: Saved : ASA Version 7.0(7) ! hostname MyASA domain-name invalid enable password encrypted names dns-guard ! interface Ethernet0/0 nameif Outside security-level 0 ip address 61.x.x.34 255.255.255.224 ! interface Ethernet0/1 nameif PublicServers security-level 20 ip address 10.1.9.1 255.255.255.0 ! interface Ethernet0/2 nameif Inside security-level 90 ip address 10.1.10.1 255.255.255.0 ! interface Management0/0 nameif management security-level 100 ip address 192.168.1.1 255.255.255.0 management-only ! passwd encrypted ftp mode passive object-group service WebFTP tcp description HTTP HTTPS FTP SFTP port-object eq www port-object eq ssh port-object eq ftp port-object eq https port-object range 41898 41918 access-list Outside_access_in extended permit tcp any host 61.x.x.60 object-group WebFTP access-list Outside_access_in extended permit tcp any host 61.x.x.60 eq smtp access-list Outside_access_in extended permit tcp any host 61.x.x.60 eq pop3 access-list Outside_access_in extended permit tcp any host 61.x.x.60 eq 7777 access-list Outside_access_in extended permit tcp any host 61.x.x.60 eq 8181 access-list Outside_access_in extended permit tcp any host 61.x.x.60 eq 8888 access-list Outside_access_in extended permit tcp any host 61.x.x.60 eq 9999 access-list Outside_access_in extended permit tcp any host 61.x.x.45 eq www access-list Outside_access_in extended permit tcp any host 61.x.x.45 eq https access-list Outside_access_in extended permit tcp any host 61.x.x.46 object-group WebFTP access-list Outside_access_in extended permit tcp any host 61.x.x.47 object-group WebFTP access-list Outside_access_in extended permit tcp any host 61.x.x.55 object-group WebFTP access-list Outside_access_in extended permit tcp any host 61.x.x.44 object-group WebFTP access-list Outside_access_in extended permit tcp any host 61.x.x.44 eq 9888 access-list Outside_access_in extended permit tcp any host 61.x.x.49 object-group WebFTP access-list Outside_access_in extended permit tcp any host 61.x.x.54 object-group WebFTP access-list Outside_access_in extended permit tcp any host 61.x.x.51 eq ftp access-list Outside_access_in extended permit tcp any host 61.x.x.51 eq ssh access-list Outside_access_in extended permit tcp any host 61.x.x.51 eq 41898 access-list Outside_access_in extended permit tcp any host 61.x.x.56 eq www access-list Outside_access_in extended permit tcp any host 61.x.x.56 eq https access-list management_nat0_outbound extended permit ip any 10.1.11.0 255.255.255.0 access-list VPNGroup1_splitTunnelAcl standard permit any pager lines 24 logging enable logging asdm informational mtu Outside 1500 mtu PublicServers 1500 mtu Inside 1500 mtu management 1500 ip local pool VPNPool 10.1.11.100-10.1.11.200 mask 255.255.255.0 asdm image disk0:/asdm-507.bin no asdm history enable arp timeout 14400 nat (management) 0 access-list management_nat0_outbound nat (management) 0 0.0.0.0 0.0.0.0 static (Inside,Outside) 61.x.x.60 10.1.10.60 netmask 255.255.255.255 dns static (Inside,PublicServers) 10.1.9.60 10.1.10.60 netmask 255.255.255.255 static (Outside,Inside) 10.1.10.60 61.x.x.60 netmask 255.255.255.255 dns static (Outside,PublicServers) 10.1.9.45 61.x.x.45 netmask 255.255.255.255 dns static (PublicServers,Outside) 61.x.x.45 10.1.9.45 netmask 255.255.255.255 dns static (Outside,PublicServers) 10.1.9.47 61.x.x.47 netmask 255.255.255.255 dns static (PublicServers,Outside) 61.x.x.47 10.1.9.47 netmask 255.255.255.255 dns static (Outside,PublicServers) 10.1.9.55 61.x.x.55 netmask 255.255.255.255 dns static (PublicServers,Outside) 61.x.x.55 10.1.9.55 netmask 255.255.255.255 dns static (Outside,PublicServers) 10.1.9.44 61.x.x.44 netmask 255.255.255.255 dns static (PublicServers,Outside) 61.x.x.44 10.1.9.44 netmask 255.255.255.255 dns static (Outside,PublicServers) 10.1.9.46 61.x.x.46 netmask 255.255.255.255 dns static (PublicServers,Outside) 61.x.x.46 10.1.9.46 netmask 255.255.255.255 dns static (Outside,PublicServers) 10.1.9.49 61.x.x.49 netmask 255.255.255.255 dns static (PublicServers,Outside) 61.x.x.49 10.1.9.49 netmask 255.255.255.255 dns static (Outside,PublicServers) 10.1.9.54 61.x.x.54 netmask 255.255.255.255 dns static (PublicServers,Outside) 61.x.x.54 10.1.9.54 netmask 255.255.255.255 dns static (Outside,PublicServers) 10.1.9.51 61.x.x.51 netmask 255.255.255.255 dns static (PublicServers,Outside) 61.x.x.51 10.1.9.51 netmask 255.255.255.255 dns static (Outside,PublicServers) 10.1.9.56 61.x.x.56 netmask 255.255.255.255 dns static (PublicServers,Outside) 61.x.x.56 10.1.9.56 netmask 255.255.255.255 dns access-group Outside_access_in in interface Outside route Outside 0.0.0.0 0.0.0.0 61.x.x.33 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute group-policy VPNGroup1 internal group-policy VPNGroup1 attributes dns-server value 61.x.x..35 61.x.x.41 split-tunnel-policy tunnelspecified split-tunnel-network-list value VPNGroup1_splitTunnelAcl webvpn username xxx password xxx encrypted privilege 15 username xxx attributes vpn-group-policy VPNGroup1 webvpn username xxx password xxx encrypted privilege 15 http server enable http 10.1.10.0 255.255.255.0 Inside http 192.168.1.0 255.255.255.0 management no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto dynamic-map Inside_dyn_map 20 set transform-set ESP-3DES-SHA crypto map Inside_map 65535 ipsec-isakmp dynamic Inside_dyn_map crypto map Inside_map interface Inside isakmp enable Inside isakmp policy 10 authentication pre-share isakmp policy 10 encryption 3des isakmp policy 10 hash sha isakmp policy 10 group 2 isakmp policy 10 lifetime 86400 tunnel-group VPNGroup1 type ipsec-ra tunnel-group VPNGroup1 general-attributes address-pool VPNPool default-group-policy VPNGroup1 tunnel-group VPNGroup1 ipsec-attributes pre-shared-key * telnet 0.0.0.0 0.0.0.0 Inside telnet 192.168.1.0 255.255.255.0 management telnet timeout 20 ssh timeout 5 console timeout 0 dhcpd address 192.168.1.2-192.168.1.254 management dhcpd lease 3600 dhcpd ping_timeout 50 dhcpd enable management ! class-map inspection_default match default-inspection-traffic ! ! policy-map global_policy class inspection_default inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect icmp inspect esmtp inspect dns maximum-length 2048 ! service-policy global_policy global Cryptochecksum: : end