Advertisement
Guest User

cisco-conf

a guest
Aug 4th, 2015
644
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.23 KB | None | 0 0
  1. Result of the command: "show running-config"
  2.  
  3. : Saved
  4. :
  5. ASA Version 8.2(5)
  6. !
  7. hostname FIKECO-ASA
  8. domain-name fikeco.com
  9. enable password NXB79dLT.35virei encrypted
  10. passwd NXB79dLT.35virei encrypted
  11. names
  12. name 192.168.0.210 dvr
  13. !
  14. interface Ethernet0/0
  15. switchport access vlan 2
  16. !
  17. interface Ethernet0/1
  18. !
  19. interface Ethernet0/2
  20. !
  21. interface Ethernet0/3
  22. !
  23. interface Ethernet0/4
  24. !
  25. interface Ethernet0/5
  26. !
  27. interface Ethernet0/6
  28. !
  29. interface Ethernet0/7
  30. !
  31. interface Vlan1
  32. nameif inside
  33. security-level 100
  34. ip address 192.168.0.254 255.255.255.0
  35. !
  36. interface Vlan2
  37. nameif outside
  38. security-level 0
  39. pppoe client vpdn group fikeco
  40. ip address pppoe setroute
  41. !
  42. ftp mode passive
  43. dns server-group DefaultDNS
  44. domain-name fikeco.com
  45. object-group protocol TCPUDP
  46. protocol-object udp
  47. protocol-object tcp
  48. object-group service camera-port1 tcp-udp
  49. description camera
  50. port-object eq 4000
  51. object-group service camera-port2 tcp-udp
  52. description camera port 1600
  53. port-object eq 1600
  54. object-group service DM_INLINE_TCPUDP_1 tcp-udp
  55. group-object camera-port1
  56. group-object camera-port2
  57. access-list NAT0 extended permit ip 192.168.0.0 255.255.255.0 10.50.99.0 255.255.255.0
  58. access-list 100 extended permit ip 192.168.0.0 255.255.255.0 10.50.99.0 255.255.255.0
  59. access-list outside_access_in extended permit tcp any any eq ftp
  60. access-list outside_access_in remark tcp 4000 & 1600
  61. access-list outside_access_in extended permit object-group TCPUDP any host dvr object-group DM_INLINE_TCPUDP_1
  62. pager lines 24
  63. logging asdm informational
  64. mtu inside 1500
  65. mtu outside 1500
  66. icmp unreachable rate-limit 1 burst-size 1
  67. no asdm history enable
  68. arp timeout 14400
  69. global (outside) 1 interface
  70. nat (inside) 0 access-list NAT0
  71. nat (inside) 1 0.0.0.0 0.0.0.0
  72. static (inside,outside) interface dvr netmask 255.255.255.255
  73. access-group outside_access_in in interface outside
  74. timeout xlate 3:00:00
  75. timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
  76. timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
  77. timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
  78. timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
  79. timeout tcp-proxy-reassembly 0:01:00
  80. timeout floating-conn 0:00:00
  81. dynamic-access-policy-record DfltAccessPolicy
  82. http server enable
  83. http 192.168.1.0 255.255.255.0 inside
  84. http 192.168.0.0 255.255.255.0 inside
  85. no snmp-server location
  86. no snmp-server contact
  87. snmp-server enable traps snmp authentication linkup linkdown coldstart
  88. crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
  89. crypto ipsec security-association lifetime seconds 28800
  90. crypto ipsec security-association lifetime kilobytes 4608000
  91. crypto map FIKECO 10 match address 100
  92. crypto map FIKECO 10 set peer 64.191.190.30
  93. crypto map FIKECO 10 set transform-set ESP-3DES-SHA
  94. crypto map FIKECO interface outside
  95. crypto isakmp enable outside
  96. crypto isakmp policy 10
  97. authentication pre-share
  98. encryption 3des
  99. hash sha
  100. group 2
  101. lifetime 86400
  102. telnet 192.168.0.0 255.255.255.0 inside
  103. telnet timeout 5
  104. ssh 0.0.0.0 0.0.0.0 outside
  105. ssh timeout 5
  106. console timeout 0
  107. vpdn group fikeco request dialout pppoe
  108. vpdn group fikeco localname fikeco@bellsouth.net
  109. vpdn group fikeco ppp authentication pap
  110. vpdn username fikeco@bellsouth.net password *****
  111. dhcpd auto_config outside
  112. !
  113. dhcpd address 192.168.0.5-192.168.0.132 inside
  114. dhcpd enable inside
  115. !
  116.  
  117. threat-detection basic-threat
  118. threat-detection statistics access-list
  119. no threat-detection statistics tcp-intercept
  120. webvpn
  121. username admin password encrypted
  122. tunnel-group 64.191.190.30 type ipsec-l2l
  123. tunnel-group 64.191.190.30 ipsec-attributes
  124. pre-shared-key *****
  125. !
  126. !
  127. prompt hostname context
  128. no call-home reporting anonymous
  129. call-home
  130. profile CiscoTAC-1
  131. no active
  132. destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  133. destination address email callhome@cisco.com
  134. destination transport-method http
  135. subscribe-to-alert-group diagnostic
  136. subscribe-to-alert-group environment
  137. subscribe-to-alert-group inventory periodic monthly
  138. subscribe-to-alert-group configuration periodic monthly
  139. subscribe-to-alert-group telemetry periodic daily
  140. Cryptochecksum:5cf29851c74641a4317016c6f4022572
  141. : end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement