Result of the command: "sh run" : Saved : ASA Version 8.0(3) ! hostname VIN-FW-001 ! interface Vlan2 nameif outside security-level 0 ip address ******** 255.255.255.240 ! interface Vlan100 nameif NOC security-level 100 ip address 192.168.12.1 255.255.255.0 ! interface Vlan200 nameif QA security-level 50 ip address 192.168.14.1 255.255.255.0 ! interface Vlan300 nameif DEV security-level 50 ip address 192.168.15.1 255.255.255.0 ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 switchport access vlan 200 ! interface Ethernet0/2 switchport access vlan 200 ! interface Ethernet0/3 switchport access vlan 300 ! interface Ethernet0/4 switchport access vlan 100 ! interface Ethernet0/5 switchport access vlan 100 ! interface Ethernet0/6 switchport access vlan 100 ! interface Ethernet0/7 switchport access vlan 100 ! regex infopeer ".*info_hash.*" boot system disk0:/ASA8.03version ftp mode passive clock timezone IST 5 30 dns domain-lookup outside dns server-group DefaultDNS name-server 192.168.12.20 name-server 192.168.10.100 same-security-traffic permit intra-interface object-group service RDC service-object tcp eq 3389 object-group network DM_INLINE_NETWORK_1 network-object 192.168.10.0 255.255.255.0 network-object 192.168.100.0 255.255.255.0 network-object 192.168.200.0 255.255.255.0 object-group network DM_INLINE_NETWORK_2 network-object 192.168.10.0 255.255.255.0 network-object 192.168.100.0 255.255.255.0 network-object 192.168.200.0 255.255.255.0 object-group service UDPMiami udp port-object eq 4500 port-object eq isakmp object-group service OutlookAccess service-object tcp eq 495 service-object tcp eq 995 object-group icmp-type DM_INLINE_ICMP_1 icmp-object echo-reply icmp-object time-exceeded object-group service Syslog udp description Syslog ports port-object eq 1514 port-object eq syslog object-group service WEBSYSLOG tcp description WEB Port for Syslog Server port-object eq 8500 network-object host RwandaFirewall network-object host KenyaFirewall network-object host DCFirewall object-group network DM_INLINE_NETWORK_3 network-object host ******* network-object host ******* object-group network DM_INLINE_NETWORK_4 network-object 192.168.10.0 255.255.255.0 network-object 192.168.100.0 255.255.255.0 network-object 192.168.200.0 255.255.255.0 network-object 192.168.11.0 255.255.255.0 object-group network DM_INLINE_NETWORK_5 network-object 192.168.50.0 255.255.255.0 network-object 192.168.51.0 255.255.255.0 network-object 192.168.52.0 255.255.255.0 network-object 192.168.53.0 255.255.255.0 object-group network DM_INLINE_NETWORK_6 network-object 192.168.14.0 255.255.255.0 network-object 192.168.15.0 255.255.255.0 object-group icmp-type DM_INLINE_ICMP_3 icmp-object echo-reply icmp-object time-exceeded object-group service DM_INLINE_TCP_1 tcp port-object eq ftp port-object eq ftp-data object-group service ICQ tcp port-object eq aol object-group service DM_INLINE_TCP_2 tcp port-object eq www port-object eq https group-object ICQ object-group service GoogleEmailPOP tcp description POP port-object eq 995 object-group service GoogleEmailSMTP tcp description SMTP port-object eq 465 access-list outside_1_cryptomap extended permit ip 192.168.12.0 255.255.255.0 object-group DM_INLINE_NETWORK_1 access-list VPN extended permit ip 192.168.12.0 255.255.255.0 192.168.51.0 255.255.255.0 access-list VPN extended permit ip 192.168.12.0 255.255.255.0 192.168.50.0 255.255.255.0 access-list VPN extended permit ip 192.168.12.0 255.255.255.0 192.168.53.0 255.255.255.0 access-list VPN extended permit ip 192.168.12.0 255.255.255.0 192.168.52.0 255.255.255.0 access-list VPN extended permit ip 192.168.12.0 255.255.255.0 192.168.11.0 255.255.255.0 access-list VPN extended permit ip 192.168.12.0 255.255.255.0 192.168.13.0 255.255.255.0 access-list VPN extended permit ip 192.168.12.0 255.255.255.0 object-group DM_INLINE_NETWORK_1 access-list VPN extended permit ip 192.168.12.0 255.255.255.0 object-group DM_INLINE_NETWORK_2 access-list outside_access_in extended permit tcp any interface outside eq ssh access-list outside_access_in_1 extended permit esp host ************** any access-list outside_access_in_1 extended permit tcp any host ******* eq ftp-data access-list outside_access_in_1 extended permit tcp any host ******* eq ftp access-list outside_access_in_1 extended permit icmp any any object-group DM_INLINE_ICMP_1 access-list outside_access_in_1 extended permit tcp any host ******* eq 8500 access-list outside_access_in_1 extended permit udp object-group ************ host ************** object-group Syslog access-list