I did attach it. I'm not sure what happened to it. The attachment is listed but I can't click on it. Anyway, I used the Spoke-to-Spoke VPN example and got most of the functionality up - minus the VPN (either the static tunnel between two sites or remote client connectivity). Here's what I've got so far:
PIX Version 7.0(1)
ip address dhcp setroute
ip address 10.0.0.1 255.255.255.0
no ip address
enable password 9m1XNkMOusyr8J7t encrypted
passwd 9m1XNkMOusyr8J7t encrypted
boot system flash:/pix701.bin
ftp mode passive
same-security-traffic permit intra-interface
access-list 100 extended permit ip 10.0.0.0 255.255.255.0 184.108.40.206 255.255.255.0
access-list nonat extended permit ip 10.0.0.0 255.255.255.0 220.127.116.11 255.255.255.0
access-list outside_access_in extended permit tcp any any eq ssh
access-list 101 standard permit any
pager lines 24
logging console informational
logging monitor informational
logging buffered informational
mtu outside 1500
mtu inside 1500
mtu dmz 1500
ip local pool vpnpool 10.0.1.1-10.0.1.20
asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 10.0.0.0 255.255.255.0
access-group outside_access_in in interface outside
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...