<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Error when add new host in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359729#M692870</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A few things that I've found:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) "global (outside) 2 interface" ---&amp;gt; should be "&lt;STRONG&gt;global (outside) 1&amp;nbsp; interface&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;There is no number 2 sequence on your nat statement, therefore, global with sequence 2 will never get invoked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) DMZ interface is currently configured with security level 0, same as outside. You would need to change it to something higher, as I wouldn't think you would like your DMZ interface to have the same security level as your outside. If you otherwise think you need it, then you would need the "same-security-traffic permit inter-interface" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Your DMZ interface is 192.168.20.5/24, however your NAT statement for DMZ is on a different subnet: "nat (dmz) 1 192.168.9.0 255.255.255.0".&lt;/P&gt;&lt;P&gt;Change it to match your interface subnet: "&lt;STRONG&gt;nat (dmz) 1 192.168.20.0 255.255.255.0&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Lastly, your global pool address: "global (outside) 1 0.0.0.195-0.0.0.206 netmask 255.255.255.240", overlaps with your static statements. So you would either shorthen the address pool for the global statement so it doesn't overlap with the public address that you have assigned to your static nat statement OR/ completely remove it once you change point# 1 to "global (outside) 1 interface".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that resolves your issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 Apr 2010 21:45:31 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2010-04-14T21:45:31Z</dc:date>
    <item>
      <title>Error when add new host</title>
      <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359727#M692868</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when I add a new host in inside interface or dmz interface the new host can´t surf over internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I view a error in Asa syslog:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3&amp;nbsp;&amp;nbsp;&amp;nbsp; Apr 14 2010&amp;nbsp;&amp;nbsp;&amp;nbsp; 16:50:51&amp;nbsp;&amp;nbsp;&amp;nbsp; 305006&amp;nbsp;&amp;nbsp;&amp;nbsp; 94.245.80.12&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; portmap translation creation failed for tcp src inside:192.168.10.12/53995 dst outside:94.245.80.12/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3&amp;nbsp;&amp;nbsp;&amp;nbsp; Apr 13 2010&amp;nbsp;&amp;nbsp;&amp;nbsp; 09:14:43&amp;nbsp;&amp;nbsp;&amp;nbsp; 305006&amp;nbsp;&amp;nbsp;&amp;nbsp; 8.8.8.8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; portmap translation creation failed for icmp src dmz:192.168.9.66 dst outside:8.8.8.8 (type 8, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password EhxQ5dBfvkyaUj52 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.10.8 W2K3-X32-SP&lt;BR /&gt;name 0.0.0.201 &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 0.0.0.194 255.255.255.240 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; no forward interface Vlan1&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.20.5 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DNS1&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; timeout 30&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any interface dmz eq domain &lt;BR /&gt;access-list INSIDE_ACL_OUT extended permit ip any any &lt;BR /&gt;access-list 100 extended permit udp any any eq domain &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any any eq https &lt;BR /&gt;access-list 100 extended permit tcp any any eq 3389 &lt;BR /&gt;access-list 100 extended permit tcp any any eq www &lt;BR /&gt;access-list 100 extended permit icmp any any &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inbound extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list RDP extended permit tcp any interface outside eq 3389 log &lt;BR /&gt;access-list RDP extended permit tcp interface outside interface inside eq 3389 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.9.0 255.255.255.0 &lt;BR /&gt;access-list outbound extended permit ip any any &lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list outside_3_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list outside_4_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;access-list inside_acl extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;&lt;SPAN&gt;logging from-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:cisco@XXX.com" target="_blank"&gt;cisco@XXX.