ciscoasa# sh run : Saved : ASA Version 8.0(4) ! hostname ciscoasa domain-name default.domain.invalid names ! interface Vlan1 nameif inside security-level 100 ip address 10.1.100.104 255.255.248.0 ! interface Vlan2 nameif outside security-level 0 ip address x.x.99.2 255.255.255.240 ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! ftp mode passive dns server-group DefaultDNS domain-name default.domain.invalid object-group protocol TCPUDP protocol-object udp protocol-object tcp access-list outside extended permit icmp any any access-list outside extended permit udp any interface outside eq sip access-list remote_access_splitTunnelAcl standard permit any access-list inside_nat0_outbound extended permit ip any 172.16.20.0 255.255.255. 224 access-list inside_nat0_outbound extended permit ip 10.1.96.0 255.255.248.0 172. 16.20.0 255.255.255.224 access-list remote_support_splitTunnelAcl standard permit 10.1.96.0 255.255.248. 0 pager lines 24 logging enable logging asdm informational mtu inside 1500 mtu outside 1500 ip local pool vpnpool 172.16.20.10-172.16.20.20 mask 255.255.255.0 icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-615.bin no asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list inside_nat0_outbound nat (inside) 1 0.0.0.0 0.0.0.0 static (inside,outside) udp interface sip 10.100.100.100 sip netmask 255.255.255 .255 access-group outside in interface outside route outside 0.0.0.0 0.0.0.0 x.x.99.1 1 route inside 10.0.0.0 255.0.0.0 10.1.96.1 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute dynamic-access-policy-record DfltAccessPolicy http server enable http 172.16.20.0 255.255.255.0 inside http 192.168.1.0 255.255.255.0 inside http 10.100.100.0 255.255.255.0 inside http 10.0.0.0 255.0.0.0 inside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 crypto dynamic-map outside_dyn_map 20 set pfs group1 crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA crypto dynamic-map outside_dyn_map 20 set security-association lifetime seconds 28800 crypto dynamic-map outside_dyn_map 20 set security-association lifetime kilobyte s 4608000 crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map crypto map outside_map interface outside crypto isakmp enable outside crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 no crypto isakmp nat-traversal telnet 10.100.100.0 255.255.255.0 inside telnet 10.0.0.0 255.0.0.0 inside telnet 172.16.20.0 255.255.255.0 inside telnet timeout 5 ssh timeout 5 console timeout 0 management-access inside dhcpd auto_config outside ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept group-policy remote_support internal group-policy remote_support attributes dns-server value 4.2.2.1 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value remote_support_splitTunnelAcl default-domain value cisco.com group-policy remote_access internal group-policy remote_access attributes dns-server value 4.2.2.1 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value remote_access_splitTunnelAcl default-domain value cisco.com username cns_access password gINLr.E9Hrx5koCq encrypted privilege 15 tunnel-group remote type remote-access tunnel-group remote general-attributes address-pool vpnpool default-group-policy remote_access tunnel-group remote ipsec-attributes pre-shared-key * tunnel-group remote type remote-access tunnel-group remote general-attributes address-pool vpnpool default-group-policy remote_support tunnel-group remote ipsec-attributes pre-shared-key * ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect netbios inspect tftp inspect sip ! service-policy global_policy global prompt hostname context Cryptochecksum:f640afcfffdc565e5f54e0b57503cfc4 : end