<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT/PAT pool exhausted in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622908#M581138</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;downgrade is always a good troubleshooting step. I am glad that it is working fine now. That could be caused by a software bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark this as answered if possible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 27 Feb 2011 01:17:17 GMT</pubDate>
    <dc:creator>PAUL GILBERT ARIAS</dc:creator>
    <dc:date>2011-02-27T01:17:17Z</dc:date>
    <item>
      <title>NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622899#M581128</link>
      <description>&lt;P&gt;ASA5505 running 8.4.1&amp;nbsp; I keep seeing the below logs..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feb 24 2011 14:32:09: %ASA-3-202010: NAT/PAT pool exhausted. Unable to create connection.&lt;BR /&gt;Feb 24 2011 14:32:10: %ASA-3-202010: NAT/PAT pool exhausted. Unable to create connection.&lt;BR /&gt;Feb 24 2011 14:32:11: %ASA-3-202010: NAT/PAT pool exhausted. Unable to create connection.&lt;BR /&gt;Feb 24 2011 14:32:12: %ASA-3-202010: NAT/PAT pool exhausted. Unable to create connection.&lt;BR /&gt;Feb 24 2011 14:32:22: %ASA-3-202010: NAT/PAT pool exhausted. Unable to create connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I have NAT misconfigured? if not which traffic is using up the NAT pool?&lt;/P&gt;&lt;P&gt;Currently there are only 2 hosts up &amp;amp; running behind the ASA, I have also collected the below logs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;object network obj_any &lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network CME &lt;BR /&gt; host 10.10.1.4&lt;BR /&gt;object network Hack-PC &lt;BR /&gt; subnet 10.4.4.0 255.255.255.0&lt;BR /&gt;object network LAN &lt;BR /&gt; subnet 192.168.100.0 255.255.255.0&lt;BR /&gt;object network Media &lt;BR /&gt; subnet 10.6.6.0 255.255.255.0&lt;BR /&gt;object network Safe-PC &lt;BR /&gt; subnet 10.3.3.0 255.255.255.0&lt;BR /&gt;object network NTOP &lt;BR /&gt; host 172.16.100.5&lt;BR /&gt;!&lt;BR /&gt;object network CME&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network Hack-PC&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network LAN&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network Media&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network Safe-PC&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network NTOP&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network VPN-Users&lt;BR /&gt; nat (outside,outside) dynamic interface&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;NetgearFW# sh xlate&lt;BR /&gt;8 in use, 210 most used&lt;BR /&gt;Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice&lt;BR /&gt;UDP PAT from inside:10.6.6.4/33036 to outside:98.198.202.104/7583 flags ri idle 0:01:13 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.4/123 to outside:98.198.202.104/128 flags ri idle 0:00:13 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.4/61326 to outside:98.198.202.104/20097 flags ri idle 0:05:05 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.4/5060 to outside:98.198.202.104/41406 flags ri idle 0:00:05 timeout 0:10:00&lt;BR /&gt;TCP PAT from outside:10.100.1.2/60687 to outside:98.198.202.104/5913 flags ri idle 0:19:55 timeout 0:00:30&lt;BR /&gt;TCP PAT from outside:10.100.1.2/60672 to outside:98.198.202.104/33714 flags ri idle 0:20:22 timeout 0:00:30&lt;BR /&gt;TCP PAT from outside:10.100.1.2/60671 to outside:98.198.202.104/24011 flags ri idle 0:20:22 timeout 0:00:30&lt;BR /&gt;TCP PAT from outside:10.100.1.2/60668 to outside:98.198.202.104/34600 flags ri idle 0:20:22 timeout 0:00:30&lt;BR /&gt;NetgearFW# &lt;BR /&gt;NetgearFW# sh nat pool&lt;BR /&gt;UDP PAT pool outside, address 98.198.202.104, range 1-511, allocated 9&lt;BR /&gt;UDP PAT pool outside, address 98.198.202.104, range 512-1023, allocated 0&lt;BR /&gt;UDP PAT pool outside, address 98.198.202.104, range 1024-65535, allocated 7&lt;BR /&gt;TCP PAT pool outside, address 98.198.202.104, range 1-511, allocated 2&lt;BR /&gt;TCP PAT pool outside, address 98.198.202.104, range 512-1023, allocated 0&lt;BR /&gt;TCP PAT pool outside, address 98.198.202.104, range 1024-65535, allocated 4&lt;BR /&gt;TCP PAT pool inside, address 172.20.1.1, range 1-511, allocated 2&lt;BR /&gt;TCP PAT pool inside, address 172.20.1.1, range 512-1023, allocated 0&lt;BR /&gt;TCP PAT pool inside, address 172.20.1.1, range 1024-65535, allocated 0&lt;BR /&gt;UDP PAT pool inside, address 172.20.1.1, range 1-511, allocated 3&lt;BR /&gt;UDP PAT pool inside, address 172.20.1.1, range 512-1023, allocated 1&lt;BR /&gt;UDP PAT pool inside, address 172.20.1.1, range 1024-65535, allocated 7&lt;BR /&gt;NetgearFW# &lt;BR /&gt;NetgearFW# sh conn&lt;BR /&gt;114 in use, 305 most used&lt;BR /&gt;UDP outside 216.246.105.146:0 inside 10.10.1.4:5060, idle 0:04:54, bytes 0, flags ti&lt;BR /&gt;TCP outside 66.54.158.8:443 outside 10.100.1.2:60687, idle 0:05:32, bytes 6391, flags UIOB&lt;BR /&gt;TCP outside 66.54.158.8:443 outside 10.100.1.2:60672, idle 0:04:59, bytes 8603, flags UIOB&lt;BR /&gt;TCP outside 66.54.158.8:443 outside 10.100.1.2:60671, idle 0:04:46, bytes 146675, flags UIOB&lt;BR /&gt;TCP outside 66.54.158.8:443 outside 10.100.1.2:60668, idle 0:04:52, bytes 15959, flags UIOB&lt;BR /&gt;UDP outside 129.6.15.28:123 inside 10.6.6.4:33036, idle 0:00:55, bytes 48, flags -&lt;BR /&gt;UDP outside 216.246.105.146:5060 inside 10.10.1.4:61326, idle 0:00:47, bytes 48627, flags T&lt;BR /&gt;NetgearFW#&lt;/P&gt;&lt;P&gt;NetgearFW# sh nat detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source dynamic CME interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 77, untranslate_hits = 1129&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.10.1.4/32, Translated: 98.198.202.104/21&lt;BR /&gt;2 (inside) to (outside) source dynamic NTOP interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.16.100.5/32, Translated: 98.198.202.104/21&lt;BR /&gt;3 (outside) to (outside) source dynamic VPN-Users interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2069, untranslate_hits = 405&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.100.1.0/29, Translated: 98.198.202.104/21&lt;BR /&gt;4 (inside) to (outside) source dynamic Safe-PC interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.3.3.0/24, Translated: 98.198.202.104/21&lt;BR /&gt;5 (inside) to (outside) source dynamic Hack-PC interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.4.4.0/24, Translated: 98.198.202.104/21&lt;BR /&gt;6 (inside) to (outside) source dynamic Media interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 15, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.6.6.0/24, Translated: 98.198.202.104/21&lt;BR /&gt;7 (inside) to (outside) source dynamic LAN interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.100.0/24, Translated: 98.198.202.104/21&lt;BR /&gt;NetgearFW#&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:56:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622899#M581128</guid>
      <dc:creator>swaro2000</dc:creator>
      <dc:date>2019-03-11T19:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622900#M581129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you include the show run timeout?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config seems fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Feb 2011 22:40:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622900#M581129</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-24T22:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622901#M581130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here you go&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NetgearFW# sh run timeout&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;NetgearFW#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Feb 2011 23:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622901#M581130</guid>
      <dc:creator>swaro2000</dc:creator>
      <dc:date>2011-02-24T23:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622902#M581131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's what Cisco says about that error message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a connection-related message. This message is displayed if the adaptive security appliance has no more address translation slots available.&lt;/P&gt;&lt;P&gt;You should check the size of the global pool compared to the number of inside network clients.&lt;/P&gt;&lt;P&gt;A PAT address may be necessary. Alternatively, shorten the timeout interval of translates and connections.&lt;/P&gt;&lt;P&gt;This error message could also be caused by insufficient memory; reduce the amount of memory usage, or purchase additional memory, if possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, you said there are only two hosts simultaneosuly behind the ASA?&lt;/P&gt;&lt;P&gt;I would think that either there's not enough memory on the box (8.4 require more memory than older versions)&lt;/P&gt;&lt;P&gt;You might want to adjust the XLATE and CONN timers to 10 and 5 minutes respectively just to test but we need to check other things.. can you attach a &lt;STRONG&gt;show ver &lt;/STRONG&gt;please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2011 02:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622902#M581131</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-02-25T02:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622903#M581132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PAT is being used so the error is not nornal. It could be a software issue. Have you tried with a different version?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2011 02:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622903#M581132</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-25T02:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622904#M581133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Box currrently has 512mb, I have pur&lt;SPAN style="color: #333333;"&gt;chased&amp;nbsp; a 1Gig stick but. But ASA will not boot with Gig stick. I noticed that&amp;nbsp; the browsing performance is also sluggish. I will test after with&amp;nbsp; adjusting CONN &amp;amp; XLATE.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2011 03:26:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622904#M581133</guid>
      <dc:creator>swaro2000</dc:creator>
      <dc:date>2011-02-25T03:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622905#M581134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;8.4 should run fine with 512MB on ASA 5505&lt;/P&gt;&lt;P&gt;The amount of translations or connections are not a lot and PAT is definitely not being exhausted.... so... I would think a bug?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to check on your license, is it a 10-user, 50-user or unlimited? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2011 03:54:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622905#M581134</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-02-25T03:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622906#M581135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NetgearFW# sh ver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.4(1)&lt;/P&gt;&lt;P&gt;Device Manager Version 6.4(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Compiled on Mon 31-Jan-11 02:11 by builders&lt;/P&gt;&lt;P&gt;System image file is "disk0:/asa841-k8.bin"&lt;/P&gt;&lt;P&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NetgearFW up 2 days 18 hours&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5505, 512 MB RAM, CPU Geode 500 MHz&lt;/P&gt;&lt;P&gt;Internal ATA Compact Flash, 128MB&lt;/P&gt;&lt;P&gt;BIOS Flash M50FW080 @ 0xfff00000, 1024KB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-5505 on-board accelerator (revision 0x0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Boot microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CN1000-MC-BOOT-2.00&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSL/IKE microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CNLite-MC-SSLm-PLUS-2.03&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPSec microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CNlite-MC-IPSECm-MAIN-2.06&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of accelerators: 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 0: Int: Internal-Data0/0&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0710.17ef, irq 11&lt;/P&gt;&lt;P&gt; 1: Ext: Ethernet0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0710.17e7, irq 255&lt;/P&gt;&lt;P&gt; 2: Ext: Ethernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0710.17e8, irq 255&lt;/P&gt;&lt;P&gt; 3: Ext: Ethernet0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0710.17e9, irq 255&lt;/P&gt;&lt;P&gt; 4: Ext: Ethernet0/3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0710.17ea, irq 255&lt;/P&gt;&lt;P&gt; 5: Ext: Ethernet0/4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0710.17eb, irq 255&lt;/P&gt;&lt;P&gt; 6: Ext: Ethernet0/5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0710.17ec, irq 255&lt;/P&gt;&lt;P&gt; 7: Ext: Ethernet0/6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0710.17ed, irq 255&lt;/P&gt;&lt;P&gt; 8: Ext: Ethernet0/7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0710.17ee, irq 255&lt;/P&gt;&lt;P&gt; 9: Int: Internal-Data0/1&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0000.0003.0002, irq 255&lt;/P&gt;&lt;P&gt;10: Int: Not used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 255&lt;/P&gt;&lt;P&gt;11: Int: Not used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;/P&gt;&lt;P&gt;Maximum Physical Interfaces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ Unrestricted&lt;/P&gt;&lt;P&gt;Dual ISPs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;VLAN Trunk Ports&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Active/Standby perpetual&lt;/P&gt;&lt;P&gt;VPN-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;VPN-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect Premium Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Other VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Total VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Shared License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect for Cisco VPN Phone&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Advanced Endpoint Assessment&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;UC Phone Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Total UC Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Botnet Traffic Filter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Intercompany Media Engine&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This platform has an ASA 5505 Security Plus license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Serial Number: JMX10000000&lt;/P&gt;&lt;P&gt;Running Permanent Activation Key: 0xb2031100 0x0039eb00 0xe8617900 0x877cd400 0x850ff00&lt;/P&gt;&lt;P&gt;Configuration register is 0x1&lt;/P&gt;&lt;P&gt;Configuration last modified by adm!n at 21:33:14.304 CST Thu Feb 24 2011&lt;/P&gt;&lt;P&gt;NetgearFW#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2011 13:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622906#M581135</guid>
      <dc:creator>swaro2000</dc:creator>
      <dc:date>2011-02-25T13:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622907#M581136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I downgraded from 8.4.1 to 8.3.2, &amp;amp; now I no longer see the NAT/PAT pool exhausted messages. Browsing speeds have also improved &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Feb 2011 22:40:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622907#M581136</guid>
      <dc:creator>swaro2000</dc:creator>
      <dc:date>2011-02-26T22:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622908#M581138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;downgrade is always a good troubleshooting step. I am glad that it is working fine now. That could be caused by a software bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark this as answered if possible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Feb 2011 01:17:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622908#M581138</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-27T01:17:17Z</dc:date>
    </item>
    <item>
      <title>NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622909#M581140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We upgraded from 8.2 to 8.4.2 and allowed the ASA to do the conversion.&amp;nbsp; We noticed the error happening a few times, but not for all xlates/conns.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went through the configuration and found that the conversion had a small error.&amp;nbsp; It was PAT'ing 0.0.0.0 to 0.0.0.0.&amp;nbsp; I changed the PAT value to the outside interface IP.&amp;nbsp; All looks good now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 23:53:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622909#M581140</guid>
      <dc:creator>cperkins2</dc:creator>
      <dc:date>2011-08-17T23:53:32Z</dc:date>
    </item>
    <item>
      <title>NAT/PAT pool exhausted</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622910#M581141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this worked for me....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 19:22:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622910#M581141</guid>
      <dc:creator>barryhes</dc:creator>
      <dc:date>2013-05-07T19:22:23Z</dc:date>
    </item>
    <item>
      <title>Hi guys,We had. exactly, the</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622911#M581143</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;We had. exactly, the same problem. There is a BUG reported (CSCum51086):&lt;/P&gt;&lt;P&gt;https://tools.cisco.com/bugsearch/bug/CSCum51086/?referring_site=bugquickviewredir&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Cristián&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2015 20:17:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-pool-exhausted/m-p/1622911#M581143</guid>
      <dc:creator>cristian.munoz</dc:creator>
      <dc:date>2015-06-15T20:17:36Z</dc:date>
    </item>
  </channel>
</rss>