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;logging recipient-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:fdz@XXX.com" target="_blank"&gt;fdz@XXX.com&lt;/A&gt;&lt;SPAN&gt; level errors&lt;/SPAN&gt;&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool pool1 192.168.10.70-192.168.10.75 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 0.0.0.195-0.0.0.206 netmask 255.255.255.240&lt;BR /&gt;global (outside) 2 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 192.168.10.0 255.255.255.0&lt;BR /&gt;nat (dmz) 1 192.168.9.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt; ftp 192.168.10.10 ftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt; ftp-data 192.168.10.10 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.197 3389 192.168.10.9 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.200 https 192.168.10.9 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt; https W2K3-X32-SP https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt; www W2K3-X32-SP www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.198 https 192.168.10.13 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.198 www 192.168.10.133 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.202 3389 192.168.10.10 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.200 www 192.168.10.14 www netmask 255.255.255.255 &lt;BR /&gt;access-group 100 in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 0.0.0.193 1&lt;BR /&gt;route dmz 192.168.9.0 255.255.255.0 192.168.20.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.255 inside&lt;BR /&gt;http 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.194 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-NOAUT esp-3des esp-none &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set peer 88.2.225.218 &lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 3 match address outside_3_cryptomap&lt;BR /&gt;crypto map outside_map 3 set peer 80.24.224.149 &lt;BR /&gt;crypto map outside_map 3 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 3 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 4 match address outside_4_cryptomap&lt;BR /&gt;crypto map outside_map 4 set peer 80.37.221.171 &lt;BR /&gt;crypto map outside_map 4 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 4 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable inside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 80000&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 172800&lt;BR /&gt;crypto isakmp nat-traversal&amp;nbsp; 15&lt;BR /&gt;crypto isakmp disconnect-notify&lt;BR /&gt;crypto isakmp reload-wait&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;l2tp tunnel hello 120&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.10.90-192.168.10.100 inside&lt;BR /&gt;dhcpd dns 154.15.255.134 154.15.255.130 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.8.4 interface dmz&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; banner none&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server none&lt;BR /&gt; dhcp-network-scope none&lt;BR /&gt; vpn-access-hours none&lt;BR /&gt; vpn-simultaneous-logins 3&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-filter none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec webvpn&lt;BR /&gt; password-storage disable&lt;BR /&gt; ip-comp disable&lt;BR /&gt; re-xauth disable&lt;BR /&gt; group-lock none&lt;BR /&gt; pfs disable&lt;BR /&gt; ipsec-udp disable&lt;BR /&gt; ipsec-udp-port 10000&lt;BR /&gt; split-tunnel-policy tunnelall&lt;BR /&gt; split-tunnel-network-list none&lt;BR /&gt; default-domain none&lt;BR /&gt; split-dns none&lt;BR /&gt; intercept-dhcp 255.255.255.255 disable&lt;BR /&gt; secure-unit-authentication disable&lt;BR /&gt; user-authentication disable&lt;BR /&gt; user-authentication-idle-timeout none&lt;BR /&gt; ip-phone-bypass disable&lt;BR /&gt; leap-bypass disable&lt;BR /&gt; nem disable&lt;BR /&gt; backup-servers keep-client-config&lt;BR /&gt; msie-proxy server none&lt;BR /&gt; msie-proxy method no-modify&lt;BR /&gt; msie-proxy except-list none&lt;BR /&gt; msie-proxy local-bypass disable&lt;BR /&gt; nac disable&lt;BR /&gt; nac-sq-period 300&lt;BR /&gt; nac-reval-period 86400&lt;BR /&gt; nac-default-acl none&lt;BR /&gt; address-pools none&lt;BR /&gt; smartcard-removal-disconnect enable&lt;BR /&gt; client-firewall none&lt;BR /&gt; client-access-rule none&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; functions url-entry&lt;BR /&gt;&amp;nbsp; html-content-filter none&lt;BR /&gt;&amp;nbsp; homepage none&lt;BR /&gt;&amp;nbsp; keep-alive-ignore 4&lt;BR /&gt;&amp;nbsp; http-comp gzip&lt;BR /&gt;&amp;nbsp; filter none&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;&amp;nbsp; port-forward none&lt;BR /&gt;&amp;nbsp; port-forward-name value Application Access&lt;BR /&gt;&amp;nbsp; sso-server none&lt;BR /&gt;&amp;nbsp; deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information&lt;BR /&gt;&amp;nbsp; svc none&lt;BR /&gt;&amp;nbsp; svc keep-installer installed&lt;BR /&gt;&amp;nbsp; svc keepalive none&lt;BR /&gt;&amp;nbsp; svc rekey time none&lt;BR /&gt;&amp;nbsp; svc rekey method none&lt;BR /&gt;&amp;nbsp; svc dpd-interval client none&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway none&lt;BR /&gt;&amp;nbsp; svc compression deflate&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool pool1&lt;BR /&gt; default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group XXX218 type ipsec-l2l&lt;BR /&gt;tunnel-group XXX218 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group xxx.149 type ipsec-l2l&lt;BR /&gt;tunnel-group xxx.149 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group xxx type ipsec-l2l&lt;BR /&gt;tunnel-group xxx 71 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect dns &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 217.76.146.62&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:84daf90e8dbb06197c686f506bff4e45&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;asdm location 192.168.9.0 255.255.255.0 inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I change some aleatory configuration like add a nat in outside interface (and then I delete the nat)... all start´s to work fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:32:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359727#M692868</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2019-03-11T17:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: Error when add new host</title>
      <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359728#M692869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post a show version? This sounds like it could be related to your user license.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Apr 2010 16:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359728#M692869</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-04-14T16:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: Error when add new host</title>
      <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359729#M692870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A few things that I've found:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) "global (outside) 2 interface" ---&amp;gt; should be "&lt;STRONG&gt;global (outside) 1&amp;nbsp; interface&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;There is no number 2 sequence on your nat statement, therefore, global with sequence 2 will never get invoked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) DMZ interface is currently configured with security level 0, same as outside. You would need to change it to something higher, as I wouldn't think you would like your DMZ interface to have the same security level as your outside. If you otherwise think you need it, then you would need the "same-security-traffic permit inter-interface" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Your DMZ interface is 192.168.20.5/24, however your NAT statement for DMZ is on a different subnet: "nat (dmz) 1 192.168.9.0 255.255.255.0".&lt;/P&gt;&lt;P&gt;Change it to match your interface subnet: "&lt;STRONG&gt;nat (dmz) 1 192.168.20.0 255.255.255.0&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Lastly, your global pool address: "global (outside) 1 0.0.0.195-0.0.0.206 netmask 255.255.255.240", overlaps with your static statements. So you would either shorthen the address pool for the global statement so it doesn't overlap with the public address that you have assigned to your static nat statement OR/ completely remove it once you change point# 1 to "global (outside) 1 interface".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that resolves your issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Apr 2010 21:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359729#M692870</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-14T21:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: Error when add new host</title>
      <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359730#M692871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "show version"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 7.2(4)&lt;/P&gt;&lt;P&gt;Device Manager Version 5.2(4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Compiled on Sun 06-Apr-08 13:39 by builders&lt;/P&gt;&lt;P&gt;System image file is "disk0:/asa724-k8.bin"&lt;/P&gt;&lt;P&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa up 21 days 18 hours&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5505, 256 MB RAM, CPU Geode 500 MHz&lt;/P&gt;&lt;P&gt;Internal ATA Compact Flash, 128MB&lt;/P&gt;&lt;P&gt;BIOS Flash M50FW080 @ 0xffe00000, 1024KB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-5505 on-board accelerator (revision 0x0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Boot microcode&amp;nbsp;&amp;nbsp; :&amp;nbsp; CNlite-MC-Boot-Cisco-1.