Result of the command: "show running-config" : Saved : ASA Version 8.0(3) ! hostname ciscousa domain-name anyplace.com enable password xxxxxxxxxxx encrypted names ! interface Ethernet0/0 nameif outside security-level 0 ip address 172.16.1.2 255.255.255.0 ! interface Ethernet0/1 nameif inside security-level 100 ip address 192.168.0.3 255.255.255.0 ! interface Ethernet0/2 nameif dmz security-level 50 ip address 192.168.154.1 255.255.255.0 ! interface Ethernet0/3 shutdown no nameif no security-level no ip address ! interface Management0/0 nameif management security-level 100 ip address 192.168.1.1 255.255.255.0 management-only ! passwd xxxxxxx.xxxx encrypted ftp mode passive dns server-group DefaultDNS domain-name anyplace.com access-list dmz_access_in extended permit ip 192.168.154.0 255.255.255.0 192.168.0.0 255.255.255.0 pager lines 24 logging asdm informational mtu management 1500 mtu inside 1500 mtu outside 1500 mtu dmz 1500 icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-611.bin no asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 192.168.0.0 255.255.255.0 nat (inside) 1 0.0.0.0 0.0.0.0 nat (dmz) 1 192.168.154.0 255.255.255.0 static (dmz,outside) tcp 172.16.1.7 smtp 192.168.154.7 smtp netmask 255.255.255.255 static (dmz,outside) tcp 172.16.1.7 https 192.168.154.7 https netmask 255.255.255.255 static (inside,outside) udp 172.16.1.24 domain 192.168.0.4 domain netmask 255.255.255.255 static (inside,outside) tcp 172.16.1.24 https 192.168.0.4 https netmask 255.255.255.255 static (inside,dmz) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 access-group dmz_access_in in interface dmz route outside 0.0.0.0 0.0.0.0 172.16.1.1 1 route inside 129.0.0.0 255.0.0.0 192.168.0.2 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout uauth 0:05:00 absolute dynamic-access-policy-record DfltAccessPolicy http server enable http 192.168.0.0 255.255.255.0 inside http 192.168.1.0 255.255.255.0 management no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ca server shutdown no crypto isakmp nat-traversal vpn-addr-assign local reuse-delay 5 telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd address 192.168.1.2-192.168.1.254 management dhcpd enable management ! threat-detection basic-threat threat-detection statistics access-list ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp ! service-policy global_policy global prompt hostname context Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxxxxx : end