Result of the command: "sho run" : Saved : ASA Version 9.1(4) ! hostname ASA domain-name TPW.com enable password xdoT/Gkn4zExak/y encrypted xlate per-session deny tcp any4 any4 xlate per-session deny tcp any4 any6 xlate per-session deny tcp any6 any4 xlate per-session deny tcp any6 any6 xlate per-session deny udp any4 any4 eq domain xlate per-session deny udp any4 any6 eq domain xlate per-session deny udp any6 any4 eq domain xlate per-session deny udp any6 any6 eq domain names ip local pool ASA_POOL 172.21.1.5-172.21.1.8 mask 255.255.255.0 ! interface Ethernet0/0 nameif Outside security-level 0 ip address XXX.XXX.XXX.4 255.255.255.0 ! interface Ethernet0/1 nameif inside security-level 100 ip address 172.21.1.4 255.255.255.0 ! interface Ethernet0/2 shutdown no nameif no security-level no ip address ! interface Ethernet0/3 shutdown no nameif no security-level no ip address ! interface Management0/0 shutdown no nameif no security-level no ip address ! ftp mode passive clock timezone EST -5 clock summer-time EST recurring dns server-group DefaultDNS domain-name TPW object network NETWORK_OBJ_10.10.101.0_24 subnet 10.10.101.0 255.255.255.0 object network NETWORK_OBJ_172.21.1.0_28 subnet 172.21.1.0 255.255.255.0 object network NETWORK_OBJ_172.21.1.0_28_0 subnet 172.21.1.0 255.255.255.240 access-list ASA-AnyConnect standard permit 172.21.1.0 255.255.255.0 access-list ASA-AnyConnect standard permit XXX.XXX.80.0 255.255.255.0 access-list ASA-AnyConnect standard permit XXX.XXX.81.0 255.255.255.0 access-list ASA-AnyConnect standard permit XXX.XXX.82.0 255.255.255.0 access-list ASA-AnyConnect standard permit XXX.XXX.83.0 255.255.255.0 access-list ASA-AnyConnect standard permit XXX.XXX.76.0 255.255.255.0 access-list ASA-AnyConnect standard permit XXX.XXX.77.0 255.255.255.0 access-list ASA-AnyConnect standard permit XXX.XXX.78.0 255.255.255.0 access-list ASA-AnyConnect standard permit 172.21.0.0 255.255.255.0 access-list ASA-AnyConnect standard permit 172.21.10.0 255.255.255.0 access-list Outside_access_in extended permit ip any any access-list Outside_access_in extended permit icmp any any access-list inside_access_in extended permit ip any any access-list inside_access_in extended permit icmp any any access-list global_access extended permit ip any any access-list XXX_ACL standard permit host 172.21.1.242 access-list XXX_ACL standard permit host 172.21.1.232 access-list XXX_ACL standard permit host 172.21.1.60 access-list XXX_ACL standard permit host 172.21.1.71 access-list XXX_ACL standard permit host 172.21.1.72 access-list XXX_ACL standard permit host 172.21.1.73 access-list XXX_ACL standard permit host 172.21.1.74 access-list XXX_ACL standard permit host 172.21.1.75 access-list XXX_ACL standard permit host 172.21.1.76 access-list XXX_ACL standard permit host 172.21.1.77 access-list XYZ_ACL standard permit host 172.21.10.20 access-list XYZ_ACL standard permit host 172.21.10.132 access-list XYZ_ACL standard permit host 172.21.10.142 access-list XYZ_ACL standard permit host XXX.XXX.80.54 pager lines 24 logging enable logging buffer-size 65536 logging asdm informational mtu Outside 1500 mtu inside 1500 no failover icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 no arp permit-nonconnected nat (inside,Outside) source static any any destination static NETWORK_OBJ_172.21.1.0_28_0 NETWORK_OBJ_172.21.1.0_28_0 no-proxy-arp route-lookup access-group Outside_access_in in interface Outside access-group inside_access_in in interface inside access-group global_access global ! router eigrp 1 network 172.21.1.0 255.255.255.0 ! route Outside 0.0.0.0 0.0.0.0 XXX.XXX.80.57 1 timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy user-identity default-domain LOCAL aaa authentication ssh console LOCAL http server enable http 0.0.0.0 0.0.0.0 Outside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart crypto ipsec ikev2 ipsec-proposal DES protocol esp encryption des protocol esp integrity sha-1 md5 crypto ipsec ikev2 ipsec-proposal 3DES protocol esp encryption 3des protocol esp integrity sha-1 md5 crypto ipsec ikev2 ipsec-proposal AES protocol esp