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSL/IKE microcode:&amp;nbsp; CNlite-MC-IPSEC-Admin-3.03&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPSec microcode&amp;nbsp; :&amp;nbsp; CNlite-MC-IPSECm-MAIN-2.05&lt;/P&gt;&lt;P&gt;0: Int: Internal-Data0/0&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0024.97e0.d9c6, irq 11&lt;/P&gt;&lt;P&gt;1: Ext: Ethernet0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0024.97e0.d9be, irq 255&lt;/P&gt;&lt;P&gt;2: Ext: Ethernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0024.97e0.d9bf, irq 255&lt;/P&gt;&lt;P&gt;3: Ext: Ethernet0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0024.97e0.d9c0, irq 255&lt;/P&gt;&lt;P&gt;4: Ext: Ethernet0/3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0024.97e0.d9c1, irq 255&lt;/P&gt;&lt;P&gt;5: Ext: Ethernet0/4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0024.97e0.d9c2, irq 255&lt;/P&gt;&lt;P&gt;6: Ext: Ethernet0/5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0024.97e0.d9c3, irq 255&lt;/P&gt;&lt;P&gt;7: Ext: Ethernet0/6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0024.97e0.d9c4, irq 255&lt;/P&gt;&lt;P&gt;8: Ext: Ethernet0/7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0024.97e0.d9c5, irq 255&lt;/P&gt;&lt;P&gt;9: Int: Internal-Data0/1&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0000.0003.0002, irq 255&lt;/P&gt;&lt;P&gt;10: Int: Not used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 255&lt;/P&gt;&lt;P&gt;11: Int: Not used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;/P&gt;&lt;P&gt;Maximum Physical Interfaces : 8&lt;/P&gt;&lt;P&gt;VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 3, DMZ Restricted&lt;/P&gt;&lt;P&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&lt;/P&gt;&lt;P&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&lt;/P&gt;&lt;P&gt;VPN-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;/P&gt;&lt;P&gt;VPN-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;/P&gt;&lt;P&gt;VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 10&lt;/P&gt;&lt;P&gt;WebVPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&lt;/P&gt;&lt;P&gt;Dual ISPs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&lt;/P&gt;&lt;P&gt;VLAN Trunk Ports&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This platform has a Base license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Serial Number:&lt;/P&gt;&lt;P&gt;Running Activation Key: 0x&lt;/P&gt;&lt;P&gt;Configuration register is 0x1&lt;/P&gt;&lt;P&gt;Configuration last modified by admin at 08:54:06.304 UTC Thu Apr 15 2010&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" id="result_box"&gt;&lt;SPAN style="background-color: #ffffff;" title="acabo de comprar una licencia"&gt;I just bought&amp;nbsp; a Cisco Security Plus license.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Apr 2010 08:02:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359730#M692871</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2010-04-15T08:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Error when add new host</title>
      <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359731#M692872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;halijenn escribió:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A few things that I've found:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) "global (outside) 2 interface" ---&amp;gt; should be "&lt;STRONG&gt;global (outside) 1&amp;nbsp; interface&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;There is no number 2 sequence on your nat statement, therefore, global with sequence 2 will never get invoked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) DMZ interface is currently configured with security level 0, same as outside. You would need to change it to something higher, as I wouldn't think you would like your DMZ interface to have the same security level as your outside. If you otherwise think you need it, then you would need the "same-security-traffic permit inter-interface" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Your DMZ interface is 192.168.20.5/24, however your NAT statement for DMZ is on a different subnet: "nat (dmz) 1 192.168.9.0 255.255.255.0".&lt;/P&gt;&lt;P&gt;Change it to match your interface subnet: "&lt;STRONG&gt;nat (dmz) 1 192.168.20.0 255.255.255.0&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Lastly, your global pool address: "global (outside) 1 0.0.0.195-0.0.0.206 netmask 255.255.255.240", overlaps with your static statements. So you would either shorthen the address pool for the global statement so it doesn't overlap with the public address that you have assigned to your static nat statement OR/ completely remove it once you change point# 1 to "global (outside) 1 interface".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that resolves your issue.