<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic When you are talking about in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014696#M146975</link>
    <description>&lt;P&gt;When you are talking about TCP state bypass, it might work with 2 ASAs right?, Or can i work with one?&lt;/P&gt;</description>
    <pubDate>Tue, 07 Feb 2017 15:17:30 GMT</pubDate>
    <dc:creator>edumatics</dc:creator>
    <dc:date>2017-02-07T15:17:30Z</dc:date>
    <item>
      <title>Intra-interface issue ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014693#M146962</link>
      <description>&lt;P&gt;Dear Friends, I have an issue with my ASA 5510. I will describe my scenario a little bit: 4 interfaces occupied (Outside, DMZ, LAN, Branch Offices). Outside for internet of-course, On DMZ email and web services (Everyone can reach this network even from outside and from LAN and Branch Offices), LAN is for local computers and servers (Here is my issue, will be explained below, Network 192.168.0.0) and Branch Offices that are many POS located on different places geographically.&lt;/P&gt;
&lt;P&gt;Well, In the LAN we are implementing a Server Farm that is going to have a different segment than LAN segment. This server farm is behind a Catalyst 3750V2 that is connected in the external side to LAN and is going to use another segment (192.168.254.0) and is going to have different level access because of security (There will be Mission critical servers). All the escenario seems to work fine but interaction between LAN and Server Farm. I tried yesterday to reach from branch offices and works fine but i cannot reach from LAN to Server Farm and viceversa. Does someone can help to sokve the isue? . Here's the configuration&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ASAFCHFW&lt;BR /&gt;domain-name mydomain.com&lt;BR /&gt;enable password kFJzUkFi3silH1Ye encrypted&lt;BR /&gt;passwd PVSASRJovmamnVkD encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif Outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address x.x.x.131 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif Branch_Office&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 10&lt;BR /&gt; ip address 172.16.31.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; nameif Inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif LinkserNet&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.16.6.2 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;time-range ilimitado&lt;BR /&gt; periodic daily 0:00 to 23:59&lt;BR /&gt;!&lt;BR /&gt;banner exec # WARNING!! Unauthorized Access Prohibited!! #&lt;BR /&gt;banner login # WARNING!! Unauthorized Access Prohibited!! #&lt;BR /&gt;banner motd # WARNING!! Unauthorized Access Prohibited!! #&lt;BR /&gt;boot system disk0:/asa821-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone BOT -4&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name mydomain.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service RDP tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group network Subredes&lt;BR /&gt; network-object 192.168.10.0 255.255.255.0&lt;BR /&gt; network-object 192.168.11.0 255.255.255.0&lt;BR /&gt; network-object 192.168.12.0 255.255.255.0&lt;BR /&gt; network-object 192.168.13.0 255.255.255.0&lt;BR /&gt; network-object 192.168.14.0 255.255.255.0&lt;BR /&gt; network-object 192.168.15.0 255.255.255.0&lt;BR /&gt; network-object 192.168.16.0 255.255.255.0&lt;BR /&gt; network-object 192.168.17.0 255.255.255.0&lt;BR /&gt; network-object 192.168.18.0 255.255.255.0&lt;BR /&gt; network-object 192.168.19.0 255.255.255.0&lt;BR /&gt; network-object 192.168.20.0 255.255.255.0&lt;BR /&gt; network-object 192.168.21.0 255.255.255.0&lt;BR /&gt; network-object 192.168.22.0 255.255.255.0&lt;BR /&gt; network-object 192.168.23.0 255.255.255.0&lt;BR /&gt; network-object 192.168.24.0 255.255.255.0&lt;BR /&gt; network-object 192.168.25.0 255.255.255.0&lt;BR /&gt; network-object 192.168.26.0 255.255.255.0&lt;BR /&gt; network-object 192.168.27.0 255.255.255.0&lt;BR /&gt; network-object 192.168.28.0 255.255.255.0&lt;BR /&gt; network-object 192.168.29.0 255.255.255.0&lt;BR /&gt; network-object 192.168.30.0 255.255.255.0&lt;BR /&gt; network-object 192.168.31.0 255.255.255.0&lt;BR /&gt; network-object 192.168.32.0 255.255.255.0&lt;BR /&gt; network-object 192.168.33.0 255.255.255.0&lt;BR /&gt; network-object 192.168.34.0 255.255.255.0&lt;BR /&gt; network-object 192.168.35.0 255.255.255.0&lt;BR /&gt; network-object 192.168.36.0 255.255.255.0&lt;BR /&gt; network-object 192.168.37.0 255.255.255.0&lt;BR /&gt; network-object 192.168.38.0 255.255.255.0&lt;BR /&gt; network-object 192.168.39.0 255.255.255.0&lt;BR /&gt; network-object 192.168.40.0 255.255.255.0&lt;BR /&gt; network-object 192.168.41.0 255.255.255.0&lt;BR /&gt; network-object 192.168.42.0 255.255.255.0&lt;BR /&gt; network-object 192.168.43.0 255.255.255.0&lt;BR /&gt; network-object 192.168.44.0 255.255.255.0&lt;BR /&gt; network-object 192.168.45.0 255.255.255.0&lt;BR /&gt; network-object 192.168.46.0 255.255.255.0&lt;BR /&gt; network-object 192.168.47.0 255.255.255.0&lt;BR /&gt; network-object 192.168.48.0 255.255.255.0&lt;BR /&gt; network-object 192.168.49.0 255.255.255.0&lt;BR /&gt; network-object 192.168.50.0 255.255.255.0&lt;BR /&gt; network-object 192.168.51.0 255.255.255.0&lt;BR /&gt; network-object 192.168.52.0 255.255.255.0&lt;BR /&gt; network-object 192.168.53.0 255.255.255.0&lt;BR /&gt; network-object 192.168.54.0 255.255.255.0&lt;BR /&gt; network-object 192.168.55.0 255.255.255.0&lt;BR /&gt; network-object 192.168.56.0 255.255.255.0&lt;BR /&gt; network-object 192.168.57.0 255.255.255.0&lt;BR /&gt; network-object 192.168.58.0 255.255.255.0&lt;BR /&gt; network-object 192.168.59.0 255.255.255.0&lt;BR /&gt; network-object 192.168.60.0 255.255.255.0&lt;BR /&gt; network-object 192.168.61.0 255.255.255.0&lt;BR /&gt; network-object 192.168.62.0 255.255.255.0&lt;BR /&gt; network-object 192.168.63.0 255.255.255.0&lt;BR /&gt; network-object 192.168.64.0 255.255.255.0&lt;BR /&gt; network-object 192.168.65.0 255.255.255.0&lt;BR /&gt; network-object 192.168.66.0 255.255.255.0&lt;BR /&gt; network-object 192.168.67.0 255.255.255.0&lt;BR /&gt; network-object 192.168.68.0 255.255.255.0&lt;BR /&gt;object-group service SQL-orix tcp&lt;BR /&gt; port-object eq 1433&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq 1434&lt;BR /&gt; port-object eq 135&lt;BR /&gt; port-object eq 2383&lt;BR /&gt; port-object eq 2382&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group network priorinet&lt;BR /&gt; network-object host 192.168.0.34&lt;BR /&gt; network-object host 192.168.0.31&lt;BR /&gt; network-object host 192.168.0.35&lt;BR /&gt; network-object host 192.168.0.36&lt;BR /&gt; network-object host 192.168.0.45&lt;BR /&gt; network-object host 192.168.0.112&lt;BR /&gt; network-object host 192.168.0.138&lt;BR /&gt; network-object host 192.168.0.156&lt;BR /&gt; network-object host 192.168.0.179&lt;BR /&gt; network-object host 192.168.0.198&lt;BR /&gt; network-object host 192.168.0.213&lt;BR /&gt; network-object host 192.168.0.115&lt;BR /&gt;object-group network servidores&lt;BR /&gt; network-object host 192.168.0.16&lt;BR /&gt; network-object host 192.168.0.17&lt;BR /&gt; network-object host 192.168.0.18&lt;BR /&gt; network-object host 192.168.0.19&lt;BR /&gt; network-object host 192.168.0.25&lt;BR /&gt; network-object host 192.168.0.27&lt;BR /&gt; network-object host 192.168.0.28&lt;BR /&gt; network-object host 192.168.0.55&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group network internet24sept&lt;BR /&gt; network-object host 192.168.48.20&lt;BR /&gt; network-object host 192.168.48.21&lt;BR /&gt; network-object host 192.168.48.22&lt;BR /&gt; network-object host 192.168.48.23&lt;BR /&gt; network-object host 192.168.48.24&lt;BR /&gt; network-object host 192.168.48.25&lt;BR /&gt; network-object host 192.168.48.26&lt;BR /&gt; network-object host 192.168.48.27&lt;BR /&gt; network-object host 192.168.48.28&lt;BR /&gt; network-object host 192.168.48.29&lt;BR /&gt; network-object host 192.168.48.111&lt;BR /&gt; network-object host 192.168.48.112&lt;BR /&gt; network-object host 192.168.48.113&lt;BR /&gt; network-object host 192.168.48.114&lt;BR /&gt; network-object host 192.168.48.115&lt;BR /&gt;object-group service FTPPASSIVE tcp&lt;BR /&gt; description FTPPASSIVE&lt;BR /&gt; port-object range 11000 12000&lt;BR /&gt; port-object eq domain&lt;BR /&gt;object-group service DMZIN tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq pop3&lt;BR /&gt; port-object eq smtp&lt;BR /&gt; port-object eq echo&lt;BR /&gt; port-object eq 1000&lt;BR /&gt; port-object eq 3000&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt;access-list dmz_in extended permit ip host 172.16.31.2 any&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any&lt;BR /&gt;access-list dmz_in extended permit udp host 172.16.31.2 any&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq 3000&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq https&lt;BR /&gt;access-list dmz_in extended permit udp host 172.16.31.2 any eq domain&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq pop3&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq smtp&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq www&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq 1000&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq echo&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq ftp&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq ftp-data&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq 587&lt;BR /&gt;access-list dmz_in extended permit udp host 172.16.31.2 any eq 587&lt;BR /&gt;access-list Inside extended permit ip any any&lt;BR /&gt;access-list Inside extended permit icmp any any&lt;BR /&gt;access-list Inside extended permit tcp any any&lt;BR /&gt;access-list Inside extended permit udp any any&lt;BR /&gt;access-list Inside extended permit icmp any any time-exceeded&lt;BR /&gt;access-list 100 extended deny tcp object-group Subredes any eq www&lt;BR /&gt;access-list 100 extended deny tcp object-group Subredes any eq https&lt;BR /&gt;access-list 100 extended permit tcp object-group internet24sept any eq www&lt;BR /&gt;access-list 100 extended permit tcp object-group internet24sept any eq https&lt;BR /&gt;access-list 100 extended permit udp any host x.x.x.130 eq domain&lt;BR /&gt;access-list 100 extended permit tcp any host x.x.x.132 object-group RDP&lt;BR /&gt;access-list 100 extended permit tcp any host x.x.x.133 object-group RDP&lt;BR /&gt;access-list 100 extended permit tcp host 179.60.127.17 host x.x.x.132 objec&lt;BR /&gt;t-group