: ASA Version 8.3(1) ! hostname asa00 enable password /jSCchMW6P7h3bgi encrypted passwd rEliQc2v8Lqh8gin encrypted names ! interface Vlan79 nameif INSIDE security-level 100 ip address 10.40.79.1 255.255.255.0 ! interface Vlan99 nameif OUTSIDE security-level 0 ip address 10.0.0.101 255.255.255.0 ! interface Ethernet0/0 switchport access vlan 99 speed 100 duplex full ! interface Ethernet0/1 shutdown ! interface Ethernet0/2 shutdown ! interface Ethernet0/3 shutdown ! interface Ethernet0/4 shutdown ! interface Ethernet0/5 switchport access vlan 79 speed 100 duplex full ! interface Ethernet0/6 shutdown ! interface Ethernet0/7 shutdown ! banner exec WARNING! NO UNAUTHORIZED USERS SHOULD ATTEMPT TO ACCESS THIS DEVICE! ftp mode passive clock timezone EST -5 clock summer-time EDT date Mar 9 2014 2:00 Nov 9 2014 2:00 object network NET-10.40.79.0 subnet 10.40.79.0 255.255.255.0 object network NET-192.168.1.0 subnet 192.168.1.0 255.255.255.0 object-group icmp-type ICMP-0 icmp-object echo-reply icmp-object source-quench icmp-object time-exceeded icmp-object traceroute icmp-object unreachable access-list OUT_IN_ACL extended permit icmp any any object-group ICMP-0 access-list OUT_IN_ACL extended permit ip object NET-192.168.1.0 object NET-10.40.79.0 pager lines 24 logging enable logging timestamp logging trap critical logging host INSIDE 10.40.79.61 mtu INSIDE 1500 mtu OUTSIDE 1500 ip local pool REMOTE_SSL 192.168.1.1-192.168.1.10 mask 255.255.255.0 icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 nat (INSIDE,any) source static NET-10.40.79.0 NET-10.40.79.0 destination static NET-192.168.1.0 NET-192.168.1.0 nat (INSIDE,OUTSIDE) source dynamic any interface access-group OUT_IN_ACL in interface OUTSIDE route OUTSIDE 0.0.0.0 0.0.0.0 10.0.0.1 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 dynamic-access-policy-record DfltAccessPolicy aaa authentication ssh console LOCAL aaa authentication serial console LOCAL http server enable http 10.40.79.61 255.255.255.255 INSIDE no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 telnet timeout 15 ssh timeout 15 ssh version 2 console timeout 0 dhcpd dns 208.67.222.222 208.67.220.220 ! dhcpd address 10.40.79.51-10.40.79.60 INSIDE dhcpd lease 604800 interface INSIDE dhcpd option 3 ip 10.40.79.1 interface INSIDE dhcpd enable INSIDE ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept ntp server 173.230.158.30 source OUTSIDE prefer ntp server 208.87.104.40 source OUTSIDE ntp server 162.210.196.6 source OUTSIDE ntp server 162.243.55.105 source OUTSIDE webvpn enable OUTSIDE svc image disk0:/anyconnect-win-2.5.2014-k9.pkg 1 svc enable group-policy DefaultWEBVPNGroup internal group-policy DefaultWEBVPNGroup attributes dns-server value 208.67.222.222 208.67.220.220 vpn-simultaneous-logins 1 vpn-idle-timeout 30 vpn-tunnel-protocol svc webvpn split-tunnel-policy tunnelall webvpn svc ask enable username ANDREW password RxvJeyhOnywanb.2 encrypted privilege 15 username ANDREW attributes service-type remote-access tunnel-group DefaultWEBVPNGroup general-attributes address-pool REMOTE_SSL default-group-policy DefaultWEBVPNGroup ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect ip-options inspect netbios inspect rsh inspect rtsp inspect skinny inspect esmtp inspect sqlnet inspect sunrpc inspect tftp inspect sip inspect xdmcp ! service-policy global_policy global prompt hostname context Cryptochecksum:aaeb4ca967859863893324db5613cb3f : end asa00(config)#