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks halijenn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;1) I have one&amp;nbsp; global (outside) 0.0.0.195-0.0.0.206 netmask 255.255.255.240 I need a global (outside) 1 interface too??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2) This problem could affect only to security, no? .I haven´t got security over dmz interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;3) I have a statement for DMZ in a different subnet because the traffic come from a remote lan 192.168.9.0. This remote lan pass through 192.168.20.1 (route dmz 192.168.9.0 255.255.255.0 192.168.20.1 1) .&amp;nbsp;&amp;nbsp; I need to add&amp;nbsp; "nat (dmz) 1 192.168.20.0 255.255.255.0 " ???&amp;nbsp; traffic&amp;nbsp; comes from 192.168.9.0 to outside interface passing through 192.168.20.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;4)&amp;nbsp; I can´t understand. I don´t know where I overlap with the static statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Apr 2010 10:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359731#M692872</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2010-04-15T10:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: Error when add new host</title>
      <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359732#M692873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are the answers to your questions:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;1) I have one&amp;nbsp; global (outside) 0.0.0.195-0.0.0.206 netmask&amp;nbsp; 255.255.255.240 I need a global (outside) 1 interface too??&lt;/P&gt;&lt;P&gt;A: as advised earlier, those global pool is ip address 0.0.0.195-0.0.0.206, ie: 12 ip addresses only. It will not be doing PAT, therefore, only 12 internal ip addresses will be NATed to the above 12 addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, as I said earlier, those pool overlap with your static statements:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp www.XXX.&lt;STRONG&gt;net&lt;/STRONG&gt; ftp 192.168.10.10 ftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt; ftp-data 192.168.10.10 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.&lt;STRONG&gt;197&lt;/STRONG&gt; 3389 192.168.10.9 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.&lt;STRONG&gt;200&lt;/STRONG&gt; https 192.168.10.9 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt; https W2K3-X32-SP https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt; www W2K3-X32-SP www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.XXX.net" target="_blank"&gt;www.XXX.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.&lt;STRONG&gt;198&lt;/STRONG&gt; https 192.168.10.13 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.198 www 192.168.10.133 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.&lt;STRONG&gt;202&lt;/STRONG&gt; 3389 192.168.10.10 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 0.0.0.200 www 192.168.10.14 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;name 0.0.0.201 www.XXX.net&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following ip addresses have been used for your static statements: 0.0.0.197, .198, .200, .201 and .202, which overlaps with your global pool range: 0.0.0.195-0.0.0.206 ---&amp;gt; therefore, your global pool only have 7 addresses left to be used: .195, .196, .199, .203, .204, .205 and .206. Therefore, only 7 addresses from your internal network can be NATed out. If you need more than 7 internal addresses to be NATed out, you would need to have:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) You should not have the same security level on both dmz and outside. Just change the security level to some other number like 50 maybe. DMZ is supported to be protected from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) OK, my bad, I didn't see the route dmz statement earlier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) As described in 1) above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Apr 2010 11:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359732#M692873</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-15T11:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Error when add new host</title>
      <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359733#M692874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks halijenn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I need more than 7 ip nated out so I have to delete global (outside) 0.0.0.195-0.0.0.206 netmask&amp;nbsp; 255.255.255.240 and add global (outside) 1 interface , no? .or the two can coexist?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Summary: The configuration that I have can not do all nat that I need , right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sorry but this is my first ASA config...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;thanks a lot!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Apr 2010 13:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359733#M692874</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2010-04-15T13:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: Error when add new host</title>
