: Saved : Written by cisco at 14:38:21.813 UTC Fri Aug 26 2011 ! ASA Version 8.0(4) ! hostname ASA5510 enable password O8MsDM7lY8XTT3eY encrypted passwd 2KFQnbNIdI.2KYOU encrypted names name 172.16.4.0 NETWORK_US name 172.16.7.93 HOST ! interface Ethernet0/0 nameif inside security-level 100 ip address 172.16.64.11 255.255.252.0 ! interface Ethernet0/1 nameif outside1 security-level 0 ip address 203.113.144.90 255.255.255.248 ! interface Ethernet0/2 shutdown nameif outside2 security-level 50 ip address 172.16.0.252 255.255.255.0 ! interface Ethernet0/3 shutdown no nameif no security-level no ip address ! interface Management0/0 nameif management security-level 100 ip address 192.168.1.1 255.255.255.0 management-only ! ftp mode passive same-security-traffic permit inter-interface same-security-traffic permit intra-interface object-group service 465 tcp port-object eq 465 object-group service 585 tcp-udp port-object eq 585 object-group service 993 tcp port-object eq 993 object-group service 995 tcp-udp port-object eq 995 object-group service DM_INLINE_SERVICE_1 service-object tcp-udp eq www service-object tcp eq https service-object tcp eq smtp service-object tcp eq pop3 object-group protocol TCPUDP protocol-object udp protocol-object tcp object-group service 587 tcp-udp port-object eq 587 access-list inside_access_in extended permit ip any any access-list inside_access_in extended permit icmp any any inactive access-list outside1_access_in extended permit object-group DM_INLINE_SERVICE_1 any host 172.16.64.32 access-list outside1_access_in extended permit ip any any inactive access-list outside1_access_in extended permit icmp any any inactive access-list outside1_access_in extended permit tcp any host 172.16.64.32 object-group 993 access-list outside1_access_in extended permit object-group TCPUDP any host 172.16.64.32 object-group 585 access-list outside1_access_in extended permit object-group TCPUDP any host 172.16.64.32 object-group 995 access-list outside1_access_in extended permit object-group TCPUDP any host 172.16.64.32 object-group 587 access-list outside1_access_in extended permit tcp any host 172.16.64.32 eq imap4 access-list outside1_access_in extended permit tcp any host 172.16.64.32 object-group 465 access-list outside1_1_cryptomap extended permit ip 172.16.64.0 255.255.252.0 NETWORK_US 255.255.252.0 access-list inside_nat0_outbound extended permit ip host 172.16.64.32 any access-list inside_nat0_outbound extended permit ip 172.16.64.0 255.255.252.0 NETWORK_US 255.255.252.0 access-list inside_nat0_outbound extended permit ip 172.16.64.0 255.255.252.0 10.10.10.0 255.255.255.128 access-list REMOTEVPN_splitTunnelAcl standard permit 172.16.64.0 255.255.252.0 access-list REMOTEVPN_splitTunnelAcl_1 standard permit 172.16.64.0 255.255.252.0 access-list REMOTEVPN_splitTunnelAcl_2 standard permit 172.16.64.0 255.255.252.0 pager lines 24 logging enable logging asdm informational mtu management 1500 mtu inside 1500 mtu outside1 1500 mtu outside2 1500 ip local pool remoteVPN 10.10.10.10-10.10.10.100 mask 255.255.255.0 icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-613.bin asdm location NETWORK_US 255.255.252.0 inside asdm location HOST 255.255.255.255 inside no asdm history enable arp timeout 14400 global (outside1) 1 interface nat (inside) 0 access-list inside_nat0_outbound nat (inside) 1 172.16.64.0 255.255.252.0 static (inside,inside) 203.113.144.91 172.16.64.31 netmask 255.255.255.255 access-group inside_access_in in interface inside access-group outside1_access_in in interface outside1 route outside1 0.0.0.0 0.0.0.0 203.113.144.89 1 route outside2 0.0.0.0 0.0.0.0 172.16.0.254 3 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute dynamic-access-policy-record DfltAccessPolicy aaa authentication telnet console LOCAL aaa authentication enable console LOCAL aaa authentication http console LOCAL aaa authorization command LOCAL http server enable http 172.16.64.0 255.255.252.0 inside http 192.168.1.0 255.255.255.0 management no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5 crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800 crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime kilobytes 4608000 crypto map outside1_map 1 match address outside1_1_cryptomap crypto map outside1_map 1 set peer 209.37.226.2 crypto map outside1_map 1 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5 crypto map outside1_map 1 set security-association lifetime seconds 86400 crypto map outside1_map 1 set security-association lifetime kilobytes 4608000 crypto map outside1_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP crypto map outside1_map interface outside1 crypto map outside2_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP crypto map outside2_map interface outside2 crypto isakmp enable outside1 crypto isakmp enable outside2 crypto isakmp policy 4 authentication pre-share encryption 3des hash md5 group 2 lifetime 86400 crypto isakmp policy 20 authentication pre-share encryption 3des hash md5 group 1 lifetime 86400 crypto isakmp policy 65535 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 telnet 172.16.64.0 255.255.255.0 inside telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd address 192.168.1.2-192.168.1.254 management dhcpd enable management ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept group-policy REMOTEVPN internal group-policy REMOTEVPN attributes dns-server value 172.16.64.31 172.16.64.33 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value REMOTEVPN_splitTunnelAcl_2 default-domain value spartronics.com username admin password eY/fQXw7Ure8Qrz7 encrypted privilege 15 username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15 tunnel-group 209.37.226.2 type ipsec-l2l tunnel-group 209.37.226.2 ipsec-attributes pre-shared-key ES{5kN4xnK*9r28 tunnel-group REMOTEVPN type remote-access tunnel-group REMOTEVPN general-attributes address-pool remoteVPN default-group-policy REMOTEVPN tunnel-group REMOTEVPN ipsec-attributes pre-shared-key spar2000 ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp ! service-policy global_policy global prompt hostname context Cryptochecksum:4cb423867cba54b8f49da4fa19a14fd4 : end