ciscoasa# ciscoasa# sh run : Saved : ASA Version 8.0(3) ! hostname ciscoasa domain-name vpn.lsiam.com enable password 9jNfZuG3TC5tCVH0 encrypted names ! interface Ethernet0/0 speed 100 nameif Outside security-level 0 ip address 172.16.100.99 255.255.255.0 ! interface Ethernet0/1 speed 1000 no nameif no security-level no ip address ! interface Ethernet0/1.10 vlan 10 nameif Inside security-level 100 ip address 172.16.2.1 255.255.255.0 ! interface Ethernet0/1.20 vlan 20 nameif DMZ security-level 50 ip address 192.168.1.200 255.255.255.0 ! interface Ethernet0/2 shutdown no nameif no security-level no ip address ! interface Ethernet0/3 shutdown no nameif no security-level no ip address ! interface Management0/0 shutdown no nameif no security-level no ip address management-only ! passwd 2KFQnbNIdI.2KYOU encrypted ftp mode passive dns server-group DefaultDNS domain-name vpn.lsiam.com same-security-traffic permit intra-interface access-list dmz extended permit ip host 192.168.1.1 any access-list dmz extended permit ip host 192.168.1.12 any access-list dmz extended permit ip host 192.168.1.15 any access-list Mukdahan_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0 access-list DMZ_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 172.16.99.0 255.255.255.128 access-list vpn extended permit ip 172.16.99.0 255.255.255.0 172.16.99.0 255.255.255.0 pager lines 24 logging enable logging asdm informational mtu Outside 1500 mtu Inside 1500 mtu DMZ 1500 ip local pool Remote_VPN 172.16.99.10-172.16.99.50 mask 255.255.255.0 no failover icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-603.bin no asdm history enable arp Outside 172.16.100.254 0011.6e01.3aa4 arp DMZ 192.168.1.12 001a.4d76.a84e arp DMZ 192.168.1.15 001d.9266.861f arp DMZ 192.168.1.1 001a.6449.388e arp timeout 14400 nat-control global (Outside) 1 172.16.100.30-172.16.100.39 global (Outside) 1 172.16.100.40 nat (Outside) 0 access-list vpn nat (DMZ) 0 access-list DMZ_nat0_outbound nat (DMZ) 1 access-list dmz static (Inside,DMZ) 192.168.1.0 172.16.2.0 netmask 255.255.255.0 static (Inside,Outside) 172.16.100.2 172.16.2.2 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.3 172.16.2.3 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.4 172.16.2.4 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.11 172.16.2.11 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.160 172.16.2.160 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.222 172.16.2.222 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.240 172.16.2.240 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.241 172.16.2.241 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.242 172.16.2.242 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.243 172.16.2.243 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.244 172.16.2.244 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.245 172.16.2.245 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.246 172.16.2.246 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.247 172.16.2.247 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.248 172.16.2.248 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.249 172.16.2.249 netmask 255.255.255.255 static (Inside,Outside) 172.16.100.250 172.16.2.250 netmask 255.255.255.255 route Outside 0.0.0.0 0.0.0.0 172.16.100.254 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout uauth 0:05:00 absolute dynamic-access-policy-record DfltAccessPolicy aaa authentication ssh console LOCAL http server enable http 0.0.0.0 0.0.0.0 Outside http 0.0.0.0 0.0.0.0 DMZ no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart no sysopt connection permit-vpn crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5 crypto map Outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP crypto map Outside_map interface Outside crypto isakmp enable Outside crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 crypto isakmp ipsec-over-tcp port 10000 telnet timeout 5 ssh 0.0.0.0 0.0.0.0 Outside ssh 0.0.0.0 0.0.0.0 DMZ ssh timeout 5 console timeout 0 threat-detection basic-threat threat-detection statistics group-policy Mukdahan internal group-policy Mukdahan attributes vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value Mukdahan_splitTunnelAcl username admin password e1z89R3cZe9Kt6Ib encrypted username vpn2 password GLZo7yhyLS2COC/7 encrypted privilege 0 username vpn2 attributes vpn-group-policy Mukdahan username vpn3 password hTSOodgTloxpqxx. encrypted privilege 0 username vpn3 attributes vpn-group-policy Mukdahan username vpn1 password Qr9Uo2I.DinqQ9V/ encrypted privilege 0 username vpn1 attributes vpn-group-policy Mukdahan password-storage enable tunnel-group Mukdahan type remote-access tunnel-group Mukdahan general-attributes address-pool Remote_VPN default-group-policy Mukdahan tunnel-group Mukdahan ipsec-attributes pre-shared-key * ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect icmp ! service-policy global_policy global prompt hostname context Cryptochecksum:822bb88b387140824280d38246473181 : end ciscoasa# ciscoasa#