1615 ASA config 1615 ASA : Saved : ASA Version 8.2(5) ! hostname 1615-ASA01 enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted names ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 switchport trunk allowed vlan 1,10 switchport trunk native vlan 1 switchport mode trunk ! interface Ethernet0/7 ! interface Vlan1 nameif inside security-level 100 ip address 192.168.2.100 255.255.255.0 ! interface Vlan2 nameif outside security-level 0 ip address 108.58.38.146 255.255.255.248 ! interface Vlan10 description voiceVlan nameif voice security-level 100 ip address 10.10.0.201 255.255.255.0 ! ftp mode passive same-security-traffic permit inter-interface object-group network SHF-BRKLYN-LAN_LOCAL network-object 192.168.2.0 255.255.255.0 network-object 10.10.0.0 255.255.255.0 object-group network SHF-NY-LAN_LOCAL network-object 192.168.1.0 255.255.255.0 network-object 192.168.3.0 255.255.255.0 object-group network SHF-1604-LAN_LOCAL network-object 192.168.5.0 255.255.255.0 object-group network SHF-SP-LAN_LCCAL network-object 192.168.3.0 255.255.255.0 object-group network SHF-NY-4FLLAN_LCCAL network-object 192.168.4.0 255.255.255.0 access-list outside_1_cryptomap extended permit ip object-group SHF-BRKLYN-LAN_LOCAL object-group SHF-NY-LAN_LOCAL access-list outside_1_cryptomap extended permit ip object-group SHF-BRKLYN-LAN_LOCAL object-group SHF-SP-LAN_LCCAL access-list outside_1_cryptomap extended permit ip object-group SHF-BRKLYN-LAN_LOCAL object-group SHF-NY-4FLLAN_LCCAL access-list NO-NAT extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0 access-list NO-NAT extended permit ip 192.168.2.0 255.255.255.0 192.168.5.0 255.255.255.0 access-list NO-NAT extended permit ip 192.168.2.0 255.255.255.0 192.168.3.0 255.255.255.0 access-list NO-NAT extended permit ip 192.168.2.0 255.255.255.0 192.168.4.0 255.255.255.0 access-list NO-NAT extended permit ip 10.10.0.0 255.255.255.0 192.168.5.0 255.255.255.0 access-list Inside_access_in extended permit ip any any access-list outside_access_IN extended permit tcp any interface outside eq pptp access-list outside_access_IN extended permit tcp any interface outside eq ldaps access-list outside_1_cryptomap_1604 extended permit ip object-group SHF-BRKLYN-LAN_LOCAL object-group SHF-1604-LAN_LOCAL pager lines 24 logging asdm informational mtu inside 1500 mtu outside 1500 mtu voice 1500 no failover icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm.bin. no asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list NO-NAT nat (inside) 1 0.0.0.0 0.0.0.0 static (inside,outside) tcp interface pptp 192.168.2.55 pptp netmask 255.255.255.255 static (inside,outside) tcp interface ldaps 192.168.2.50 ldaps netmask 255.255.255.255 access-group outside_access_IN in interface outside route outside 0.0.0.0 0.0.0.0 108.58.38.145 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy aaa authentication ssh console LOCAL http server enable http 192.168.2.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 crypto dynamic-map VPN_2_1604DYN_MAP 30 set transform-set ESP-3DES-SHA crypto map CmapOutside_map 1 match address outside_1_cryptomap crypto map CmapOutside_map 1 set peer 108.176.11.66 crypto map CmapOutside_map 1 set transform-set ESP-3DES-SHA crypto map CmapOutside_map 30 ipsec-isakmp dynamic VPN_2_1604DYN_MAP crypto map CmapOutside_map interface outside crypto ca trustpoint _SmartCallHome_ServerCA crl configure crypto isakmp enable outside crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 telnet timeout 5 ssh 192.168.2.0 255.255.255.0 inside ssh 192.168.1.0 255.255.255.0 inside ssh 0.0.0.0 0.0.0.0 outside ssh timeout 30 console timeout 0 dhcpd auto_config outside ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept webvpn username wca password NzKkrr82HxebLcQW encrypted privilege 15 tunnel-group DefaultL2LGroup ipsec-attributes pre-shared-key ***** tunnel-group 108.176.11.66 type ipsec-l2l tunnel-group 108.176.11.66 ipsec-attributes pre-shared-key ***** ! class-map inspection_default1 match default-inspection-traffic class-map inspection_default match default-inspection-traffic ! ! policy-map global_policy class inspection_default inspect icmp inspect pptp inspect ils ! service-policy global_policy global prompt hostname context call-home reporting anonymous Cryptochecksum:5ef2a7f02440fd61b15e965cf1d7046a : end