ASA Version 7.2(4) ! hostname asafirewall domain-name default.domain.invalid enable password xxxxxxxx encrypted passwd xxxxxxxx encrypted names dns-guard ! interface Ethernet0/0 nameif OUTSIDE security-level 0 ip address xx.xx.xx.xx 255.255.255.240 ! interface Ethernet0/1 nameif INSIDE security-level 100 ip address 10.0.0.247 255.255.255.0 ! interface Ethernet0/2 shutdown no nameif no security-level no ip address ! interface Ethernet0/3 shutdown no nameif no security-level no ip address ! interface Management0/0 nameif management security-level 100 ip address 192.168.1.1 255.255.255.0 management-only ! boot system disk0:/asa724-k8.bin ftp mode passive clock timezone GMT/BST 0 clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00 dns server-group DefaultDNS domain-name default.domain.invalid same-security-traffic permit intra-interface access-list INSIDE_nat0_outbound extended permit ip any 10.0.0.128 255.255.255.128 access-list INSIDE_nat0_outbound extended permit ip 10.0.0.0 255.255.255.0 192.168.3.0 255.255.255.0 access-list OUTSIDE_access_in extended permit icmp any any echo-reply access-list OUTSIDE_access_in extended permit tcp any host xx.xx.xx.xx eq https access-list OUTSIDE_access_in extended permit tcp any host xx.xx.xx.xx eq www access-list OUTSIDE_cryptomap_20 extended permit ip 10.0.0.0 255.255.255.0 192.168.3.0 255.255.255.0 pager lines 24 logging enable logging asdm informational mtu OUTSIDE 1500 mtu INSIDE 1500 mtu management 1500 ip local pool vpnpool 192.168.10.1-192.168.10.254 mask 255.255.255.0 no failover icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-524.bin asdm location 10.0.0.173 255.255.255.255 INSIDE no asdm history enable arp timeout 14400 global (OUTSIDE) 10 interface nat (OUTSIDE) 10 192.168.10.0 255.255.255.0 nat (INSIDE) 0 access-list INSIDE_nat0_outbound nat (INSIDE) 10 0.0.0.0 0.0.0.0 static (INSIDE,OUTSIDE) xx.xx.xx.xx 10.0.0.173 netmask 255.255.255.255 access-group OUTSIDE_access_in in interface OUTSIDE route OUTSIDE 0.0.0.0 0.0.0.0 xx.xx.xx.xx 1 route INSIDE 192.168.100.0 255.255.255.0 10.0.0.1 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute aaa authorization command LOCAL http server enable http 10.0.0.0 255.255.255.0 INSIDE http 192.168.1.0 255.255.255.0 management no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac crypto dynamic-map OUTSIDE_dyn_map 20 set transform-set ESP-3DES-SHA crypto map OUTSIDE_map 20 match address OUTSIDE_cryptomap_20 crypto map OUTSIDE_map 20 set peer xx.xx.xx.xx crypto map OUTSIDE_map 20 set transform-set ESP-3DES-MD5 crypto map OUTSIDE_map 65535 ipsec-isakmp dynamic OUTSIDE_dyn_map crypto map OUTSIDE_map interface OUTSIDE crypto isakmp identity hostname crypto isakmp enable OUTSIDE crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 crypto isakmp policy 20 authentication pre-share encryption des hash md5 group 2 lifetime 86400 crypto isakmp policy 30 authentication pre-share encryption 3des hash md5 group 2 lifetime 86400 telnet 10.0.0.0 255.255.255.0 INSIDE telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd address 192.168.1.2-192.168.1.254 management dhcpd enable management ! ntp server 192.43.244.18 source OUTSIDE group-policy vpnpolicy internal group-policy vpnpolicy attributes dns-server value 10.0.0.171 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelall default-domain value strawberry.strawberrygt.com tunnel-group xx.xx.xx.xx type ipsec-l2l tunnel-group xx.xx.xx.xx ipsec-attributes pre-shared-key xxxxxxxx tunnel-group vpnclient type ipsec-ra tunnel-group vpnclient general-attributes address-pool vpnpool default-group-policy vpnpolicy tunnel-group vpnclient ipsec-attributes pre-shared-key xxxxxx isakmp ikev1-user-authentication none ! ! prompt hostname context Cryptochecksum:xxxxxxxxxxx : end