ASA5505# sh run : Saved : ASA Version 8.0(2) ! hostname ASA5505 domain-name ASA5505.krneki.local enable password fZsdASd3DDs.jG encrypted names ! interface Vlan1 description LAN nameif inside security-level 100 ip address 192.168.10.1 255.255.255.0 ospf cost 10 ! interface Vlan2 description Link to Cisco 1812 nameif outside security-level 0 ip address xxx.xxx.252.227 255.255.255.248 ospf cost 10 ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! passwd 2KPSnbNIdI.2KEOU encrypted banner exec Please do not login if you are not authorized! banner login Please do not login if you are not authorized! boot system disk0:/asa802-k8.bin no ftp mode passive clock timezone CEST 1 clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00 dns server-group DefaultDNS domain-name ASA5505.krneki.local same-security-traffic permit inter-interface same-security-traffic permit intra-interface access-list nonat extended permit ip 192.168.10.0 255.255.255.0 192.168.80.0 255.255.255.0 access-list nonat extended permit ip 192.168.20.0 255.255.255.0 192.168.80.0 255.255.255.0 access-list Split_tunnel standard permit 192.168.10.0 255.255.255.0 access-list Split_tunnel standard permit 192.168.20.0 255.255.255.0 pager lines 24 logging enable logging timestamp logging asdm informational mtu inside 1500 mtu outside 1500 ip local pool vpnpool 192.168.80.1-192.168.80.10 mask 255.255.255.0 ip verify reverse-path interface outside icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-602.bin no asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list nonat nat (inside) 1 192.168.20.0 255.255.255.240 nat (inside) 1 192.168.10.0 255.255.255.0 nat (inside) 1 0.0.0.0 0.0.0.0 ! router ospf 1 network 192.168.10.0 255.255.255.0 area 51 log-adj-changes default-information originate always metric 10 ! route outside 0.0.0.0 0.0.0.0 xxx.xxx.252.225 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout uauth 0:05:00 absolute dynamic-access-policy-record DfltAccessPolicy aaa authentication enable console LOCAL aaa authentication http console LOCAL aaa authentication serial console LOCAL aaa authentication ssh console LOCAL aaa local authentication attempts max-fail 5 http server enable 8080 http 192.168.10.0 255.255.255.0 inside http 76.19.224.202 255.255.255.255 outside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set myset esp-aes esp-sha-hmac crypto dynamic-map dyn1 10 set transform-set myset crypto dynamic-map dyn1 10 set security-association lifetime seconds 288000 crypto dynamic-map dyn1 10 set reverse-route crypto map mymap 10 ipsec-isakmp dynamic dyn1 crypto map mymap interface outside crypto isakmp enable outside crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 43200 telnet timeout 5 ssh 192.168.10.0 255.255.255.0 inside ssh xxx.xxx.252.225 255.255.255.255 outside ssh 76.19.224.202 255.255.255.255 outside ssh timeout 10 ssh version 2 console timeout 0 dhcpd auto_config outside ! dhcpd address 192.168.10.10-192.168.10.100 inside dhcpd dns 212.18.32.10 212.18.32.12 interface inside dhcpd lease 84600 interface inside dhcpd domain krneki.local interface inside dhcpd enable inside ! threat-detection basic-threat threat-detection statistics port threat-detection statistics protocol threat-detection statistics access-list ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp ! service-policy global_policy global ntp server 193.2.1.66 webvpn enable outside svc image disk0:/anyconnect-win-2.0.0343-k9.pkg 1 svc image disk0:/anyconnect-linux-2.0.0343-k9.pkg 2 svc enable tunnel-group-list enable group-policy vpnkotjetu internal group-policy vpnkotjetu attributes vpn-simultaneous-logins 3 vpn-tunnel-protocol IPSec svc webvpn ip-comp enable split-tunnel-policy tunnelspecified split-tunnel-network-list value Split_tunnel default-domain value krneki.local webvpn svc keep-installer none username maulopi password MAZCgiwewW8NQZnN encrypted username maulopi attributes vpn-group-policy vpnkotjetu tunnel-group vpnkotjetu type remote-access tunnel-group vpnkotjetu general-attributes address-pool vpnpool tunnel-group vpnkotjetu ipsec-attributes pre-shared-key * tunnel-group webvpn type remote-access tunnel-group webvpn general-attributes address-pool vpnpool default-group-policy vpnkotjetu prompt hostname context