ASA Version 7.2(1) ! hostname ciscoasa enable password 8Ry2YjIyt7RRXU24 encrypted names ! interface Ethernet0/0 nameif outside security-level 0 ip address 192.168.2.2 255.255.255.0 ! interface Ethernet0/1 nameif inside security-level 100 ip address 192.168.3.1 255.255.255.0 ! interface Ethernet0/2 nameif dmz security-level 50 ip address 192.168.4.1 255.255.255.0 ! interface Management0/0 shutdown no nameif no security-level no ip address management-only ! passwd 2KFQnbNIdI.2KYOU encrypted ftp mode passive access-list outside extended permit icmp any any access-list dmz extended permit icmp any any pager lines 24 mtu outside 1500 mtu inside 1500 mtu dmz 1500 no asdm history enable arp timeout 14400 global (outside) 1 interface global (dmz) 1 interface nat (inside) 1 0.0.0.0 0.0.0.0 nat (dmz) 1 0.0.0.0 0.0.0.0 static (inside,dmz) 192.168.3.0 192.168.3.0 netmask 255.255.255.0 access-group outside in interface outside access-group dmz in interface dmz route outside 0.0.0.0 0.0.0.0 192.168.2.1 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout uauth 0:05:00 absolute no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart telnet timeout 5 ssh timeout 5 console timeout 0 management-access inside ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect netbios inspect rsh inspect rtsp inspect skinny inspect esmtp inspect sqlnet inspect sunrpc inspect tftp inspect sip inspect xdmcp inspect icmp ! service-policy global_policy global prompt hostname context Cryptochecksum:901dbdc6d81c1bb95a1b39fee3fd558a : end --------------------------------------------------------------------------- ciscoasa# sh access-list access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096) alert-interval 300 access-list outside; 1 elements access-list outside line 1 extended permit icmp any any (hitcnt=1) 0x390a154c access-list dmz; 1 elements access-list dmz line 1 extended permit icmp any any (hitcnt=0) 0xd19e6205 ciscoasa# sh access-list access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096) alert-interval 300 access-list outside; 1 elements access-list outside line 1 extended permit icmp any any (hitcnt=1) 0x390a154c access-list dmz; 1 elements access-list dmz line 1 extended permit icmp any any (hitcnt=0) 0xd19e6205 ciscoasa# sh access-list access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096) alert-interval 300 access-list outside; 1 elements access-list outside line 1 extended permit icmp any any (hitcnt=1) 0x390a154c access-list dmz; 1 elements access-list dmz line 1 extended permit icmp any any (hitcnt=0) 0xd19e6205 ciscoasa# sh access-list access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096) alert-interval 300 access-list outside; 1 elements access-list outside line 1 extended permit icmp any any (hitcnt=1) 0x390a154c access-list dmz; 1 elements access-list dmz line 1 extended permit icmp any any (hitcnt=0) 0xd19e6205 ciscoasa# sh access-list access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096) alert-interval 300 access-list outside; 1 elements access-list outside line 1 extended permit icmp any any (hitcnt=1) 0x390a154c access-list dmz; 1 elements access-list dmz line 1 extended permit icmp any any (hitcnt=0) 0xd19e6205 ciscoasa# --------------------------------------------------------------------------------- ciscoasa# sh xla 24 in use, 72 most used Global 192.168.3.0 Local 192.168.3.0 PAT Global 192.168.2.2(1121) Local 192.168.3.176(2488) PAT Global 192.168.2.2(1120) Local 192.168.3.176(2487) PAT Global 192.168.2.2(1119) Local 192.168.3.176(2486) PAT Global 192.168.2.2(1118) Local 192.168.3.176(2485) PAT Global 192.168.2.2(1117) Local 192.168.3.176(2484) PAT Global 192.168.2.2(1116) Local 192.168.3.176(2483) PAT Global 192.168.2.2(1115) Local 192.168.3.176(2482) PAT Global 192.168.2.2(1113) Local 192.168.3.176(2480) PAT Global 192.168.2.2(1111) Local 192.168.3.176(2478) PAT Global 192.168.2.2(1110) Local 192.168.3.176(2477) PAT Global 192.168.2.2(1034) Local 192.168.3.176(23201) PAT Global 192.168.2.2(1103) Local 192.168.3.176(2474) PAT Global 192.168.2.2(1101) Local 192.168.3.176(2473) PAT Global 192.168.2.2(1100) Local 192.168.3.176(2472) PAT Global 192.168.2.2(1095) Local 192.168.3.176(2465) PAT Global 192.168.2.2(1094) Local 192.168.3.176(2469) PAT Global 192.168.2.2(1093) Local 192.168.3.176(2460) PAT Global 192.168.2.2(1092) Local 192.168.3.176(2459) PAT Global 192.168.2.2(1033) Local 192.168.3.176(2412) PAT Global 192.168.2.2(1032) Local 192.168.3.176(1181) PAT Global 192.168.2.2(1030) Local 192.168.3.176(1045) PAT Global 192.168.2.2(1028) Local 192.168.3.176(1171) PAT Global 192.168.2.2(1027) Local 192.168.3.176(1044) ciscoasa#