• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1796
  • Last Modified:

CISCO ASA 5505 internet link aggregation can bypass license restrictions?

Hi all,
i tried to reconfigure a CISCO ASA5505 to attach a second DSL as a separate internet link, to use for VPN alternate access.
I created a new interface but i can't use it with rules or ACL 'cause of a license restriction:

ciscoasa(config)# interface Vlan 104
ciscoasa(config-if)# description VPN alternate access
ciscoasa(config-if)# nameif out2
ERROR: This license does not allow configuring more than 2 interfaces with
nameif and without a "no forward" command on this interface or on 1 interface(s)
with nameif already configured.
ciscoasa(config-if)#

Open in new window




So, my questions are:
how can i bypass this?
Can I use both the assigned public IPs, aggregating the 2 links for LB in download, to connect to the VPN service?
Where's the best and fastest documentation to do that?


Thank you!
0
ienaxxx
Asked:
ienaxxx
  • 2
1 Solution
 
Ernie BeekExpertCommented:
Afaik there is no way around that except upgrading the license.

Q. I receive this error message when I configure the third VLAN: :- ERROR: This license does not allow configuring more than 2 interfaces with nameif and without a "no forward" command on this interface or on 1 interface(s) with nameif already configured. How can I resolve this error?

A. This error has occurred due to a license limitation on ASA. You must obtain the Security Plus license in order to configure more VLANs as in routed mode. Only three active VLANs can be configured with the Base license, and up to 20 active VLANs with the Security Plus license. You can create a third VLAN with the Base license, but this VLAN only has communication either to the outside or to the inside but not in both directions. If you need to have the communication in both directions, then you need to upgrade the license. Also, if you use the Base license, allow this interface to be the third VLAN and limit it from initiating contact to one other VLAN with the hostname(config-if)# no forward interface vlan number command. Thus the third VLAN can be configured.


Source: http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_qanda_item09186a00805b87d8.shtml#errormsg
0
 
Ernie BeekExpertCommented:
0
 
ienaxxxAuthor Commented:
I knew it was too pretty to be true....
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now