bfindleyexpertsexchange
asked on
My ASA 5505 keeps going over the 50 host limit
I have 13 users ant the most on the inside interface plus about 3-5 on VPN.
Using show local-host, the current host count lingers between 28-32.
Every once in a while, it jumps to 50 and I get 450001 syslog ID denying traffic for a couple minutes then the count jumps back down and the errors go away.
I don't know how to troubleshoot to find out where all these hosts are coming from.
Thanks.
Using show local-host, the current host count lingers between 28-32.
Every once in a while, it jumps to 50 and I get 450001 syslog ID denying traffic for a couple minutes then the count jumps back down and the errors go away.
I don't know how to troubleshoot to find out where all these hosts are coming from.
Thanks.
ASKER
How can I tell what local hosts are contributing to the license limit?
Keep in mind though that the hosts don't refer to users but to (all) machines on your network which can connect to the internet.
Don't know how much you got of them offcourse.
Don't know how much you got of them offcourse.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
here are the details for the syslog ID 450001:
Error Message ASA-4-450001: Deny traffic for protocol protocol_id src
interface_name:IP_address/ port dst interface_name:IP_address/ port, licensed host
limit of num exceeded.
If you have a hunch that somebody on the internal network may be launching too many connections, use the command:
sh loacl-host | include host|count/limit
this command will give the number of connections each of the hosts on the internal network are having.
If you find any host with more number of connections determine what that host is, a server or a PC.
A server having many connections is justifiable, but a PC having many connections needs some investigation.
If you want to limit the number of connections, you can use the set-connection command in the class-map of a policy-map
Error Message ASA-4-450001: Deny traffic for protocol protocol_id src
interface_name:IP_address/
limit of num exceeded.
If you have a hunch that somebody on the internal network may be launching too many connections, use the command:
sh loacl-host | include host|count/limit
this command will give the number of connections each of the hosts on the internal network are having.
If you find any host with more number of connections determine what that host is, a server or a PC.
A server having many connections is justifiable, but a PC having many connections needs some investigation.
If you want to limit the number of connections, you can use the set-connection command in the class-map of a policy-map
ASKER
I don't get how the number add up. This is an example of the output.
Current host count: 28, towards licensed host limit of: 50
local host: <10.1.2.175>,
TCP flow count/limit = 29/unlimited
TCP embryonic count to host = 0
UDP flow count/limit = 0/unlimited
local host: <10.1.2.179>,
TCP flow count/limit = 26/unlimited
TCP embryonic count to host = 0
UDP flow count/limit = 32/unlimited
One of these computers is mine and I have no viruses but I am running many applications.
I also have outside ip addresses showing up on the list like the ones below:
local host: <74.125.19.149>,
TCP flow count/limit = 2/unlimited
TCP embryonic count to host = 0
UDP flow count/limit = 0/unlimited
local host: <74.125.19.189>,
TCP flow count/limit = 8/unlimited
TCP embryonic count to host = 0
UDP flow count/limit = 0/unlimited
I thought show local-host would only show connections on the inside interface.
Current host count: 28, towards licensed host limit of: 50
local host: <10.1.2.175>,
TCP flow count/limit = 29/unlimited
TCP embryonic count to host = 0
UDP flow count/limit = 0/unlimited
local host: <10.1.2.179>,
TCP flow count/limit = 26/unlimited
TCP embryonic count to host = 0
UDP flow count/limit = 32/unlimited
One of these computers is mine and I have no viruses but I am running many applications.
I also have outside ip addresses showing up on the list like the ones below:
local host: <74.125.19.149>,
TCP flow count/limit = 2/unlimited
TCP embryonic count to host = 0
UDP flow count/limit = 0/unlimited
local host: <74.125.19.189>,
TCP flow count/limit = 8/unlimited
TCP embryonic count to host = 0
UDP flow count/limit = 0/unlimited
I thought show local-host would only show connections on the inside interface.
ASKER
anoopkmr
I removed the -security-traffic permit intra-interface - didn't seem to do anything
There is a default route
My ASA version is 7.2(3)
I removed the -security-traffic permit intra-interface - didn't seem to do anything
There is a default route
My ASA version is 7.2(3)
I have seen a few times on the ASA 5505 that if you use VPN clients to connect with full tunnel and provide them internet via "VPN on a stick" that the ASA then starts using sessions that the VPN clients create to count instead of IPs.
Under all circumstances I advise you to upgrade to a newer version atleast 8.2.3 (think its the lastest in the 8.2.x train).
Under all circumstances I advise you to upgrade to a newer version atleast 8.2.3 (think its the lastest in the 8.2.x train).
ASKER
I think that may be what is happening. What's the process for getting an upgrade? I have 4 ASA 5505 that are not on any sort of contract. Do I need to purchase the upgrade? From who? Thanks.
You can purchase a single upgrade for the one ASA that needs the new software or you can purchase a 50-unlimited user upgrade.
I would recommend that you purchase a smartnet contract for all 4 ASAs and a 50-unl upgrade for the ASA with VPN clients.
A smartnet contract enables you to the following:
1. Full access to ASA and VPN software
2. Advanced hardware replacement (AHV) on a 8x5NBD (next business day shipping)
3. Access to Cisco TAC
I would recommend that you purchase a smartnet contract for all 4 ASAs and a 50-unl upgrade for the ASA with VPN clients.
A smartnet contract enables you to the following:
1. Full access to ASA and VPN software
2. Advanced hardware replacement (AHV) on a 8x5NBD (next business day shipping)
3. Access to Cisco TAC
ASKER
Can you buy the upgrade or Smartnet online?
You purchase your smartnet contract via a Cisco partner or reseller and the contracts are paper contracts and is sent via e-mail. Use this link to find a partner in your area.
http://tools.cisco.com/WWChannels/LOCATR/openBasicSearch.do
http://tools.cisco.com/WWChannels/LOCATR/openBasicSearch.do
http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/s4_72.html#wp1306138