ASA Version 8.2(5) ! hostname SALMONARM enable password NuLKvvWGg.x9HEKO encrypted passwd NuLKvvWGg.x9HEKO encrypted names ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! interface Vlan1 nameif inside security-level 100 ip address 10.45.1.1 255.255.0.0 ! interface Vlan2 nameif outside security-level 0 ip address 192.168.0.216 255.255.255.0 ! banner motd WARNING: Authorized access only! banner motd WARNING: Authorized access only! ftp mode passive access-list inside_access_in extended permit icmp 10.45.0.0 255.255.0.0 any access-list inside_access_in extended permit ip 10.45.0.0 255.255.0.0 any access-list outside_access_in extended permit icmp any any access-list outside_access_in extended permit tcp any interface outside eq www access-list 100 extended permit ip 10.45.0.0 255.255.0.0 10.30.0.0 255.255.0.0 access-list NONAT extended permit ip 10.45.0.0 255.255.0.0 10.30.0.0 255.255.0.0 access-list Split_Tunnel_List_ACL remark *** NAT Access List *** access-list Split_Tunnel_List_ACL remark *** Split Tunnel Encrypted Traffic *** access-list Split_Tunnel_List_ACL standard permit 10.45.0.0 255.255.0.0 access-list inside_nat0_outside extended permit ip any 10.45.0.0 255.255.0.0 pager lines 24 logging enable logging asdm informational mtu outside 1500 mtu inside 1500 ip local pool mypool 10.45.99.100-10.45.99.200 mask 255.255.0.0 icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 10.45.0.0 255.255.0.0 nat (inside) 1 0.0.0.0 0.0.0.0 access-group outside_access_in in interface outside access-group inside_access_in in interface inside route outside 0.0.0.0 0.0.0.0 192.168.0.100 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy http server enable http 10.45.0.0 255.255.0.0 inside http 0.0.0.0 0.0.0.0 inside http 0.0.0.0 0.0.0.0 outside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set JONCOM_SET esp-des esp-sha-hmac crypto ipsec transform-set myset esp-3des esp-md5-hmac crypto ipsec security-association lifetime seconds 3600 crypto ipsec security-association lifetime kilobytes 4608000 crypto ipsec df-bit clear-df outside crypto dynamic-map dynmap 11 set pfs crypto dynamic-map dynmap 11 set transform-set myset crypto dynamic-map dynmap 11 set security-association lifetime seconds 86400 crypto dynamic-map dynmap 11 set security-association lifetime kilobytes 4600000 crypto map JONCOM_MAP 10 match address 100 crypto map JONCOM_MAP 10 set peer 192.168.0.215 crypto map JONCOM_MAP 10 set transform-set JONCOM_SET crypto map mymap 65535 ipsec-isakmp dynamic dynmap crypto map mymap interface outside crypto isakmp enable outside crypto isakmp policy 10 authentication pre-share encryption des hash sha group 2 lifetime 86400 crypto isakmp policy 11 authentication pre-share encryption 3des hash md5 group 2 lifetime 86400 crypto isakmp policy 65535 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 telnet timeout 5 ssh 0.0.0.0 0.0.0.0 outside ssh 0.0.0.0 0.0.0.0 inside ssh timeout 60 console timeout 0 dhcpd auto_config outside ! dhcpd address 10.45.7.1-10.45.7.32 inside dhcpd dns 8.8.8.8 8.8.4.4 interface inside dhcpd option 3 ip 10.45.1.1 interface inside dhcpd enable inside ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept webvpn group-policy vpnclientgroup internal group-policy vpnclientgroup attributes dns-server value 10.45.1.99 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value Split_Tunnel_List_ACL default-domain value ConfigureTerminal.com username david password JJnZxoztNqHeCFO8 encrypted username david attributes vpn-group-policy vpnclientgroup tunnel-group 192.168.0.215 type ipsec-l2l tunnel-group 192.168.0.215 ipsec-attributes pre-shared-key ***** tunnel-group vpnclientgroup type remote-access tunnel-group vpnclientgroup general-attributes address-pool mypool default-group-policy vpnclientgroup tunnel-group vpnclientgroup ipsec-attributes pre-shared-key ***** ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options ! service-policy global_policy global prompt hostname context no call-home reporting anonymous call-home profile CiscoTAC-1 no active destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address email callhome@cisco.com destination transport-method http subscribe-to-alert-group diagnostic subscribe-to-alert-group environment subscribe-to-alert-group inventory periodic monthly subscribe-to-alert-group configuration periodic monthly subscribe-to-alert-group telemetry periodic daily Cryptochecksum:44937d2f692898f2e5be4cb13152f87d : end