Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- : Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cor es)
- :
- ASA Version 9.5(2)
- !
- ip local pool VPNPOOL 10.100.0.150-10.100.0.254 mask 255.255.255.0
- !
- interface GigabitEthernet1/1
- nameif outside
- security-level 0
- ip address [MY PUBLIC IP ADDRESS] 255.255.255.248
- !
- interface GigabitEthernet1/2
- nameif inside
- security-level 100
- ip address 10.40.0.2 255.255.255.0
- !
- interface GigabitEthernet1/3
- shutdown
- no nameif
- no security-level
- no ip address
- !
- interface GigabitEthernet1/4
- shutdown
- no nameif
- no security-level
- no ip address
- !
- interface GigabitEthernet1/5
- shutdown
- no nameif
- no security-level
- no ip address
- !
- interface GigabitEthernet1/6
- shutdown
- no nameif
- no security-level
- no ip address
- !
- interface GigabitEthernet1/7
- shutdown
- no nameif
- no security-level
- no ip address
- !
- interface GigabitEthernet1/8
- shutdown
- no nameif
- no security-level
- no ip address
- !
- interface Management1/1
- management-only
- no nameif
- no security-level
- no ip address
- !
- ftp mode passive
- same-security-traffic permit intra-interface
- object network obj_10.40.0.0
- subnet 10.40.0.0 255.255.0.0
- object network VPN_object
- range 10.100.0.150 10.100.0.254
- object network VPN_OBJECT
- object network RAT_SRV
- host 10.40.0.20
- access-list VPN_SplitTunnel extended permit ip 10.100.0.0 255.255.255.0 10.40.0. 0 255.255.0.0
- access-list SFR extended permit ip any any
- access-list VPN standard permit 10.40.0.0 255.255.0.0
- access-list VPN standard permit 10.100.0.0 255.255.255.0
- access-list inbound extended permit tcp any object RAT_SRV eq 4782
- pager lines 24
- logging asdm informational
- mtu outside 1500
- mtu inside 1500
- icmp unreachable rate-limit 1 burst-size 1
- no asdm history enable
- arp timeout 14400
- no arp permit-nonconnected
- nat (inside,outside) source static obj_10.40.0.0 obj_10.40.0.0 destination stati c VPN_object VPN_object no-proxy-arp route-lookup
- nat (inside,any) source static obj_10.40.0.0 obj_10.40.0.0 destination static VP N_object VPN_object no-proxy-arp route-lookup
- nat (outside,outside) source static VPN_object VPN_object destination static VPN _object VPN_object no-proxy-arp route-lookup
- !
- object network obj_10.40.0.0
- nat (inside,outside) dynamic interface
- object network RAT_SRV
- nat (inside,outside) static interface service tcp 4782 4782
- route outside 0.0.0.0 0.0.0.0 [MY PUBLIC IP ADDRESS] 1
- route inside 10.40.1.0 255.255.255.0 10.40.0.1 1
- route inside 10.100.0.0 255.255.255.0 10.40.0.1 1
- timeout xlate 3:00:00
- timeout pat-xlate 0:00:30
- timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
- timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
- timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
- timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
- timeout tcp-proxy-reassembly 0:01:00
- timeout floating-conn 0:00:00
- user-identity default-domain LOCAL
- aaa authentication telnet console LOCAL
- http server enable
- http 10.40.0.0 255.255.255.0 inside
- no snmp-server location
- no snmp-server contact
- service sw-reset-button
- crypto ipsec security-association pmtu-aging infinite
- crypto ca trustpool policy
- telnet 10.100.0.0 255.255.255.0 outside
- telnet 10.40.0.0 255.255.255.0 inside
- telnet 10.100.0.0 255.255.255.0 inside
- telnet timeout 5
- no ssh stricthostkeycheck
- ssh timeout 5
- ssh key-exchange group dh-group1-sha1
- console timeout 0
- management-access inside
- dhcpd auto_config outside
- !
- threat-detection basic-threat
- threat-detection statistics access-list
- no threat-detection statistics tcp-intercept
- ntp server 10.40.0.1
- webvpn
- enable outside
- anyconnect image disk0:/anyconnect-win-3.1.14018-k9.pkg 1
- anyconnect enable
- tunnel-group-list enable
- cache
- disable
- error-recovery disable
- group-policy GroupPolicy_test internal
- group-policy GroupPolicy_test attributes
- wins-server none
- dns-server value 8.8.8.8
- vpn-tunnel-protocol ssl-client
- default-domain none
- group-policy Any_Connect internal
- group-policy Any_Connect attributes
- dns-server value 163.121.128.134 163.121.128.135
- vpn-tunnel-protocol ssl-client ssl-clientless
- split-tunnel-policy tunnelspecified
- split-tunnel-network-list value VPN
- address-pools value VPNPOOL
- dynamic-access-policy-record DfltAccessPolicy
- username admin password --- encrypted privilege 15
- username user password --- encrypted privilege 15
- username user attributes
- vpn-group-policy Any_Connect
- vpn-simultaneous-logins 25
- tunnel-group Any_connecy type remote-access
- tunnel-group Any_connecy general-attributes
- address-pool VPNPOOL
- default-group-policy Any_Connect
- tunnel-group Any_connecy webvpn-attributes
- group-alias Aphrodite enable
- tunnel-group test type remote-access
- tunnel-group test general-attributes
- address-pool VPNPOOL
- default-group-policy GroupPolicy_test
- tunnel-group test webvpn-attributes
- group-alias test enable
- !
- class-map SFR
- match access-list SFR
- class-map inspection_default
- match default-inspection-traffic
- !
- !
- policy-map type inspect dns preset_dns_map
- parameters
- message-length maximum client auto
- message-length maximum 512
- policy-map global_policy
- class inspection_default
- inspect dns preset_dns_map
- inspect ftp
- inspect h323 h225
- inspect h323 ras
- inspect rsh
- inspect rtsp
- inspect esmtp
- inspect sqlnet
- inspect skinny
- inspect sunrpc
- inspect xdmcp
- inspect sip
- inspect netbios
- inspect tftp
- inspect ip-options
- inspect icmp
- class SFR
- sfr fail-open monitor-only
- !
- service-policy global_policy global
- prompt hostname context
- no call-home reporting anonymous
Advertisement
Add Comment
Please, Sign In to add comment