CISCO PIX CONFIG fw01# sh run : Saved : PIX Version 6.3(1) interface ethernet0 10baset interface ethernet1 100full interface ethernet2 auto nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif ethernet2 dmz security50 enable password .BLmCTmksshRshK9 encrypted passwd .BLmCTmksshRshK9 encrypted hostname fw01 domain-name XXXXXXXXXXXXX fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol ils 389 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 names access-list Outside permit tcp any host 203.48.41.1 eq www access-list Outside permit tcp any host 203.48.41.5 eq smtp access-list Outside permit icmp any any access-list Outside permit tcp any host 203.48.41.1 eq 3101 access-list DMZ permit icmp 10.1.1.0 255.255.255.0 192.168.0.0 255.255.0.0 access-list DMZ permit tcp host 10.1.1.1 host 192.168.1.1 eq 1433 access-list DMZ permit tcp host 10.1.1.1 host 192.168.1.1 eq 1434 access-list DMZ permit udp host 10.1.1.1 host 192.168.1.1 eq 1433 access-list DMZ permit udp host 10.1.1.1 host 192.168.1.1 eq 1434 access-list Dont-NAT-This permit ip 192.168.0.0 255.255.0.0 10.1.1.0 255.255.255.0 access-list bypass permit ip 192.168.50.0 255.255.255.192 192.168.0.0 255.255.0.0 access-list bypass permit ip 192.168.0.0 255.255.0.0 192.168.50.0 255.255.255.192 access-list bypass permit ip 192.168.0.0 255.255.0.0 10.1.1.0 255.255.255.0 access-list bypass permit ip 192.168.0.0 255.255.0.0 10.1.9.0 255.255.255.0 access-list 160 permit ip 192.168.0.0 255.255.0.0 192.168.50.0 255.255.255.192 access-list 120 permit ip host 192.168.1.4 host 192.168.1.253 access-list pcp-tunnel permit ip 192.168.1.0 255.255.255.0 10.1.9.0 255.255.255.0 pager lines 23 logging on logging buffered warnings mtu outside 1500 mtu inside 1500 mtu dmz 1500 ip address outside 203.48.41.61 255.255.255.192 ip address inside 192.168.1.253 255.255.255.0 ip address dmz 10.1.1.254 255.255.255.0 ip audit info action alarm ip audit attack action alarm ip local pool vpnpool 192.168.50.1-192.168.50.62 pdm history enable arp timeout 14400 global (outside) 1 203.48.41.60 nat (inside) 0 access-list bypass nat (inside) 1 192.168.1.0 255.255.255.0 0 0 nat (inside) 1 192.168.102.0 255.255.255.0 0 0 static (inside,outside) tcp 203.48.41.1 3101 192.168.1.12 3101 netmask 255.255.255.255 0 0 static (inside,dmz) 10.1.1.1 192.168.1.5 netmask 255.255.255.255 0 0 static (inside,outside) 203.48.41.5 192.168.1.5 netmask 255.255.255.255 0 0 access-group Outside in interface outside route outside 0.0.0.0 0.0.0.0 203.48.41.62 3 route inside 172.16.99.0 255.255.255.0 192.168.1.250 1 route inside 192.168.0.0 255.255.0.0 192.168.1.254 2 route inside 192.168.102.0 255.255.255.0 192.168.1.250 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local aaa-server myserver protocol radius aaa-server myserver (inside) host 192.168.1.4 Vtoya1tm timeout 5 no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-ipsec crypto ipsec transform-set mysetdes esp-des esp-md5-hmac crypto dynamic-map mydynmap 10 set transform-set mysetdes crypto map newmap 10 ipsec-isakmp dynamic mydynmap crypto map newmap 11 ipsec-isakmp crypto map newmap 11 match address pcp-tunnel crypto map newmap 11 set peer 150.101.31.94 crypto map newmap 11 set transform-set mysetdes crypto map newmap client configuration address initiate crypto map newmap client configuration address respond crypto map newmap interface outside isakmp enable outside isakmp key ******** address 0.0.0.0 netmask 0.0.0.0 isakmp key ******** address 150.101.31.94 netmask 255.255.255.255 isakmp identity address isakmp client configuration address-pool local vpnpool outside isakmp policy 10 authentication pre-share isakmp policy 10 encryption des isakmp policy 10 hash md5 isakmp policy 10 group 1 isakmp policy 10 lifetime 7200 isakmp policy 11 authentication pre-share isakmp policy 11 encryption des isakmp policy 11 hash md5 isakmp policy 11 group 2 isakmp policy 11 lifetime 86400 vpngroup langsupport idle-time 1800 vpngroup support address-pool vpnpool vpngroup support split-tunnel 160 vpngroup support idle-time 1800 vpngroup support password ******** vpngroup users address-pool vpnpool vpngroup users split-tunnel 160 vpngroup users idle-time 1800 vpngroup users password ******** telnet 192.168.1.0 255.255.255.0 inside telnet timeout 5 ssh 192.83.231.0 255.255.255.0 outside ssh timeout 5 console timeout 0 terminal width 80 Cryptochecksum:3755d2397e18f698c178d9a9fd13f256 : end