SQL-orix&lt;BR /&gt;access-list 100 extended permit tcp any host x.x.x.130 object-group DMZIN&lt;BR /&gt;access-list 100 extended permit udp any host x.x.x.130 eq echo&lt;BR /&gt;access-list 100 extended permit tcp any host x.x.x.134&lt;BR /&gt;access-list 100 extended permit tcp any host x.x.x.138 object-group RDP&lt;BR /&gt;access-list 100 extended permit tcp host y.y.y.205 host x.x.x.137 obj&lt;BR /&gt;ect-group RDP&lt;BR /&gt;access-list linkser extended permit ip 193.168.1.0 255.255.255.0 192.168.0.0 255&lt;BR /&gt;.255.0.0&lt;BR /&gt;access-list linkser extended permit ip 192.168.0.0 255.255.0.0 193.168.1.0 255.2&lt;BR /&gt;55.255.0&lt;BR /&gt;access-list netflow-export extended permit ip any any&lt;BR /&gt;access-list Inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 19&lt;BR /&gt;2.168.100.0 255.255.255.0&lt;BR /&gt;access-list Outside_mpc remark Acceso al internet para jefes de area&lt;BR /&gt;access-list Outside_mpc extended permit tcp any object-group DM_INLINE_TCP_1 obj&lt;BR /&gt;ect-group priorinet time-range ilimitado&lt;BR /&gt;access-list Outside_mpc_1 remark Salida a internet para servidores LAN&lt;BR /&gt;access-list Outside_mpc_1 extended permit ip any object-group servidores time-ra&lt;BR /&gt;nge ilimitado&lt;BR /&gt;access-list Outside_mpc_2 remark Servidores DMZ&lt;BR /&gt;access-list Outside_mpc_2 extended permit ip any host 172.16.31.2 time-range ili&lt;BR /&gt;mitado&lt;BR /&gt;access-list Inside_access_in extended permit ip any any&lt;BR /&gt;access-list Branch_Office_access_in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;no logging message 106015&lt;BR /&gt;no logging message 313001&lt;BR /&gt;no logging message 313008&lt;BR /&gt;no logging message 106023&lt;BR /&gt;no logging message 710003&lt;BR /&gt;no logging message 106100&lt;BR /&gt;no logging message 302015&lt;BR /&gt;no logging message 302014&lt;BR /&gt;no logging message 302013&lt;BR /&gt;no logging message 302018&lt;BR /&gt;no logging message 302017&lt;BR /&gt;no logging message 302016&lt;BR /&gt;no logging message 302021&lt;BR /&gt;no logging message 302020&lt;BR /&gt;flow-export destination Inside 192.168.0.55 9996&lt;BR /&gt;flow-export destination Inside 192.168.0.17 9996&lt;BR /&gt;flow-export template timeout-rate 1&lt;BR /&gt;flow-export delay flow-create 60&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu Branch_Office 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu LinkserNet 1500&lt;BR /&gt;ip local pool remotas 192.168.0.35-192.168.0.40 mask 255.255.255.0&lt;BR /&gt;ip local pool ipremotas 192.168.0.41-192.168.0.45 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 10 burst-size 5&lt;BR /&gt;icmp permit host 192.168.0.43 Outside&lt;BR /&gt;icmp permit any Outside&lt;BR /&gt;icmp permit any Branch_Office&lt;BR /&gt;icmp permit any DMZ&lt;BR /&gt;asdm image disk0:/asdm-647.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (Outside) 101 interface&lt;BR /&gt;global (DMZ) 101 interface&lt;BR /&gt;global (LinkserNet) 101 interface&lt;BR /&gt;nat (Branch_Office) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (DMZ) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (Inside) 0 access-list Inside_nat0_outbound&lt;BR /&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;static (DMZ,Inside) 172.16.31.0 172.16.31.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;BR /&gt;static (Inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;BR /&gt;static (Inside,Branch_Office) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;BR /&gt;static (DMZ,Branch_Office) 172.16.31.0 172.16.31.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,DMZ) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.3.0 192.168.3.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.2.0 172.16.2.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.3.0 172.16.3.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,DMZ) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.44.0 192.168.44.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.21.0 192.168.21.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.20.0 192.168.20.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.35.0 192.168.35.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.37.0 192.168.37.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.43.0 192.168.43.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.45.0 192.168.45.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.28.0 192.168.28.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.33.0 192.168.33.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.30.0 192.168.30.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.25.0 192.168.25.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.27.0 192.168.27.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.26.0 192.168.26.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.39.0 192.168.39.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.29.0 192.168.29.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.22.0 192.168.22.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.32.0 192.168.32.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 193.168.1.0 193.168.1.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.18.0 192.168.18.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.24.0 192.168.24.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.41.0 192.168.41.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.31.0 192.168.31.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.40.0 192.168.40.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.42.0 192.168.42.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.47.0 192.168.47.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.46.0 192.168.46.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.19.0 192.168.19.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.17.0 192.168.17.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.16.0 192.168.16.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.90.0 192.168.90.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.48.0 192.168.48.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.49.0 192.168.49.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.15.0 192.168.15.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.50.0 192.168.50.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.51.0 192.168.51.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.52.0 192.168.52.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.53.0 192.168.53.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.54.0 192.168.54.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.55.0 192.168.55.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.56.0 192.168.56.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.58.0 192.168.58.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.59.0 192.168.59.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.60.0 192.168.60.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.4.0 172.16.4.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.5.0 172.16.5.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.57.0 192.168.57.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.30.0 172.16.30.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.200.0 192.168.200.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.6.0 172.16.6.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.5.0 192.168.5.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.14.0 192.168.14.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.23.0 192.168.23.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.63.0 192.168.63.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.14.0 172.16.14.0 netmask 255.255.255.0&lt;BR /&gt;static (DMZ,Outside) x.x.x.130 172.16.31.2 netmask 255.255.255.255 dns&lt;BR /&gt;static (Inside,Outside) x.x.x.133 192.168.0.27 netmask 255.255.255.255&lt;BR /&gt;static (Inside,Outside) x.x.x.134 192.168.0.17 netmask 255.255.255.255&lt;BR /&gt;static (Branch_Office,Inside) 192.168.61.0 192.168.61.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.64.0 192.168.64.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.62.0 192.168.62.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.65.0 192.168.65.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.66.0 192.168.66.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.7.0 172.16.7.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.67.0 192.168.67.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.68.0 192.168.68.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.34.0 192.168.34.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.21.208.0 172.21.208.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.8.0 172.16.8.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.16.0 172.16.16.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.9.0 172.16.9.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.101.0 192.168.101.0 netmask 255.255.255.0&lt;BR /&gt;static (Inside,Outside) x.x.x.138 192.168.0.23 netmask 255.255.255.255&lt;BR /&gt;static (Inside,Outside) x.x.x.132 192.168.0.24 netmask 255.255.255.255&lt;BR /&gt;static (Inside,Outside) x.x.x.137 192.168.0.28 netmask 255.255.255.255&lt;BR /&gt;static (Branch_Office,Inside) 192.168.38.0 192.168.38.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.36.0 192.168.36.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.15.0 172.16.15.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.10.0 192.168.10.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.6.0 192.168.6.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.70.0 192.168.70.0 netmask 255.255.255.0&lt;BR /&gt;static (Inside,Branch_Office) 192.168.254.0 192.168.254.0 netmask 255.255.255.0&lt;BR /&gt;static (Inside,Inside) 192.168.254.0 192.168.254.0 netmask 255.255.255.255&lt;BR /&gt;access-group 100 in interface Outside&lt;BR /&gt;access-group Branch_Office_access_in in interface Branch_Office&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 x.x.x.129 20&lt;BR /&gt;route Branch_Office 172.16.1.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.2.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.3.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.4.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.5.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.6.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.7.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 172.16.8.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.9.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.11.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 172.16.13.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 172.16.14.