.168.0.253, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!!!!!!!?!!!!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 95 percent (19/20), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;PrimaryASA5510# ping wlan 192.168.0.253 size 1024 repeat 20&lt;/P&gt;&lt;P&gt;Sending 20, 1024-byte ICMP Echos to 192.168.0.253, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!!!!!!!!!!!!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (20/20), round-trip min/avg/max = 1/1/10 ms&lt;/P&gt;&lt;P&gt;PrimaryASA5510# ping wlan 192.168.0.253 size 1024 repeat 20&lt;/P&gt;&lt;P&gt;Sending 20, 1024-byte ICMP Echos to 192.168.0.253, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!!!!!!!!!!!!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (20/20), round-trip min/avg/max = 1/1/10 ms&lt;/P&gt;&lt;P&gt;PrimaryASA5510# ping wlan 192.168.0.253 size 1024 repeat 20&lt;/P&gt;&lt;P&gt;Sending 20, 1024-byte ICMP Echos to 192.168.0.253, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!!!!!!!!!!!!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (20/20), round-trip min/avg/max = 1/1/10 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debug ICMP:&lt;/P&gt;&lt;P&gt;PrimaryASA5510# debug icmp trace (across wireless connection)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug icmp trace enabled at level 1&lt;/P&gt;&lt;P&gt;PrimaryASA5510# ICMP echo request from 192.168.1.2 to 192.168.1.254 ID=512 seq=57578 len=32&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.1.254 to 192.168.1.2 ID=512 seq=57578 len=32&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=12544 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=12544 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=12800 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=12800 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=13056 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=13056 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=13312 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=13312 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=13568 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=13568 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=13824 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=13824 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=14080 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=14080 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=14336 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=14336 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=14592 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=14592 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=14848 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=14848 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=15104 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=15104 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=15360 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=15360 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=15616 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=15616 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=15872 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=15872 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=16128 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=16128 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.0.37 to 192.168.0.254 ID=768 seq=16384 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.0.254 to 192.168.0.37 ID=768 seq=16384 len=1024&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.1.2 to 192.168.1.254 ID=512 seq=58090 len=32&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.1.254 to 192.168.1.2 ID=512 seq=58090 len=32&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks again for your time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 01:26:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743582#M496281</guid>
      <dc:creator>netjess73044</dc:creator>
      <dc:date>2011-10-11T01:26:29Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743583#M496282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, So going through all of this It seems somehoe the culprit is my Dell 3548 switch. Either a problem with the switch or a problem with the ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without changing anything since my last config post only changing to the littel switch and rebooting the AP I can ping the DNS server and pull web pages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks for the sounding board. It helps just bouncing your progress and not feel like your just talking to yourself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 01:37:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743583#M496282</guid>
      <dc:creator>netjess73044</dc:creator>
      <dc:date>2011-10-11T01:37:14Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743584#M496283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jesse,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just got home, sorry I could not answer bedore.&lt;/P&gt;&lt;P&gt;Just to let you know you cannot ping a distant interface, as a security box the ASA is not going to allow you to ping from one host behind one interface to another interface, this as a security meassure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The good thing is that you are able to go to the internet from the Wlan right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you are doing great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 04:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743584#M496283</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-11T04:01:39Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743585#M496284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I can reach the Internet from my wlan and recieve DNS from my inside lan. This is what I was trying to do.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I also removed the redundant outside outbound acl as you suggested.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 13:20:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743585#M496284</guid>
      <dc:creator>netjess73044</dc:creator>
      <dc:date>2011-10-11T13:20:27Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 v.7 portmap creation failed for tcp src</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743586#M496285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jesse,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is great, any other question just let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great day,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 16:32:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-v-7-portmap-creation-failed-for-tcp-src/m-p/1743586#M496285</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-11T16:32:14Z</dc:date>
    </item>
  </channel>
</rss>