encryption aes protocol esp integrity sha-1 md5 crypto ipsec ikev2 ipsec-proposal AES192 protocol esp encryption aes-192 protocol esp integrity sha-1 md5 crypto ipsec ikev2 ipsec-proposal AES256 protocol esp encryption aes-256 protocol esp integrity sha-1 md5 crypto ipsec security-association pmtu-aging infinite crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES crypto map Outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP crypto map Outside_map interface Outside crypto ca trustpoint ASDM_TrustPoint0 enrollment self subject-name CN=ASA crl configure crypto ca trustpool policy crypto ikev2 policy 1 encryption aes-256 integrity sha group 5 2 prf sha lifetime seconds 86400 crypto ikev2 policy 10 encryption aes-192 integrity sha group 5 2 prf sha lifetime seconds 86400 crypto ikev2 policy 20 encryption aes integrity sha group 5 2 prf sha lifetime seconds 86400 crypto ikev2 policy 30 encryption 3des integrity sha group 5 2 prf sha lifetime seconds 86400 crypto ikev2 policy 40 encryption des integrity sha group 5 2 prf sha lifetime seconds 86400 crypto ikev2 enable Outside client-services port 443 crypto ikev2 remote-access trustpoint ASDM_TrustPoint0 telnet timeout 5 ssh 172.21.1.0 255.255.255.0 inside ssh timeout 5 ssh key-exchange group dh-group1-sha1 console timeout 0 threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept ntp server 172.21.1.1 ssl trust-point ASDM_TrustPoint0 Outside webvpn enable Outside anyconnect image disk0:/anyconnect-win-3.1.04066-k9.pkg 1 anyconnect image disk0:/anyconnect-macosx-i386-3.1.04066-k9.pkg 2 anyconnect profiles ASA-AnyConnect_client_profile disk0:/ASA-AnyConnect_client_profile.xml anyconnect profiles ASA_Mobile_VPN_client_profile disk0:/ASA_Mobile_VPN_client_profile.xml anyconnect profiles ASA_VPN_client_profile disk0:/ASA_VPN_client_profile.xml anyconnect enable tunnel-group-list enable group-policy GroupPolicy_ASA_VPN internal group-policy GroupPolicy_ASA_VPN attributes wins-server none dns-server value 172.21.1.120 172.21.1.121 vpn-tunnel-protocol ikev2 ssl-client split-tunnel-policy tunnelspecified split-tunnel-network-list value ASA-AnyConnect default-domain value TPW webvpn anyconnect profiles value ASA_VPN_client_profile type user group-policy ABC_GP internal group-policy ABC_GP attributes split-tunnel-policy tunnelspecified split-tunnel-network-list value XXX_ACL group-policy XYZ_ACL internal group-policy XYZ_ACL attributes split-tunnel-policy tunnelspecified split-tunnel-network-list value XYZ_ACL username ***BLANK*** username ***BLANK*** username ***BLANK*** service-type remote-access username ***BLANK*** username safeharbor attributes vpn-group-policy ABC_GP username ***BLANK*** username ***BLANK*** username ***BLANK*** service-type remote-access username ***BLANK*** username ***BLANK*** service-type remote-access username ***BLANK*** username ***BLANK*** service-type remote-access username ***BLANK*** username***BLANK*** username ***BLANK*** vpn-group-policy XYZ_ACL service-type remote-access username ***BLANK*** username ***BLANK*** vpn-group-policy XYZ_ACL service-type remote-access username ***BLANK*** username ***BLANK*** tunnel-group ASA_VPN type remote-access tunnel-group ASA_VPN general-attributes address-pool ASA_POOL default-group-policy GroupPolicy_ASA_VPN tunnel-group ASA_VPN webvpn-attributes group-alias ASA_VPN enable ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect ip-options inspect netbios inspect rsh inspect rtsp inspect skinny inspect esmtp inspect sqlnet inspect sunrpc inspect tftp inspect sip inspect xdmcp ! service-policy global_policy global prompt hostname context no call-home reporting anonymous call-home profile CiscoTAC-1 no active destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address email callhome@cisco.com destination transport-method http subscribe-to-alert-group diagnostic subscribe-to-alert-group environment subscribe-to-alert-group inventory periodic monthly subscribe-to-alert-group configuration periodic monthly subscribe-to-alert-group telemetry periodic daily Cryptochecksum:1985287458d8e6743f72f700a9a01284 : end