The first log message seems to indicate that the ASA5505 Licensed host limit has been reached.
The ASA5505 to my understanding has atleast 3 different levels of host licensing.
And of those to my understanding the 10 user limit is for the Base License unit, 50 user limit is sold separately for a Base License (or as a bundle) unit and Unlimited is either sold separately for a Base License unit (or as a bundle) or is included with a Security Plus license of the unit. I am not 100% sure about this but that is how I remember it.
The user licensing should work so that the hosts behind the interface holding the Default Route arent considered/counted towards this limit. Only users on your LAN interface or DMZ interface are counted towards this limit.
You should check the following commands output to get a clearer information of the current situation
View the license with
Show the amount of users counted towards the license limit
Look at the top part of the output.
Here is an example from my own home ASA5505 with Base License only
ASA# sh local-host
Detected interface 'WAN' as the Internet interface. Host limit applies to all other interfaces.
Current host count: 3, towards licensed host limit of: 10
There is also some bugs in the newer softwares that might cause problems even though the user limit is not reached.
The second log message you posted is simply the ASA denying traffic based on your ACL called "outside_access_in"
The [0x0, 0x0] at the end indicates that the traffic hits the Implicit Deny rule at the end. This rule doesnt show in the ACL but is the basic well known rule that means that all traffic that is not allowed in the ACL before the end of the ACL is blocked.
I dont see anything out of the ordinary in the log message.
But as I said the first one seems to indicate that you have reached the 10 user limit which would indicate you have a basic ASA5505 with Base License only
Have a look at this Cisco document about the ASA5505 Licensing/Bundle options
BenefitsDocumentationPrerequisiteImage Download LinksSupported PlatformsLimitationsLicense RequirementsTopologyStep-by-step ConfigurationConfigure PATCreate Custom ZonesCreate Class MapCreate the Policy-mapCreate Zone PairAssign the Interfaces to the Zone...
Listen: https://smarturl.it/CCRS9E20Follow us: https://twitter.com/CiscoChampion
With over one trillion email scams per year, more than 22 billion records were exposed by data breaches in 2021. Phishing attacks are clearly on the rise, and they’re e...
Radius server configuration for 802.1X
Server radius test1
Address ipv4 10.1.1.1
Server radius test2
Address ipv4 10.1.1.2
aaa group server radius TEST-gr
server name test1
server name test2
Umbrella’s cloud-delivered firewall (CDFW) is a cool features that provides Firewall Services in the Cisco Umbrella Cloud without the need to deploy on-premises firewall devices and visibility and control for internet traffic across all branch offices. To...