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.15.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.16.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.29.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 172.16.30.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.21.208.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.22.2.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.5.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.6.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.10.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.14.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.15.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.16.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.17.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.18.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.19.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.20.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.21.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.22.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.23.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.24.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.25.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.26.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.27.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.28.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.29.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.30.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.31.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.32.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.33.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.34.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.35.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.36.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.37.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.38.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.39.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.40.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.41.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.42.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.43.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.44.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.45.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.46.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.47.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.48.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.49.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.50.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.51.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.52.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.53.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.54.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.55.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.56.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.57.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.58.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.59.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.60.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.61.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.62.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.63.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.64.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.65.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.66.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.67.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.68.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.70.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.90.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.100.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.101.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.200.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Inside 192.168.254.0 255.255.255.0 192.168.0.3 1&lt;BR /&gt;route Branch_Office 193.168.1.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 Inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 Outside&lt;BR /&gt;snmp-server host Inside 192.168.0.17 community public&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps syslog&lt;BR /&gt;snmp-server enable traps ipsec start stop&lt;BR /&gt;snmp-server enable traps entity config-change fru-insert fru-remove&lt;BR /&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128&lt;BR /&gt;-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256&lt;BR /&gt;-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map Outside_map 2 set peer x.x.217.99&lt;BR /&gt;crypto map Outside_map 2 set transform-set ESP-DES-MD5&lt;BR /&gt;crypto map Outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map Outside_map interface Outside&lt;BR /&gt;crypto isakmp enable Outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash md5&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 Branch_Office&lt;BR /&gt;telnet 172.16.31.0 255.255.255.0 DMZ&lt;BR /&gt;telnet 192.168.0.0 255.255.255.0 Inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 Inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; enable Outside&lt;BR /&gt; svc image disk0:/sslclient-win-1.1.0.154.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec&lt;BR /&gt; default-domain value mydomain.com&lt;BR /&gt;group-policy DefaultRAGroup_1 internal&lt;BR /&gt;group-policy DefaultRAGroup_1 attributes&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec&lt;BR /&gt; default-domain value mydomain.com&lt;BR /&gt;group-policy pruebasrem internal&lt;BR /&gt;group-policy pruebasrem attributes&lt;BR /&gt; vpn-tunnel-protocol svc&lt;BR /&gt;group-policy VPNremoto internal&lt;BR /&gt;group-policy VPNremoto attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; default-domain value mydomain.com&lt;BR /&gt;group-policy remotaprueba internal&lt;BR /&gt;group-policy remotaprueba attributes&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec&lt;BR /&gt; default-domain value mydomain.com&lt;BR /&gt;group-policy chavez123 internal&lt;BR /&gt;group-policy chavez123 attributes&lt;BR /&gt; vpn-tunnel-protocol svc&lt;BR /&gt;username pcastillo password S6J0y476RrREZisS encrypted privilege 15&lt;BR /&gt;username administrador password tEPslqdhFJwwqGYt encrypted privilege 15&lt;BR /&gt;username jmcabrera password Fg3U2hdnlml1CK96 encrypted privilege 15&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool remotas&lt;BR /&gt; address-pool ipremotas&lt;BR /&gt; default-group-policy DefaultRAGroup_1&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;BR /&gt; no authentication chap&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;tunnel-group z.186.39.243 type ipsec-l2l&lt;BR /&gt;tunnel-group x.x.217.99 type ipsec-l2l&lt;BR /&gt;tunnel-group x.x.217.99 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group cisco123 type remote-access&lt;BR /&gt;tunnel-group cisco123 general-attributes&lt;BR /&gt; address-pool remotas&lt;BR /&gt; default-group-policy chavez123&lt;BR /&gt;tunnel-group remotaprueba type remote-access&lt;BR /&gt;tunnel-group remotaprueba general-attributes&lt;BR /&gt; address-pool remotas&lt;BR /&gt; default-group-policy remotaprueba&lt;BR /&gt;tunnel-group remotaprueba ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group pruebasrem type remote-access&lt;BR /&gt;tunnel-group pruebasrem general-attributes&lt;BR /&gt; address-pool ipremotas&lt;BR /&gt; default-group-policy pruebasrem&lt;BR /&gt;tunnel-group VPNremoto type remote-access&lt;BR /&gt;tunnel-group VPNremoto general-attributes&lt;BR /&gt; address-pool ipremotas&lt;BR /&gt; default-group-policy VPNremoto&lt;BR /&gt;tunnel-group VPNremoto ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map netflow-export-class&lt;BR /&gt; match access-list netflow-export&lt;BR /&gt;class-map Outside-class&lt;BR /&gt; description Ancho de banda jefaturas&lt;BR /&gt; match access-list Outside_mpc&lt;BR /&gt;class-map Outside-class2&lt;BR /&gt; description Servidores DMZ&lt;BR /&gt; match access-list Outside_mpc_2&lt;BR /&gt;class-map Outside-class1&lt;BR /&gt; description Servidores LAN&lt;BR /&gt; match access-list Outside_mpc_1&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect icmp&lt;BR /&gt; inspect icmp error&lt;BR /&gt; class netflow-export-class&lt;BR /&gt; flow-export event-type all destination 192.168.0.17&lt;BR /&gt; class class-default&lt;BR /&gt; set connection decrement-ttl&lt;BR /&gt;policy-map Outside-policy&lt;BR /&gt; description Servidores DMZ&lt;BR /&gt; class Outside-class&lt;BR /&gt; inspect http&lt;BR /&gt; police input 3000000 1500&lt;BR /&gt; police output 512000 1500&lt;BR /&gt; class Outside-class1&lt;BR /&gt; inspect http&lt;BR /&gt; police output 1000000 1500&lt;BR /&gt; set connection timeout embryonic 0:00:00 half-closed 0:00:00 tcp 0:00:00&lt;BR /&gt; class Outside-class2&lt;BR /&gt; police output 1000000 1500&lt;BR /&gt; set connection timeout embryonic 0:00:00 half-closed 0:00:00 tcp 0:00:00&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy Outside-policy interface Outside&lt;BR /&gt;privilege cmd level 3 mode exec command perfmon&lt;BR /&gt;privilege cmd level 3 mode exec command ping&lt;BR /&gt;privilege cmd level 3 mode exec command who&lt;BR /&gt;privilege cmd level 3 mode exec command logging&lt;BR /&gt;privilege cmd level 3 mode exec command failover&lt;BR /&gt;privilege cmd level 3 mode exec command vpn-sessiondb&lt;BR /&gt;privilege cmd level 3 mode exec command packet-tracer&lt;BR /&gt;privilege show level 5 mode exec command import&lt;BR /&gt;privilege show level 5 mode exec command running-config&lt;BR /&gt;privilege show level 3 mode exec command reload&lt;BR /&gt;privilege show level 3 mode exec command mode&lt;BR /&gt;privilege show level 3 mode exec command firewall&lt;BR /&gt;privilege show level 3 mode exec command asp&lt;BR /&gt;privilege show level 3 mode exec command cpu&lt;BR /&gt;privilege show level 3 mode exec command interface&lt;BR /&gt;privilege show level 3 mode exec command clock&lt;BR /&gt;privilege show level 3 mode exec command dns-hosts&lt;BR /&gt;privilege show level 3 mode exec command access-list&lt;BR /&gt;privilege show level 3 mode exec command logging&lt;BR /&gt;privilege show level 3 mode exec command vlan&lt;BR /&gt;privilege show level 3 mode exec command ip&lt;BR /&gt;privilege show level 3 mode exec command ipv6&lt;BR /&gt;privilege show level 3 mode exec command failover&lt;BR /&gt;privilege show level 3 mode exec command asdm&lt;BR /&gt;privilege show level 3 mode exec command arp&lt;BR /&gt;privilege show level 3 mode exec command route&lt;BR /&gt;privilege show level 3 mode exec command ospf&lt;BR /&gt;privilege show level 3 mode exec command aaa-server&lt;BR /&gt;privilege show level 3 mode exec command aaa&lt;BR /&gt;privilege show level 3 mode exec command eigrp&lt;BR /&gt;privilege show level 3 mode exec command crypto&lt;BR /&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;BR /&gt;privilege show level 3 mode exec command ssh&lt;BR /&gt;privilege show level 3 mode exec command dhcpd&lt;BR /&gt;privilege show level 3 mode exec command vpn&lt;BR /&gt;privilege show level 3 mode exec command blocks&lt;BR /&gt;privilege show level 3 mode exec command wccp&lt;BR /&gt;privilege show level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege show level 3 mode exec command webvpn&lt;BR /&gt;privilege show level 3 mode exec command module&lt;BR /&gt;privilege show level 3 mode exec command uauth&lt;BR /&gt;privilege show level 3 mode exec command compression&lt;BR /&gt;privilege show level 3 mode configure command interface&lt;BR /&gt;privilege show level 3 mode configure command clock&lt;BR /&gt;privilege show level 3 mode configure command access-list&lt;BR /&gt;privilege show level 3 mode configure command logging&lt;BR /&gt;privilege show level 3 mode configure command ip&lt;BR /&gt;privilege show level 3 mode configure command failover&lt;BR /&gt;privilege show level 5 mode configure command asdm&lt;BR /&gt;privilege show level 3 mode configure command arp&lt;BR /&gt;privilege show level 3 mode configure command route&lt;BR /&gt;privilege show level 3 mode configure command aaa-server&lt;BR /&gt;privilege show level 3 mode configure command aaa&lt;BR /&gt;privilege show level 3 mode configure command crypto&lt;BR /&gt;privilege show level 3 mode configure command ssh&lt;BR /&gt;privilege show level 3 mode configure command dhcpd&lt;BR /&gt;privilege show level 5 mode configure command privilege&lt;BR /&gt;privilege clear level 3 mode exec command dns-hosts&lt;BR /&gt;privilege clear level 3 mode exec command logging&lt;BR /&gt;privilege clear level 3 mode exec command arp&lt;BR /&gt;privilege clear level 3 mode exec command aaa-server&lt;BR /&gt;privilege clear level 3 mode exec command crypto&lt;BR /&gt;privilege clear level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege cmd level 3 mode configure command failover&lt;BR /&gt;privilege clear level 3 mode configure command logging&lt;BR /&gt;privilege clear level 3 mode configure command arp&lt;BR /&gt;privilege clear level 3 mode configure command crypto&lt;BR /&gt;privilege clear level 3 mode configure command aaa-server&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:d40c5285fbe30469c114e58ce02bf211&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014693#M146962</guid>
      <dc:creator>edumatics</dc:creator>
      <dc:date>2019-03-12T08:52:31Z</dc:date>
    </item>
    <item>
      <title>Your ASA config seems to be</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014694#M146967</link>
      <description>&lt;P&gt;Your ASA config seems to be good. Can you run packet-trace command on ASA to make sure that traffic between LAN and SERVER-FARM isn't dropped by ASA (which I don't think the case).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Your actual problem is asymmetric routing. The forward traffic goes as follow:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;LAN Machine - ASA - 3750 - SERVER FARM&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;While your reverse traffic goes as follow:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;SERVER FARM - 3750 - LAN Machine&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is because your LAN and the outside of 3750 are in the same subnet therefore 3750 won't send the reverse traffic back to ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Such flow will be dropped by ASA because this is considered as half-open connection.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now, I think this is a poor design and the best fix is to split e0/3 to two sub-interfaces. One for inside zone and the other one for server-zone. Then you can make the switch port that connects to asa-e0/3&amp;nbsp; as trunk allowing both vlans (inside and serverfarm)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The workaround for current design (not recommended at all) is to create source nat on ASA to change the source subnet (inside machines) to a dummy subnet so that when 3750 forwards the reverse traffic it will send it to ASA as the source subnet isn't same 3750 outside (it sees the dummy subnet as source subnet).&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 17:57:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014694#M146967</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2017-02-02T17:57:49Z</dc:date>
    </item>
    <item>
      <title>Well, this should be fairly</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014695#M146971</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Well, this should be fairly simple, unless there is more than what you have mentioned.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;All we need here is tcp-state-bypass feature selectively between the networks 192.168.0.0/24 and 192.168.254.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The reason is because lan users when initiating traffic, it will go to ASA and then the switch. The reply traffic will come directly to lan users because switch knows that network since they are in same broadcast domain.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;static (inside,inside) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 norandomseq&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;static (inside,inside) 192.168.254.0 192.168.254.0 netmask 255.255.255.0 norandomseq&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Enable tcp-state-bypass, use below link:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_tcpstatebypass.html&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I am attaching an example, might need adjustment as per your existing policy-map(MPF):&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;hostname(config)# access-list tcp_bypass extended permit ip 192.168.0.0 255.255.255.0 192.168.254.0 255.255.255.0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; hostname(config)# class-map tcp_bypass&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; hostname(config-cmap)# description "TCP traffic that bypasses stateful firewall"&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; hostname(config-cmap)# match access-list tcp_bypass&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; hostname(config-cmap)# policy-map tcp_bypass_policy&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; hostname(config-pmap)# class tcp_bypass&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; hostname(config-pmap-c)# set connection advanced-options tcp-state-bypass&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; hostname(config-pmap-c)# service-policy tcp_bypass_policy global&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Disable proxy arp on inside interface:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;sysopt noproxyarp inside&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;failover timeout -1 &amp;nbsp; &amp;nbsp;&lt;/STRONG&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;//hidden deprecated command, might not be needed, just add &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; for sake of it&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;FYI, ping and packet-tracer should not be trusted for checking connectivity. Please rely on tcp traffic for actual testing.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 23:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014695#M146971</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-02-02T23:16:02Z</dc:date>
    </item>
    <item>
      <title>When you are talking about</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014696#M146975</link>
      <description>&lt;P&gt;When you are talking about TCP state bypass, it might work with 2 ASAs right?, Or can i work with one?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 15:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014696#M146975</guid>
      <dc:creator>edumatics</dc:creator>
      <dc:date>2017-02-07T15:17:30Z</dc:date>
    </item>
    <item>
      <title>depends, where is the second</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014697#M146979</link>
      <description>&lt;P&gt;depends, where is the second ASA located. I mean, how is that connected to first physically and logically.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 15:28:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014697#M146979</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-02-07T15:28:23Z</dc:date>
    </item>
    <item>
      <title>Be careful when using TCP</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014698#M146983</link>
      <description>&lt;P&gt;Be careful when using TCP bypass as it is considered a security risk by many. &amp;nbsp;What you are essentially doing is turning off stateful inspection on the ASA meaning that you need to open for return traffic in the interface ACLs.&lt;/P&gt;
&lt;P&gt;It would be better to fix your setup so that return traffic flows through the correct path.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 18:30:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014698#M146983</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-07T18:30:26Z</dc:date>
    </item>
    <item>
      <title>Tcp bypass isn't the right</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014699#M146986</link>
      <description>&lt;P&gt;Tcp bypass isn't the right way. Basically you are converting your asa to stateless router which defeats the purpose of placing asa.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have given you the right approach to go. Just fix you traffic flow&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 19:15:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014699#M146986</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2017-02-07T19:15:27Z</dc:date>
    </item>
    <item>
      <title>I am agree with your</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014700#M146987</link>