      <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359734#M692875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I would remove "global (outside) 1 0.0.0.195-0.0.0.206 netmask&amp;nbsp; 255.255.255.240", and add "global (outside) 1 interface" instead.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After configuration changes, make sure you perform "clear xlate" to clear the existing translation table.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Apr 2010 13:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359734#M692875</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-15T13:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: Error when add new host</title>
      <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359735#M692876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;Result of the command: "show xlate"&lt;BR /&gt;&lt;BR /&gt;24 in use, 25 most used&lt;BR /&gt;PAT Global &lt;A href="https://community.cisco.com/www.xxxx.net(21)" target="_blank"&gt;www.xxxx.net(21)&lt;/A&gt; Local 192.168.10.10(21) &lt;BR /&gt;PAT Global &lt;A href="https://community.cisco.com/www.xxxx.net(20)" target="_blank"&gt;www.xxxx.net(20)&lt;/A&gt; Local 192.168.10.10(20) &lt;BR /&gt;PAT Global 0.0.0.197(3389) Local 192.168.10.9(3389) &lt;BR /&gt;PAT Global 0.0.0.200(443) Local 192.168.10.9(443) &lt;BR /&gt;PAT Global &lt;A href="https://community.cisco.com/www.xxxx.net(443)" target="_blank"&gt;www.xxxx.net(443)&lt;/A&gt; Local W2K3-X32-SP(443) &lt;BR /&gt;PAT Global &lt;A href="https://community.cisco.com/www.xxxx.net(80)" target="_blank"&gt;www.xxxx.net(80)&lt;/A&gt; Local W2K3-X32-SP(80) &lt;BR /&gt;PAT Global &lt;A href="https://community.cisco.com/www.xxxx.net(53)" target="_blank"&gt;www.xxxx.net(53)&lt;/A&gt; Local W2K3-X32-SP(53) &lt;BR /&gt;PAT Global &lt;A href="https://community.cisco.com/www.xxxx.net(53)" target="_blank"&gt;www.xxxx.net(53)&lt;/A&gt; Local W2K3-X32-SP(53) &lt;BR /&gt;PAT Global 0.0.0.198(443) Local 192.168.10.13(443) &lt;BR /&gt;PAT Global 0.0.0.198(80) Local 192.168.10.133(80) &lt;BR /&gt;PAT Global 0.0.0.202(3389) Local 192.168.10.10(3389) &lt;BR /&gt;PAT Global 0.0.0.200(80) Local 192.168.10.14(80) &lt;BR /&gt;Global 0.0.0.202 Local 192.168.9.8&lt;BR /&gt;Global &lt;A href="https://community.cisco.com/www.xxxx.net" target="_blank"&gt;www.xxxx.net&lt;/A&gt; Local 192.168.9.17&lt;BR /&gt;Global 0.0.0.206 Local 192.168.9.12&lt;BR /&gt;Global 0.0.0.204 Local 192.168.9.4&lt;BR /&gt;Global 0.0.0.198 Local 192.168.9.66&lt;BR /&gt;Global 0.0.0.200 Local 192.168.9.16&lt;BR /&gt;Global 0.0.0.205 Local 192.168.9.5&lt;BR /&gt;Global 0.0.0.197 Local 192.168.9.7&lt;BR /&gt;Global 0.0.0.203 Local 192.168.9.3&lt;BR /&gt;Global 0.0.0.196 Local 192.168.10.10&lt;BR /&gt;Global 0.0.0.199 Local 192.168.10.9&lt;BR /&gt;Global 0.0.0.195 Local 192.168.10.6&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;this is my xlate table but I see more than 7 global nat...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt;sorry,I can´t&amp;nbsp; understand the concept.&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt;thanks thanks a lot...&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Apr 2010 13:46:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359735#M692876</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2010-04-15T13:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: Error when add new host</title>
      <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359736#M692877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, they are 12 as per your global pool, however, as advised earlier, some of the ip addresses are overlapping with the static statements, which could cause issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 10:44:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359736#M692877</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-16T10:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Error when add new host</title>
      <link>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359737#M692878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks halijenn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I will change the config in a few days. Now the firewall is in a remote site and I prefer make there the changed .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 11:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-when-add-new-host/m-p/1359737#M692878</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2010-04-16T11:18:43Z</dc:date>
    </item>
  </channel>
</rss>

