02-19-2012 04:17 AM - edited 03-11-2019 03:32 PM
Hi,
The ASA5505 I am working with has this from the show version:
Licensed features for this platform:
Maximum Physical Interfaces : 8
VLANs : 3, DMZ Restricted
Inside Hosts : 10
Failover : Disabled
VPN-DES : Enabled
VPN-3DES-AES : Enabled
VPN Peers : 10
WebVPN Peers : 2
Dual ISPs : Disabled
VLAN Trunk Ports : 0
This platform has a Base license.
Does the Insides Hosts :10 line mean that only 10 devices can be connected to the firewall at one time? I would like to connect an AP to one of the PoE ports and have possibly more than 10 connected. Is this possible with this ASA5505?
Thanks, Pat.
Solved! Go to Solution.
02-19-2012 05:22 AM
Hi Patrick,
"In routed mode, hosts on the inside (Business and Home VLANs) count towards the limit when they communicate with the outside (Internet VLAN), including when the inside initiates a connection to the outside as well as when the outside initiates a connection to the inside. Note that even when the outside initiates a connection to the inside, outside hosts are
not
counted towards the limit; only the inside hosts count. Hosts that initiate traffic between Business and Home are also not counted towards the limit. The interface associated with the default route is considered to be the outside Internet interface. If there is no default route, hosts on all interfaces are counted toward the limit. In transparent mode, the interface with the lowest number of hosts is counted towards the host limit. See the
show local-host
command to view host limits."
So to answer your question, you're ok if you will connect an AP, the limit is refering to the hosts that need access from inside to outside.
Dan
02-19-2012 09:13 AM
Hi Patrick ,
The text as it is, if taken from ASA Command Line Configuration :
http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/specs.html#wp1012343
My undestanding is that only traffic from any inside hosts that generate traffic to outside counts.
Dan