      <description>&lt;P&gt;I am agree with your suggestion. We will plan to configure 2 subinterfaces on ASA. Now, i want to connect 3750 to ASA but not sure about configuration, what is your suggested configuration for this switch. Here is the configuration as i have changed yesterday&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Current configuration : 4209 bytes&lt;BR /&gt;!&lt;BR /&gt;version 12.2&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname Switch&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 $1$Po09$o5eAvKbtPghB1PItAO7B10&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone UTC -4&lt;BR /&gt;switch 1 provision ws-c3750-24ts&lt;BR /&gt;system mtu routing 1500&lt;BR /&gt;ip routing&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-3942915712&lt;BR /&gt; enrollment selfsigned&lt;BR /&gt; subject-name cn=IOS-Self-Signed-Certificate-3942915712&lt;BR /&gt; revocation-check none&lt;BR /&gt; rsakeypair TP-self-signed-3942915712&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-3942915712&lt;BR /&gt; certificate self-signed 01&lt;BR /&gt; 3082023F 308201A8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030&lt;BR /&gt; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274&lt;BR /&gt; 69666963 6174652D 33393432 39313537 3132301E 170D3933 30333031 30303031&lt;BR /&gt; 30305A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649&lt;BR /&gt; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 39343239&lt;BR /&gt; 31353731 3230819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281&lt;BR /&gt; 8100BCA6 44E78E9C FEE6DA46 436906AE 138F36E4 6E0E5157 91D21588 847FFFFF&lt;BR /&gt; 46F26A75 638EA7F0 3EFB4308 6C5309CD 3E2BA97E 74C8623F 670FA210 8E367B6E&lt;BR /&gt; A9DEEBF9 E8D00553 2D77D6B2 FC858F05 5EAD3D61 152D110D 89526FA4 353C268F&lt;BR /&gt; 3B417EDE 89CE0695 3BE80390 F065D0B7 12B4BA5E A7C3FC06 44F9E198 7DD91223&lt;BR /&gt; 43090203 010001A3 67306530 0F060355 1D130101 FF040530 030101FF 30120603&lt;BR /&gt; 551D1104 0B300982 07537769 7463682E 301F0603 551D2304 18301680 14E95A1B&lt;BR /&gt; 9DF0A1A9 38DEDC27 8BA5CBA0 2CBA34CC B9301D06 03551D0E 04160414 E95A1B9D&lt;BR /&gt; F0A1A938 DEDC278B A5CBA02C BA34CCB9 300D0609 2A864886 F70D0101 04050003&lt;BR /&gt; 81810049 E2AD1007 57830A82 1274402B 870FA962 1C8624B1 C0AEE7C3 DFBA7883&lt;BR /&gt; F38A2456 C4CFE321 C50685A3 B9A20C8E 7B3704F8 FE95D9EC F2F93CA8 2EE5CE2D&lt;BR /&gt; 86F3657C 00042BA6 B88CED9A 21B687E7 4E892842 C740C7D0 1B948554 20707A42&lt;BR /&gt; 65EA26C2 65E59AFD 7C69D6EA A43F5319 4CD07F11 02C3A34A 56DA6F2A 368485AC 9829CC&lt;BR /&gt; quit&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/1&lt;BR /&gt; switchport trunk encapsulation dot1q&lt;BR /&gt; switchport mode trunk&lt;BR /&gt; ip access-group 100 in&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/2&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/3&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/4&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/5&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/6&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/7&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/8&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/9&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/10&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/11&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/12&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/13&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/14&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/15&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/16&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/17&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/18&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/19&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/20&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/21&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/22&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/23&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0/24&lt;BR /&gt; no switchport&lt;BR /&gt; ip address 192.168.0.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; ip address 192.168.253.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; ip address 192.168.254.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 192.168.0.2&lt;BR /&gt;ip classless&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 192.168.0.2&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;access-list 100 permit icmp 192.168.0.0 0.0.255.255 any echo-reply&lt;BR /&gt;access-list 100 permit tcp 192.168.0.0 0.0.255.255 any eq www&lt;BR /&gt;access-list 100 permit tcp 192.168.0.0 0.0.0.31 any eq 139&lt;BR /&gt;access-list 100 permit tcp 192.168.0.0 0.0.0.31 any eq 445&lt;BR /&gt;access-list 100 permit udp 192.168.0.0 0.0.0.31 any eq netbios-ns&lt;BR /&gt;access-list 100 permit udp 192.168.0.0 0.0.0.31 any eq netbios-dgm&lt;BR /&gt;access-list 100 permit tcp 192.168.0.0 0.0.0.32 any eq 3389&lt;BR /&gt;access-list 100 permit tcp host 192.168.0.11 any eq echo&lt;BR /&gt;access-list 100 permit icmp 192.168.0.0 0.0.255.255 any echo&lt;BR /&gt;access-list 100 permit tcp 192.168.0.0 0.0.0.255 any eq telnet&lt;BR /&gt;access-list 100 deny tcp any any&lt;BR /&gt;access-list 100 deny udp any any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt; password T3cn1c0ch&lt;BR /&gt; login&lt;BR /&gt;line vty 5 15&lt;BR /&gt; password T3cn1c0ch&lt;BR /&gt; login&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 16:17:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014700#M146987</guid>
      <dc:creator>edumatics</dc:creator>
      <dc:date>2017-02-14T16:17:34Z</dc:date>
    </item>
    <item>
      <title>Nothing much. Just make the</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014701#M146990</link>
      <description>&lt;P&gt;Nothing much. Just make the port connected to ASA as L2 trunk port to carry both vlans of the sub-interfaces. This should be fairly straight forward.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I don't see any special config in 3750 which needs manipulation in ASA other than the ACLs.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 17:21:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014701#M146990</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2017-02-14T17:21:09Z</dc:date>
    </item>
    <item>
      <title>Do you mean ASA ACLs or 3750</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014702#M146992</link>
      <description>&lt;P&gt;Do you mean ASA ACLs or 3750 ACLs?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2017 21:15:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014702#M146992</guid>
      <dc:creator>edumatics</dc:creator>
      <dc:date>2017-02-16T21:15:59Z</dc:date>
    </item>
    <item>
      <title>Dear Mohammed, I am a little</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014703#M146994</link>
      <description>&lt;P&gt;Dear Mohammed, I am a little confused with trunk configuration on Catalyst 3750. I want to use routing feature and ACLs on that switch but i am not sure if this configuration is fine. I am posting a diagram of our network (Just the LAN and the Server Farm) to explain what i want.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Computers in LAN can access to Server farm (Depending on switch ACLs) and internet (About internet i do not have any problem&lt;/P&gt;
&lt;P&gt;Servers in server farm can access to LAN also to internet. Can you help me on correcting 3750 configuration?. Port 24 must be connected to ASA. LAN and Server farm switch must be connected to same physical interface on ASA to 2 subinterfaces&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2017 22:48:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014703#M146994</guid>
      <dc:creator>edumatics</dc:creator>
      <dc:date>2017-02-16T22:48:58Z</dc:date>
    </item>
    <item>
      <title>Dear Mohammed, I made some</title>
      <link>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014704#M146995</link>
      <description>&lt;P&gt;Dear Mohammed, I made some changes to implement your suggestion but i want to know i my new configuration will work fine. Also i want to summarize networks but i am not sure if ASA accepts for instance this sumarization:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;static (Branch_Office,Insidetmp) 192.168.4.0 192.168.4.0 netmask 255.255.240.0 (This summarization should include networks from 4.0 to 15.0)&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Also I forgot to mention that we want to map some servers in the farm using 192.168.0.0 addresses. The entire company must access to those servers. Ex.: Computer in the network 192.168.40.0 must access to server 192.168.0.25 (192.168.0.25 is a mapped address, Real address is 192.168.254.10). I know this configuration works for Subinterface Inside computers but I am not sure if it works for Branch_Office interface. Can check config to know if it works?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here's my new config:&lt;/P&gt;
&lt;P&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ASAFCHFW&lt;BR /&gt;domain-name mydomain.com&lt;BR /&gt;enable password kFJzUkFi3silH1Ye encrypted&lt;BR /&gt;passwd PVSASRJovmamnVkD encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;nameif Outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.131 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif Branch_Office&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 10&lt;BR /&gt;ip address 172.16.31.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;Description InsideNetworks&lt;BR /&gt;nameif Internal&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3.1&lt;BR /&gt;Description Inside&lt;BR /&gt;nameif Inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3.2&lt;BR /&gt;Description ServerFarm&lt;BR /&gt;nameif SvrFarm&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.254.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif LinkserNet&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.16.6.2 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;time-range ilimitado&lt;BR /&gt;periodic daily 0:00 to 23:59&lt;BR /&gt;!&lt;BR /&gt;banner exec # WARNING!! Unauthorized Access Prohibited!! #&lt;BR /&gt;banner login # WARNING!! Unauthorized Access Prohibited!! #&lt;BR /&gt;banner motd # WARNING!! Unauthorized Access Prohibited!! #&lt;BR /&gt;boot system disk0:/asa821-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone BOT -4&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name mydomain.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service RDP tcp&lt;BR /&gt;port-object eq 3389&lt;BR /&gt;object-group network Subredes&lt;BR /&gt;network-object 192.168.10.0 255.255.255.0&lt;BR /&gt;network-object 192.168.11.0 255.255.255.0&lt;BR /&gt;network-object 192.168.12.0 255.255.255.0&lt;BR /&gt;network-object 192.168.13.0 255.255.255.0&lt;BR /&gt;network-object 192.168.14.0 255.255.255.0&lt;BR /&gt;network-object 192.168.15.0 255.255.255.0&lt;BR /&gt;network-object 192.168.16.0 255.255.255.0&lt;BR /&gt;network-object 192.168.17.0 255.255.255.0&lt;BR /&gt;network-object 192.168.18.0 255.255.255.0&lt;BR /&gt;network-object 192.168.19.0 255.255.255.0&lt;BR /&gt;network-object 192.168.20.0 255.255.255.0&lt;BR /&gt;network-object 192.168.21.0 255.255.255.0&lt;BR /&gt;network-object 192.168.22.0 255.255.255.0&lt;BR /&gt;network-object 192.168.23.0 255.255.255.0&lt;BR /&gt;network-object 192.168.24.0 255.255.255.0&lt;BR /&gt;network-object 192.168.25.0 255.255.255.0&lt;BR /&gt;network-object 192.168.26.0 255.255.255.0&lt;BR /&gt;network-object 192.168.27.0 255.255.255.0&lt;BR /&gt;network-object 192.168.28.0 255.255.255.0&lt;BR /&gt;network-object 192.168.29.0 255.255.255.0&lt;BR /&gt;network-object 192.168.30.0 255.255.255.0&lt;BR /&gt;network-object 192.168.31.0 255.255.255.0&lt;BR /&gt;network-object 192.168.32.0 255.255.255.0&lt;BR /&gt;network-object 192.168.33.0 255.255.255.0&lt;BR /&gt;network-object 192.168.34.0 255.255.255.0&lt;BR /&gt;network-object 192.168.35.0 255.255.255.0&lt;BR /&gt;network-object 192.168.36.0 255.255.255.0&lt;BR /&gt;network-object 192.168.37.0 255.255.255.0&lt;BR /&gt;network-object 192.168.38.0 255.255.255.0&lt;BR /&gt;network-object 192.168.39.0 255.255.255.0&lt;BR /&gt;network-object 192.168.40.0 255.255.255.0&lt;BR /&gt;network-object 192.168.41.0 255.255.255.0&lt;BR /&gt;network-object 192.168.42.0 255.255.255.0&lt;BR /&gt;network-object 192.168.43.0 255.255.255.0&lt;BR /&gt;network-object 192.168.44.0 255.255.255.0&lt;BR /&gt;network-object 192.168.45.0 255.255.255.0&lt;BR /&gt;network-object 192.168.46.0 255.255.255.0&lt;BR /&gt;network-object 192.168.47.0 255.255.255.0&lt;BR /&gt;network-object 192.168.48.0 255.255.255.0&lt;BR /&gt;network-object 192.168.49.0 255.255.255.0&lt;BR /&gt;network-object 192.168.50.0 255.255.255.0&lt;BR /&gt;network-object 192.168.51.0 255.255.255.0&lt;BR /&gt;network-object 192.168.52.0 255.255.255.0&lt;BR /&gt;network-object 192.168.53.0 255.255.255.0&lt;BR /&gt;network-object 192.168.54.0 255.255.255.0&lt;BR /&gt;network-object 192.168.55.0 255.255.255.0&lt;BR /&gt;network-object 192.168.56.0 255.255.255.0&lt;BR /&gt;network-object 192.168.57.0 255.255.255.0&lt;BR /&gt;network-object 192.168.58.0 255.255.255.0&lt;BR /&gt;network-object 192.168.59.0 255.255.255.0&lt;BR /&gt;network-object 192.168.60.0 255.255.255.0&lt;BR /&gt;network-object 192.168.61.0 255.255.255.0&lt;BR /&gt;network-object 192.168.62.0 255.255.255.0&lt;BR /&gt;network-object 192.168.63.0 255.255.255.0&lt;BR /&gt;network-object 192.168.64.0 255.255.255.0&lt;BR /&gt;network-object 192.168.65.0 255.255.255.0&lt;BR /&gt;network-object 192.168.66.0 255.255.255.0&lt;BR /&gt;network-object 192.168.67.0 255.255.255.0&lt;BR /&gt;network-object 192.168.68.0 255.255.255.0&lt;BR /&gt;object-group service SQL-orix tcp&lt;BR /&gt;port-object eq 1433&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq 1434&lt;BR /&gt;port-object eq 135&lt;BR /&gt;port-object eq 2383&lt;BR /&gt;port-object eq 2382&lt;BR /&gt;port-object eq https&lt;BR /&gt;object-group network priorinet&lt;BR /&gt;network-object host 192.168.0.34&lt;BR /&gt;network-object host 192.168.0.31&lt;BR /&gt;network-object host 192.168.0.35&lt;BR /&gt;network-object host 192.168.0.36&lt;BR /&gt;network-object host 192.168.0.45&lt;BR /&gt;network-object host 192.168.0.112&lt;BR /&gt;network-object host 192.168.0.138&lt;BR /&gt;network-object host 192.168.0.156&lt;BR /&gt;network-object host 192.168.0.179&lt;BR /&gt;network-object host 192.168.0.198&lt;BR /&gt;network-object host 192.168.0.213&lt;BR /&gt;network-object host 192.168.0.115&lt;BR /&gt;object-group network servidores&lt;BR /&gt;network-object host 192.168.0.16&lt;BR /&gt;network-object host 192.168.0.17&lt;BR /&gt;network-object host 192.168.0.18&lt;BR /&gt;network-object host 192.168.0.19&lt;BR /&gt;network-object host 192.168.0.25&lt;BR /&gt;network-object host 192.168.0.27&lt;BR /&gt;network-object host 192.168.0.28&lt;BR /&gt;network-object host 192.168.0.55&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;object-group network internet24sept&lt;BR /&gt;network-object host 192.168.48.20&lt;BR /&gt;network-object host 192.168.48.21&lt;BR /&gt;network-object host 192.168.48.22&lt;BR /&gt;network-object host 192.168.48.23&lt;BR /&gt;network-object host 192.168.48.24&lt;BR /&gt;network-object host 192.168.48.25&lt;BR /&gt;network-object host 192.168.48.26&lt;BR /&gt;network-object host 192.168.48.27&lt;BR /&gt;network-object host 192.168.48.28&lt;BR /&gt;network-object host 192.168.48.29&lt;BR /&gt;network-object host 192.168.48.111&lt;BR /&gt;network-object host 192.168.48.112&lt;BR /&gt;network-object host 192.168.48.113&lt;BR /&gt;network-object host 192.168.48.114&lt;BR /&gt;network-object host 192.168.48.115&lt;BR /&gt;object-group service FTPPASSIVE tcp&lt;BR /&gt;description FTPPASSIVE&lt;BR /&gt;port-object range 11000 12000&lt;BR /&gt;port-object eq domain&lt;BR /&gt;object-group service DMZIN tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;port-object eq echo&lt;BR /&gt;port-object eq 1000&lt;BR /&gt;port-object eq 3000&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq ftp-data&lt;BR /&gt;access-list dmz_in extended permit ip host 172.16.31.2 any&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any&lt;BR /&gt;access-list dmz_in extended permit udp host 172.16.31.2 any&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq 3000&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq https&lt;BR /&gt;access-list dmz_in extended permit udp host 172.16.31.2 any eq domain&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq pop3&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq smtp&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq www&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq 1000&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq echo&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq ftp&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq ftp-data&lt;BR /&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq 587&lt;BR /&gt;access-list dmz_in extended permit udp host 172.16.31.2 any eq 587&lt;BR /&gt;access-list Inside extended permit ip any any&lt;BR /&gt;access-list Inside extended permit icmp any any&lt;BR /&gt;access-list Inside extended permit tcp any any&lt;BR /&gt;access-list Inside extended permit udp any any&lt;BR /&gt;access-list Inside extended permit icmp any any time-exceeded&lt;BR /&gt;access-list 100 extended deny tcp object-group Subredes any eq www&lt;BR /&gt;access-list 100 extended deny tcp object-group Subredes any eq https&lt;BR /&gt;access-list 100 extended permit tcp object-group internet24sept any eq www&lt;BR /&gt;access-list 100 extended permit tcp object-group internet24sept any eq https&lt;BR /&gt;access-list 100 extended permit udp any host x.x.x.130 eq domain&lt;BR /&gt;access-list 100 extended permit tcp any host x.x.x.132 object-group RDP&lt;BR /&gt;access-list 100 extended permit tcp any host x.x.x.133 object-group RDP&lt;BR /&gt;access-list 100 extended permit tcp host 179.60.127.17 host x.x.x.132 objec&lt;BR /&gt;t-group SQL-orix&lt;BR /&gt;access-list 100 extended permit tcp any host x.x.x.130 object-group DMZIN&lt;BR /&gt;access-list 100 extended permit udp any host x.x.x.130 eq echo&lt;BR /&gt;access-list 100 extended permit tcp any host x.x.x.134&lt;BR /&gt;access-list 100 extended permit tcp any host x.x.x.138 object-group RDP&lt;BR /&gt;access-list 100 extended permit tcp host y.y.y.205 host x.x.x.137 obj&lt;BR /&gt;ect-group RDP&lt;BR /&gt;access-list linkser extended permit ip 193.168.1.0 255.255.255.0 192.168.0.0 255&lt;BR /&gt;.255.0.0&lt;BR /&gt;access-list linkser extended permit ip 192.168.0.0 255.255.0.0 193.168.1.0 255.2&lt;BR /&gt;55.255.0&lt;BR /&gt;access-list netflow-export extended permit ip any any&lt;BR /&gt;access-list Inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 19&lt;BR /&gt;2.168.100.0 255.255.255.0&lt;BR /&gt;access-list Outside_mpc remark Acceso al internet para jefes de area&lt;BR /&gt;access-list Outside_mpc extended permit tcp any object-group DM_INLINE_TCP_1 obj&lt;BR /&gt;ect-group priorinet time-range ilimitado&lt;BR /&gt;access-list Outside_mpc_1 remark Salida a internet para servidores LAN&lt;BR /&gt;access-list Outside_mpc_1 extended permit ip any object-group servidores time-ra&lt;BR /&gt;nge ilimitado&lt;BR /&gt;access-list Outside_mpc_2 remark Servidores DMZ&lt;BR /&gt;access-list Outside_mpc_2 extended permit ip any host 172.16.31.2 time-range ili&lt;BR /&gt;mitado&lt;BR /&gt;access-list Inside_access_in extended permit ip any any&lt;BR /&gt;access-list Branch_Office_access_in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;no logging message 106015&lt;BR /&gt;no logging message 313001&lt;BR /&gt;no logging message 313008&lt;BR /&gt;no logging message 106023&lt;BR /&gt;no logging message 710003&lt;BR /&gt;no logging message 106100&lt;BR /&gt;no logging message 302015&lt;BR /&gt;no logging message 302014&lt;BR /&gt;no logging message 302013&lt;BR /&gt;no logging message 302018&lt;BR /&gt;no logging message 302017&lt;BR /&gt;no logging message 302016&lt;BR /&gt;no logging message 302021&lt;BR /&gt;no logging message 302020&lt;BR /&gt;flow-export destination Inside 192.168.0.55 9996&lt;BR /&gt;flow-export destination Inside 192.168.0.17 9996&lt;BR /&gt;flow-export template timeout-rate 1&lt;BR /&gt;flow-export delay flow-create 60&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu Branch_Office 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu LinkserNet 1500&lt;BR /&gt;ip local pool remotas 192.168.0.35-192.168.0.40 mask 255.255.255.0&lt;BR /&gt;ip local pool ipremotas 192.168.0.41-192.168.0.45 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 10 burst-size 5&lt;BR /&gt;icmp permit host 192.168.0.43 Outside&lt;BR /&gt;icmp permit any Outside&lt;BR /&gt;icmp permit any Branch_Office&lt;BR /&gt;icmp permit any DMZ&lt;BR /&gt;asdm image disk0:/asdm-647.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (Outside) 101 interface&lt;BR /&gt;global (DMZ) 101 interface&lt;BR /&gt;global (LinkserNet) 101 interface&lt;BR /&gt;nat (Branch_Office) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (SvrFarm) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (DMZ) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (Inside) 0 access-list Inside_nat0_outbound&lt;BR /&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;static (DMZ,Inside) 172.16.31.0 172.16.31.