: Saved : ASA Version 8.2(1) ! hostname ciscoasa enable password xxxxxxxxxxxx encrypted passwd xxxxxxxxxxxx encrypted names name 10.20.30.0 RUSSIA_BACKUP name a.b.c.d russia_ip name 10.89.54.0 rkacc_lan ! interface GigabitEthernet0/0 nameif RKACC_NETWORK security-level 100 ip address 10.89.48.254 255.255.255.0 ! interface GigabitEthernet0/1 shutdown nameif dmz security-level 0 ip address dhcp ! interface GigabitEthernet0/2 shutdown no nameif no security-level no ip address ! interface GigabitEthernet0/3 shutdown no nameif no security-level no ip address ! interface Management0/0 nameif External_Connection security-level 10 ip address e.f.g.h 255.255.255.248 ! boot system disk0:/asa821-k8.bin ftp mode passive same-security-traffic permit intra-interface object-group network DM_INLINE_NETWORK_1 network-object 10.89.48.0 255.255.255.0 network-object rkacc_lan 255.255.255.0 object-group network DM_INLINE_NETWORK_2 network-object 10.89.48.0 255.255.255.0 network-object rkacc_lan 255.255.255.0 object-group network DM_INLINE_NETWORK_3 network-object 10.89.48.0 255.255.255.0 network-object rkacc_lan 255.255.255.0 access-list 100 extended permit ip object-group DM_INLINE_NETWORK_1 RUSSIA_BACKUP 255.255.255.0 access-list nonat extended permit ip object-group DM_INLINE_NETWORK_3 RUSSIA_BACKUP 255.255.255.0 access-list RKACC_NETWORK_access_in extended permit ip object-group DM_INLINE_NETWORK_2 RUSSIA_BACKUP 255.255.255.0 access-list External_Connection_access_in extended permit ip host russia_ip any access-list External_Connection_access_in extended permit ip RUSSIA_BACKUP 255.255.255.0 any pager lines 24 logging enable logging asdm informational mtu RKACC_NETWORK 1500 mtu External_Connection 1500 mtu dmz 1500 no failover icmp unreachable rate-limit 1 burst-size 1 icmp permit any RKACC_NETWORK asdm image disk0:/asdm-621.bin no asdm history enable arp timeout 14400 global (External_Connection) 101 interface nat (RKACC_NETWORK) 0 access-list nonat nat (RKACC_NETWORK) 101 10.89.48.0 255.255.255.0 access-group RKACC_NETWORK_access_in in interface RKACC_NETWORK access-group External_Connection_access_in in interface External_Connection ! router rip version 2 ! route External_Connection 0.0.0.0 0.0.0.0 212.59.7.33 1 route RKACC_NETWORK rkacc_lan 255.255.255.0 10.89.48.1 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 dynamic-access-policy-record DfltAccessPolicy aaa authentication ssh console LOCAL aaa authentication telnet console LOCAL http server enable http 10.89.48.0 255.255.255.0 RKACC_NETWORK http rkacc_lan 255.255.255.0 RKACC_NETWORK http e.f.g.h 255.255.255.255 External_Connection no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec transform-set SETAS esp-3des esp-sha-hmac crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 crypto map outside_map 20 match address 100 crypto map outside_map 20 set peer russia_ip crypto map outside_map 20 set transform-set ESP-3DES-SHA SETAS ESP-3DES-MD5 crypto map outside_map interface External_Connection crypto isakmp enable RKACC_NETWORK crypto isakmp enable External_Connection crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 telnet rkacc_lan 255.255.255.0 RKACC_NETWORK telnet 10.89.48.0 255.255.255.0 RKACC_NETWORK telnet 213.197.165.82 255.255.255.255 External_Connection telnet timeout 5 ssh 213.197.165.82 255.255.255.255 External_Connection ssh timeout 5 console timeout 0 management-access RKACC_NETWORK threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept webvpn username giedrius password V/CgGxlLtupE2ZHZ encrypted privilege 15 tunnel-group a.b.c.d type ipsec-l2l tunnel-group a.b.c.d ipsec-attributes pre-shared-key * ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp ! service-policy global_policy global prompt hostname context Cryptochecksum:faeb1c29f7cdbf3848ac12361a9d6a99 : end asdm image disk0:/asdm-621.bin asdm location RUSSIA_BACKUP 255.255.255.0 RKACC_NETWORK asdm location russia_ip 255.255.255.255 RKACC_NETWORK asdm location rkacc_lan 255.255.255.0 RKACC_NETWORK no asdm history enable