outside_access_in_1 extended permit icmp object-group ************** host ************* access-list outside_access_in_1 extended permit icmp host *********** object-group DM_INLINE_NETWORK_3 access-list outside_3_cryptomap extended permit ip 192.168.12.0 255.255.255.0 192.168.52.0 255.255.255.0 access-list outside_3_cryptomap extended permit ip 192.168.12.0 255.255.255.0 192.168.53.0 255.255.255.0 access-list outside_3_cryptomap extended permit ip 192.168.13.0 255.255.255.0 192.168.52.0 255.255.255.0 access-list outside_3_cryptomap extended permit ip 192.168.13.0 255.255.255.0 192.168.53.0 255.255.255.0 access-list outside_4_cryptomap extended permit ip 192.168.12.0 255.255.255.0 192.168.11.0 255.255.255.0 access-list outside_cryptomap_2 extended permit ip 192.168.12.0 255.255.255.0 192.168.51.0 255.255.255.0 access-list outside_cryptomap_2 extended permit ip 192.168.12.0 255.255.255.0 192.168.50.0 255.255.255.0 access-list outside_cryptomap_2 extended permit ip 192.168.13.0 255.255.255.0 192.168.50.0 255.255.255.0 access-list outside_cryptomap_2 extended permit ip 192.168.13.0 255.255.255.0 192.168.51.0 255.255.255.0 access-list outside_nat0_outbound extended permit ip 192.168.13.0 255.255.255.0 192.168.50.0 255.255.255.0 access-list outside_nat0_outbound extended permit ip 192.168.13.0 255.255.255.0 192.168.51.0 255.255.255.0 access-list outside_nat0_outbound extended permit ip 192.168.13.0 255.255.255.0 192.168.52.0 255.255.255.0 access-list outside_nat0_outbound extended permit ip 192.168.13.0 255.255.255.0 192.168.53.0 255.255.255.0 access-list outside_nat0_outbound extended permit ip 192.168.13.0 255.255.255.0 192.168.10.0 255.255.255.0 access-list outside_nat0_outbound extended permit ip 192.168.13.0 255.255.255.0 192.168.100.0 255.255.255.0 access-list outside_nat0_outbound extended permit ip 192.168.13.0 255.255.255.0 192.168.200.0 255.255.255.0 access-list outside_1_cryptomap_1 extended permit ip 192.168.12.0 255.255.255.0 object-group DM_INLINE_NETWORK_2 access-list outside_1_cryptomap_1 extended permit ip 192.168.13.0 255.255.255.0 object-group DM_INLINE_NETWORK_2 access-list NOC_nat0_outbound extended permit ip 192.168.12.0 255.255.255.0 object-group DM_INLINE_NETWORK_4 access-list NOC_nat0_outbound extended permit ip 192.168.12.0 255.255.255.0 object-group DM_INLINE_NETWORK_5 access-list NOC_nat0_outbound extended permit ip 192.168.12.0 255.255.255.0 object-group DM_INLINE_NETWORK_6 access-list DEV_nat0_outbound extended permit ip 192.168.15.0 255.255.255.0 192.168.12.0 255.255.255.0 access-list QA_nat0_outbound extended permit ip 192.168.14.0 255.255.255.0 192.168.12.0 255.255.255.0 access-list QA_access_in extended permit ip 192.168.14.0 255.255.255.0 host 192.168.12.20 access-list QA_access_in extended permit tcp any host ********* object-group DM_INLINE_TCP_1 access-list QA_access_in extended permit tcp any any object-group DM_INLINE_TCP_2 access-list QA_access_in extended permit tcp any host ********** object-group GoogleEmailPOP access-list QA_access_in extended permit tcp any host ********** object-group GoogleEmailSMTP access-list QA_access_in extended deny ip 192.168.14.0 255.255.255.0 192.168.12.0 255.255.255.0 access-list QA_access_in extended deny ip 192.168.14.0 255.255.255.0 192.168.15.0 255.255.255.0 access-list DEV_access_in extended permit icmp 192.168.15.0 255.255.255.0 192.168.12.0 255.255.255.0 object-group DM_INLINE_ICMP_3 access-list DEV_access_in extended permit ip 192.168.15.0 255.255.255.0 host 192.168.12.20 pager lines 24 logging enable logging timestamp logging trap informational logging asdm informational mtu outside 1500 mtu NOC 1500 mtu QA 1500 mtu DEV 1500 ip local pool VPNPool 192.168.13.1-192.168.13.50 mask 255.255.255.0 no failover icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-603.bin no asdm history enable arp timeout 14400 global (outside) 1 ********** netmask 255.255.255.240 global (outside) 1 interface nat (outside) 0 access-list outside_nat0_outbound outside nat (NOC) 0 access-list NOC_nat0_outbound nat (NOC) 1 192.168.12.0 255.255.255.0 nat (QA) 0 access-list QA_nat0_outbound nat (QA) 1 192.168.14.0 255.255.255.0 nat (DEV) 0 access-list DEV_nat0_outbound nat (DEV) 1 192.168.15.0 255.255.255.0 static (NOC,outside) ********** 192.168.12.108 netmask 255.255.255.255 static (NOC,outside) ********** 192.168.12.105 netmask 255.255.255.255 static (NOC,outside) ********** 192.168.12.120 netmask 255.255.255.255 static (NOC,outside) ********** 192.168.12.121 netmask 255.255.255.255 static (NOC,outside) ********** 192.168.12.101 netmask 