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;BR /&gt;static (Inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;BR /&gt;static (Inside,Branch_Office) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;BR /&gt;static (DMZ,Branch_Office) 172.16.31.0 172.16.31.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,DMZ) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.3.0 192.168.3.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.2.0 172.16.2.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.3.0 172.16.3.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,DMZ) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.44.0 192.168.44.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.21.0 192.168.21.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.20.0 192.168.20.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.35.0 192.168.35.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.37.0 192.168.37.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.43.0 192.168.43.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.45.0 192.168.45.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.28.0 192.168.28.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.33.0 192.168.33.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.30.0 192.168.30.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.25.0 192.168.25.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.27.0 192.168.27.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.26.0 192.168.26.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.39.0 192.168.39.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.29.0 192.168.29.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.22.0 192.168.22.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.32.0 192.168.32.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 193.168.1.0 193.168.1.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.18.0 192.168.18.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.24.0 192.168.24.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.41.0 192.168.41.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.31.0 192.168.31.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.40.0 192.168.40.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.42.0 192.168.42.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.47.0 192.168.47.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.46.0 192.168.46.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.19.0 192.168.19.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.17.0 192.168.17.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.16.0 192.168.16.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.90.0 192.168.90.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.48.0 192.168.48.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.49.0 192.168.49.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.15.0 192.168.15.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.50.0 192.168.50.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.51.0 192.168.51.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.52.0 192.168.52.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.53.0 192.168.53.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.54.0 192.168.54.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.55.0 192.168.55.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.56.0 192.168.56.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.58.0 192.168.58.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.59.0 192.168.59.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.60.0 192.168.60.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.4.0 172.16.4.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.5.0 172.16.5.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.57.0 192.168.57.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.30.0 172.16.30.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.200.0 192.168.200.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.6.0 172.16.6.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.5.0 192.168.5.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.14.0 192.168.14.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.23.0 192.168.23.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.63.0 192.168.63.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.14.0 172.16.14.0 netmask 255.255.255.0&lt;BR /&gt;static (DMZ,Outside) x.x.x.130 172.16.31.2 netmask 255.255.255.255 dns&lt;BR /&gt;static (Inside,Outside) x.x.x.133 192.168.0.27 netmask 255.255.255.255&lt;BR /&gt;static (Inside,Outside) x.x.x.134 192.168.0.17 netmask 255.255.255.255&lt;BR /&gt;static (Branch_Office,Inside) 192.168.61.0 192.168.61.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.64.0 192.168.64.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.62.0 192.168.62.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.65.0 192.168.65.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.66.0 192.168.66.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.7.0 172.16.7.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.67.0 192.168.67.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.68.0 192.168.68.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.34.0 192.168.34.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.21.208.0 172.21.208.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.8.0 172.16.8.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.16.0 172.16.16.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.9.0 172.16.9.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.101.0 192.168.101.0 netmask 255.255.255.0&lt;BR /&gt;static (Inside,Outside) x.x.x.138 192.168.0.23 netmask 255.255.255.255&lt;BR /&gt;static (Inside,Outside) x.x.x.132 192.168.0.24 netmask 255.255.255.255&lt;BR /&gt;static (Inside,Outside) x.x.x.137 192.168.0.28 netmask 255.255.255.255&lt;BR /&gt;static (Branch_Office,Inside) 192.168.38.0 192.168.38.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.36.0 192.168.36.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 172.16.15.0 172.16.15.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.10.0 192.168.10.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.6.0 192.168.6.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,Inside) 192.168.70.0 192.168.70.0 netmask 255.255.255.0&lt;BR /&gt;static (SvrFarm,Branch_Office) 192.168.254.0 192.168.254.0 netmask 255.255.255.0&lt;BR /&gt;static (Inside,SvrFarm) 192.168.0.0 192.168.0.0 netmask 255.255.255.255&lt;BR /&gt;static (SvrFarm,Inside) 192.168.0.25 192.168.254.25 netmask 255.255.255.255&lt;BR /&gt;static (SvrFarm,Branch_Office) 192.168.0.25 192.168.254.25 netmask 255.255.255.255&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.3.0 192.168.3.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.2.0 172.16.2.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.3.0 172.16.3.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.44.0 192.168.44.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.21.0 192.168.21.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.20.0 192.168.20.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.35.0 192.168.35.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.37.0 192.168.37.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.43.0 192.168.43.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.45.0 192.168.45.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.28.0 192.168.28.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.33.0 192.168.33.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.30.0 192.168.30.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.25.0 192.168.25.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.27.0 192.168.27.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.26.0 192.168.26.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.39.0 192.168.39.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.29.0 192.168.29.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.22.0 192.168.22.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.32.0 192.168.32.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 193.168.1.0 193.168.1.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.18.0 192.168.18.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.24.0 192.168.24.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.41.0 192.168.41.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.31.0 192.168.31.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.40.0 192.168.40.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.42.0 192.168.42.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.47.0 192.168.47.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.46.0 192.168.46.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.19.0 192.168.19.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.17.0 192.168.17.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.16.0 192.168.16.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.90.0 192.168.90.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.48.0 192.168.48.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.49.0 192.168.49.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.15.0 192.168.15.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.50.0 192.168.50.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.51.0 192.168.51.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.52.0 192.168.52.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.53.0 192.168.53.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.54.0 192.168.54.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.55.0 192.168.55.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.56.0 192.168.56.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.58.0 192.168.58.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.59.0 192.168.59.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.60.0 192.168.60.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.4.0 172.16.4.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.5.0 172.16.5.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.57.0 192.168.57.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.30.0 172.16.30.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.200.0 192.168.200.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.6.0 172.16.6.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.5.0 192.168.5.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.14.0 192.168.14.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.23.0 192.168.23.