cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
898
Views
0
Helpful
6
Replies

portmap translation creation failed for tcp src inside:10.x.x.x/<random port number> dst outside:<internet IP address/port number>

andrewdours
Level 1
Level 1

We're able to get to the internet, but everyone has noticed a lag in response times so I decided to check the firewall.  Not sure if this is a major issue, but it is an error that I had not seen before.  Any ideas of what I can check?

 

Thanks,

 

Andrew

6 Replies 6

Pranay Prasoon
Level 3
Level 3

this  under some circumstances can be bug. But they usually not interrupt traffic.

 

I would suggest looking for how many PAT is already existed with this IP address. You can check "show xlate | in <pat ip address>" and see if the PAT ports are already exhausted. This usually happens because all users are using on one IP for PAT and connection is so high that all the ports got exhausted.

 

there are some questions through

1) are you using ASA in cluster mode?

2) what is the software version?

3) attach your running-config

Hi,

Output of "show nat pool" output would also be helpful in addition to your relevant NAT and ACL configuration.

Thanks and Regards,

Vibhor Amrodia
 

Result of the command: "show nat pool"

UDP PAT pool outside:HOST-x.x.x.114, address x.x.x.114, range 1-511, allocated 1
UDP PAT pool outside:HOST-x.x.x.114, address x.x.x.114, range 512-1023, allocated 0
UDP PAT pool outside:HOST-x.x.x.114, address x.x.x.114, range 1024-65535, allocated 113
TCP PAT pool outside, address x.x.x.129, range 1-511, allocated 1
TCP PAT pool outside, address x.x.x.129, range 512-1023, allocated 0
TCP PAT pool outside, address x.x.x.129, range 1024-65535, allocated 0
TCP PAT pool outside:HOST-x.x.x.113, address x.x.x.113, range 1-511, allocated 0
TCP PAT pool outside:HOST-x.x.x.113, address x.x.x.113, range 512-1023, allocated 0
TCP PAT pool outside:HOST-x.x.x.113, address x.x.x.113, range 1024-65535, allocated 670
UDP PAT pool outside:HOST-x.x.x.113, address x.x.x.113, range 1-511, allocated 0
UDP PAT pool outside:HOST-x.x.x.113, address x.x.x.113, range 512-1023, allocated 0
UDP PAT pool outside:HOST-x.x.x.113, address x.x.x.113, range 1024-65535, allocated 29
UDP PAT pool outside, address x.x.x.98, range 1-511, allocated 4
UDP PAT pool outside, address x.x.x.98, range 512-1023, allocated 0
UDP PAT pool outside, address x.x.x.98, range 1024-65535, allocated 7
TCP PAT pool outside:HOST-x.x.x.114, address x.x.x.114, range 1-511, allocated 0
TCP PAT pool outside:HOST-x.x.x.114, address x.x.x.114, range 512-1023, allocated 0
TCP PAT pool outside:HOST-x.x.x.114, address x.x.x.114, range 1024-65535, allocated 405
TCP PAT pool inside, address 10.255.98.109, range 1-511, allocated 2
TCP PAT pool inside, address 10.255.98.109, range 512-1023, allocated 0
TCP PAT pool inside, address 10.255.98.109, range 1024-65535, allocated 0
UDP PAT pool inside, address 10.255.98.109, range 1-511, allocated 3
UDP PAT pool inside, address 10.255.98.109, range 512-1023, allocated 1
UDP PAT pool inside, address 10.255.98.109, range 1024-65535, allocated 6
TCP PAT pool management, address 10.255.0.110, range 1-511, allocated 2
TCP PAT pool management, address 10.255.0.110, range 512-1023, allocated 0
TCP PAT pool management, address 10.255.0.110, range 1024-65535, allocated 0
UDP PAT pool management, address 10.255.0.110, range 1-511, allocated 1
UDP PAT pool management, address 10.255.0.110, range 512-1023, allocated 1
UDP PAT pool management, address 10.255.0.110, range 1024-65535, allocated 3
TCP PAT pool any:HOST-x.x.x.113, address x.x.x.113, range 1-511, allocated 0
TCP PAT pool any:HOST-x.x.x.113, address x.x.x.113, range 512-1023, allocated 0
TCP PAT pool any:HOST-x.x.x.113, address x.x.x.113, range 1024-65535, allocated 246
UDP PAT pool any:HOST-x.x.x.113, address x.x.x.113, range 1-511, allocated 1
UDP PAT pool any:HOST-x.x.x.113, address x.x.x.113, range 512-1023, allocated 0
UDP PAT pool any:HOST-x.x.x.113, address x.x.x.113, range 1024-65535, allocated 22

 

Looking at PAT pool stats, this doesn't seem to be exhausted at any point. Opening a TAC case will be better option to dig deeper.

I ended up being more specific with the NAT statements.  Instead of having any - outside I changed many statements to <interface> - outside.  That seemed to clear it up.
 

1) Not in cluster mode

2) Cisco Adaptive Security Appliance Software Version 9.0(4)
Device Manager Version 7.1(6)

3) I'm not comfortable posting my running configuration.  I can just open a case if this is not enough information to go on.

Thanks,

Andrew

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card