: Saved : : Serial Number: JAD200600S7 : Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores) : ASA Version 9.5(2) ! hostname Westgate-ASA domain-name eslcu.co.uk enable password 8Ry2YjIyt7RRXU24 encrypted names ! interface GigabitEthernet1/1 nameif outside security-level 0 ip address dhcp setroute ! interface GigabitEthernet1/2 nameif inside security-level 100 ip address 192.168.2.1 255.255.255.0 ! interface GigabitEthernet1/3 shutdown nameif Inside-2 security-level 100 ip address 192.168.3.1 255.255.255.0 ! interface GigabitEthernet1/4 shutdown no nameif no security-level no ip address ! interface GigabitEthernet1/5 shutdown no nameif no security-level no ip address ! interface GigabitEthernet1/6 shutdown no nameif no security-level no ip address ! interface GigabitEthernet1/7 shutdown no nameif no security-level no ip address ! interface GigabitEthernet1/8 nameif Outside_PPPoE security-level 0 pppoe client vpdn group Outside_PPPoE pppoe client route distance 254 ip address pppoe setroute ! interface Management1/1 management-only no nameif no security-level no ip address ! ftp mode passive clock timezone GMT/BST 0 clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00 dns server-group DefaultDNS domain-name eslcu.co.uk object network NETWORK_OBJ_192.168.1.0_24 subnet 192.168.1.0 255.255.255.0 object network NETWORK_OBJ_192.168.2.0_24 subnet 192.168.2.0 255.255.255.0 object network 192.168.2.0_24 subnet 192.168.2.0 255.255.255.0 object network 192.168.1.0_24 subnet 192.168.1.0 255.255.255.0 object network PPPoE_GW host 81.139.96.1 access-list outside_access_in extended permit icmp any interface inside access-list Outside_PPPoE_cryptomap_1 extended permit ip 192.168.2.0 255.255.255.0 object NETWORK_OBJ_192.168.1.0_24 access-list Outside_PPPoE_cryptomap extended permit ip 192.168.2.0 255.255.255.0 object NETWORK_OBJ_192.168.1.0_24 access-list Outside_PPPoE_cryptomap_2 extended permit ip 192.168.2.0 255.255.255.0 object NETWORK_OBJ_192.168.1.0_24 access-list Outside_PPPoE_cryptomap_3 extended permit ip 192.168.2.0 255.255.255.0 object NETWORK_OBJ_192.168.1.0_24 access-list l2l_list extended permit ip object 192.168.2.0_24 object 192.168.1.0_24 access-list l2l_list extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0 access-list Outside_PPPoE_access_in extended permit icmp any 192.168.2.0 255.255.255.0 pager lines 24 logging enable logging asdm informational mtu outside 1500 mtu inside 1500 mtu Inside-2 1500 mtu Outside_PPPoE 1500 icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 no arp permit-nonconnected nat (inside,Outside_PPPoE) source static NETWORK_OBJ_192.168.2.0_24 NETWORK_OBJ_192.168.2.0_24 destination static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 no-proxy-arp route-lookup nat (inside,Outside_PPPoE) source dynamic NETWORK_OBJ_192.168.2.0_24 interface access-group outside_access_in in interface outside access-group Outside_PPPoE_access_in in interface Outside_PPPoE timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 user-identity default-domain LOCAL aaa authentication ssh console LOCAL http server enable http 192.168.3.0 255.255.255.0 Inside-2 http 192.168.2.0 255.255.255.0 inside http 2.103.96.233 255.255.255.255 Outside_PPPoE http 152.105.250.114 255.255.255.255 Outside_PPPoE http 81.136.206.34 255.255.255.255 Outside_PPPoE http 81.155.177.223 255.255.255.255 Outside_PPPoE http 2.103.96.100 255.255.255.255 Outside_PPPoE http 2.99.82.118 255.255.255.255 Outside_PPPoE http 92.7.175.190 255.255.255.255 Outside_PPPoE no snmp-server location no snmp-server contact service sw-reset-button crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport crypto ipsec ikev1 transform-set FirstSet esp-3des esp-md5-hmac crypto ipsec ikev2 ipsec-proposal secure protocol esp encryption aes 3des des protocol esp integrity sha-1 crypto ipsec ikev2 ipsec-proposal AES256 protocol esp encryption aes-256 protocol esp integrity sha-1 md5 crypto ipsec ikev2 ipsec-proposal AES192 protocol esp encryption aes-192 protocol esp integrity sha-1 md5 crypto ipsec ikev2 ipsec-proposal AES protocol esp encryption aes protocol esp integrity sha-1 md5 crypto ipsec ikev2 ipsec-proposal 3DES protocol esp encryption 3des protocol esp integrity sha-1 md5 crypto ipsec ikev2 ipsec-proposal DES protocol esp encryption des protocol esp integrity sha-1 md5 crypto ipsec security-association pmtu-aging infinite crypto map abcmap 1 match address l2l_list crypto map abcmap 1 set peer 81.136.206.34 crypto map abcmap 1 set ikev1 transform-set FirstSet crypto map abcmap interface Outside_PPPoE crypto ca trustpool policy crypto ikev2 policy 1 encryption 3des integrity sha group 2 prf sha lifetime seconds 43200 crypto ikev1 enable Outside_PPPoE crypto ikev1 policy 1 authentication pre-share encryption 3des hash sha group 2 lifetime 43200 telnet timeout 5 no ssh stricthostkeycheck ssh 152.105.250.114 255.255.255.255 Outside_PPPoE ssh 2.99.82.118 255.255.255.255 Outside_PPPoE ssh timeout 5 ssh key-exchange group dh-group1-sha1 console timeout 0 vpdn group Outside_PPPoE request dialout pppoe vpdn group Outside_PPPoE localname D785496@hg31.btclick.com vpdn group Outside_PPPoE ppp authentication chap vpdn username D785496@hg31.btclick.com password ***** dhcpd auto_config outside ! dhcpd address 192.168.2.64-192.168.2.199 inside dhcpd dns 192.168.2.1 8.8.4.4 interface inside dhcpd enable inside ! dhcpd address 192.168.3.64-192.168.3.199 Inside-2 dhcpd dns 8.8.4.4 8.8.8.8 interface Inside-2 ! threat-detection basic-threat threat-detection statistics host threat-detection statistics port threat-detection statistics protocol threat-detection statistics access-list no threat-detection statistics tcp-intercept ntp server 88.150.253.182 source Outside_PPPoE ntp server 130.159.196.118 source Outside_PPPoE group-policy DfltGrpPolicy attributes vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless dynamic-access-policy-record DfltAccessPolicy username ccadmin password j76ZHBJ.OndAaoeK encrypted privilege 15 username chrismole password ZuZbR5C0e1f0P0Bh encrypted tunnel-group 81.136.206.34 type ipsec-l2l tunnel-group 81.136.206.34 ipsec-attributes ikev1 pre-shared-key ***** ! class-map ctx1 class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options inspect icmp inspect icmp error ! service-policy global_policy global prompt hostname context no call-home reporting anonymous Cryptochecksum:2e4c84ee08134adb1b54826751e2d0b7 : end no asdm history enable