255.255.255.255 static (NOC,outside) ********** 192.168.12.20 netmask 255.255.255.255 access-group outside_access_in_1 in interface outside access-group QA_access_in in interface QA access-group DEV_access_in in interface DEV route outside 0.0.0.0 0.0.0.0 ********* 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout uauth 0:05:00 absolute dynamic-access-policy-record DfltAccessPolicy aaa authentication ssh console LOCAL http server enable http DCFirewall 255.255.255.255 outside http 192.168.10.0 255.255.255.0 outside http 192.168.12.0 255.255.255.0 NOC snmp-server host NOC 192.168.12.101 community V0x1v@ udp-port 161 no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5 crypto map outside_map 1 match address outside_1_cryptomap_1 crypto map outside_map 1 set pfs crypto map outside_map 1 set peer DCFirewall crypto map outside_map 1 set transform-set ESP-3DES-MD5 crypto map outside_map 2 match address outside_cryptomap_2 crypto map outside_map 2 set pfs crypto map outside_map 2 set peer RwandaFirewall crypto map outside_map 2 set transform-set ESP-DES-MD5 crypto map outside_map 3 match address outside_3_cryptomap crypto map outside_map 3 set pfs crypto map outside_map 3 set peer KenyaFirewall crypto map outside_map 3 set transform-set ESP-DES-MD5 crypto map outside_map 4 match address outside_4_cryptomap crypto map outside_map 4 set pfs crypto map outside_map 4 set peer ************** crypto map outside_map 4 set transform-set ESP-DES-MD5 crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP crypto map outside_map interface outside crypto isakmp enable outside crypto isakmp policy 10 authentication pre-share encryption des hash md5 group 2 lifetime 86400 crypto isakmp policy 20 authentication pre-share encryption 3des hash md5 group 2 lifetime 86400 telnet timeout 5 ssh 0.0.0.0 0.0.0.0 outside ssh DCFirewall 255.255.255.255 outside ssh 192.168.10.0 255.255.255.0 outside ssh 192.168.14.0 255.255.255.0 QA ssh 192.168.15.0 255.255.255.0 DEV ssh timeout 30 ssh version 2 console timeout 0 management-access NOC dhcpd auto_config outside ! dhcpd address 192.168.14.2-192.168.14.50 QA dhcpd dns 192.168.12.20 192.168.10.100 interface QA dhcpd enable QA ! threat-detection basic-threat threat-detection statistics webvpn enable outside svc enable tunnel-group-list enable group-policy ******** internal group-policy ******** attributes banner value Welcome in ************ dns-server value 192.168.12.20 192.168.10.100 vpn-tunnel-protocol IPSec svc default-domain value******************* group-policy ************** internal group-policy ************** attributes banner value Welcome in **************** vpn-tunnel-protocol webvpn webvpn url-list value WEBVPN tunnel-group *********** type ipsec-l2l tunnel-group *********** ipsec-attributes pre-shared-key * tunnel-group *********** type ipsec-l2l tunnel-group *********** ipsec-attributes pre-shared-key * tunnel-group *********** type ipsec-l2l tunnel-group *********** ipsec-attributes pre-shared-key * tunnel-group *********** type ipsec-l2l tunnel-group *********** ipsec-attributes pre-shared-key * tunnel-group ********** type remote-access tunnel-group *********** general-attributes address-pool VPNPool default-group-policy *********** tunnel-group *********** webvpn-attributes group-alias WEBVPN enable tunnel-group *********** ipsec-attributes pre-shared-key * tunnel-group ************ type remote-access tunnel-group ************ general-attributes default-group-policy ************** tunnel-group ************* webvpn-attributes group-alias ************* enable tunnel-group IPSECWEBVPN type remote-access tunnel-group IPSECWEBVPN general-attributes address-pool VPNPool default-group-policy ************* ! class-map altogether match port tcp eq www class-map inspection_default match default-inspection-traffic class-map type regex match-any regcmap match regex infopeer class-map type inspect http match-all inscmap match request method get match request args regex class regcmap class-map P2P match port tcp eq www ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map type inspect http inspol parameters class inscmap drop-connection log policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp policy-map altogether class altogether inspect http inspol policy-map type inspect http P2P_HTTP parameters match request uri regex _default_gator drop-connection log match request uri regex _default_x-kazaa-network drop-connection log policy-map P2P class P2P inspect http P2P_HTTP ! service-policy global_policy global service-policy P2P interface outside : end