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.63.0 192.168.63.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.14.0 172.16.14.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.61.0 192.168.61.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.64.0 192.168.64.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.62.0 192.168.62.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.65.0 192.168.65.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.66.0 192.168.66.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.7.0 172.16.7.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.67.0 192.168.67.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.68.0 192.168.68.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.34.0 192.168.34.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.21.208.0 172.21.208.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.8.0 172.16.8.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.16.0 172.16.16.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.9.0 172.16.9.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.101.0 192.168.101.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.38.0 192.168.38.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.36.0 192.168.36.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 172.16.15.0 172.16.15.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.10.0 192.168.10.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.6.0 192.168.6.0 netmask 255.255.255.0&lt;BR /&gt;static (Branch_Office,SvrFarm) 192.168.70.0 192.168.70.0 netmask 255.255.255.0&lt;BR /&gt;access-group 100 in interface Outside&lt;BR /&gt;access-group Branch_Office_access_in in interface Branch_Office&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 x.x.x.129 20&lt;BR /&gt;route Branch_Office 172.16.1.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.2.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.3.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.4.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.5.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.6.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.7.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 172.16.8.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.9.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.11.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 172.16.13.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 172.16.14.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.15.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.16.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.16.29.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 172.16.30.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.21.208.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 172.22.2.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.5.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.6.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.10.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.14.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.15.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.16.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.17.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.18.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.19.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.20.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.21.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.22.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.23.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.24.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.25.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.26.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.27.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.28.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.29.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.30.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.31.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.32.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.33.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.34.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.35.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.36.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.37.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.38.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.39.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.40.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.41.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.42.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.43.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.44.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.45.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.46.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.47.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.48.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.49.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.50.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.51.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.52.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.53.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.54.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.55.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.56.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.57.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.58.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.59.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.60.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.61.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.62.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.63.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.64.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.65.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.66.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.67.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.68.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.70.0 255.255.255.0 192.168.2.199 1&lt;BR /&gt;route Branch_Office 192.168.90.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.100.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.101.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 192.168.200.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;route Branch_Office 193.168.1.0 255.255.255.0 192.168.2.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 Inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 Outside&lt;BR /&gt;snmp-server host Inside 192.168.0.17 community public&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps syslog&lt;BR /&gt;snmp-server enable traps ipsec start stop&lt;BR /&gt;snmp-server enable traps entity config-change fru-insert fru-remove&lt;BR /&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128&lt;BR /&gt;-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256&lt;BR /&gt;-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map Outside_map 2 set peer x.x.217.99&lt;BR /&gt;crypto map Outside_map 2 set transform-set ESP-DES-MD5&lt;BR /&gt;crypto map Outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map Outside_map interface Outside&lt;BR /&gt;crypto isakmp enable Outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash md5&lt;BR /&gt;group 1&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 1&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 Branch_Office&lt;BR /&gt;telnet 172.16.31.0 255.255.255.0 DMZ&lt;BR /&gt;telnet 192.168.0.0 255.255.255.0 Inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 Inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;enable Outside&lt;BR /&gt;svc image disk0:/sslclient-win-1.1.0.154.pkg 1&lt;BR /&gt;svc enable&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt;vpn-tunnel-protocol l2tp-ipsec&lt;BR /&gt;default-domain value mydomain.com&lt;BR /&gt;group-policy DefaultRAGroup_1 internal&lt;BR /&gt;group-policy DefaultRAGroup_1 attributes&lt;BR /&gt;vpn-tunnel-protocol l2tp-ipsec&lt;BR /&gt;default-domain value mydomain.com&lt;BR /&gt;group-policy pruebasrem internal&lt;BR /&gt;group-policy pruebasrem attributes&lt;BR /&gt;vpn-tunnel-protocol svc&lt;BR /&gt;group-policy VPNremoto internal&lt;BR /&gt;group-policy VPNremoto attributes&lt;BR /&gt;vpn-tunnel-protocol IPSec&lt;BR /&gt;default-domain value mydomain.com&lt;BR /&gt;group-policy remotaprueba internal&lt;BR /&gt;group-policy remotaprueba attributes&lt;BR /&gt;vpn-tunnel-protocol l2tp-ipsec&lt;BR /&gt;default-domain value mydomain.com&lt;BR /&gt;group-policy chavez123 internal&lt;BR /&gt;group-policy chavez123 attributes&lt;BR /&gt;vpn-tunnel-protocol svc&lt;BR /&gt;username pcastillo password S6J0y476RrREZisS encrypted privilege 15&lt;BR /&gt;username administrador password tEPslqdhFJwwqGYt encrypted privilege 15&lt;BR /&gt;username jmcabrera password Fg3U2hdnlml1CK96 encrypted privilege 15&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt;address-pool remotas&lt;BR /&gt;address-pool ipremotas&lt;BR /&gt;default-group-policy DefaultRAGroup_1&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;BR /&gt;no authentication chap&lt;BR /&gt;authentication ms-chap-v2&lt;BR /&gt;tunnel-group z.186.39.243 type ipsec-l2l&lt;BR /&gt;tunnel-group x.x.217.99 type ipsec-l2l&lt;BR /&gt;tunnel-group x.x.217.99 ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;tunnel-group cisco123 type remote-access&lt;BR /&gt;tunnel-group cisco123 general-attributes&lt;BR /&gt;address-pool remotas&lt;BR /&gt;default-group-policy chavez123&lt;BR /&gt;tunnel-group remotaprueba type remote-access&lt;BR /&gt;tunnel-group remotaprueba general-attributes&lt;BR /&gt;address-pool remotas&lt;BR /&gt;default-group-policy remotaprueba&lt;BR /&gt;tunnel-group remotaprueba ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;tunnel-group pruebasrem type remote-access&lt;BR /&gt;tunnel-group pruebasrem general-attributes&lt;BR /&gt;address-pool ipremotas&lt;BR /&gt;default-group-policy pruebasrem&lt;BR /&gt;tunnel-group VPNremoto type remote-access&lt;BR /&gt;tunnel-group VPNremoto general-attributes&lt;BR /&gt;address-pool ipremotas&lt;BR /&gt;default-group-policy VPNremoto&lt;BR /&gt;tunnel-group VPNremoto ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map netflow-export-class&lt;BR /&gt;match access-list netflow-export&lt;BR /&gt;class-map Outside-class&lt;BR /&gt;description Ancho de banda jefaturas&lt;BR /&gt;match access-list Outside_mpc&lt;BR /&gt;class-map Outside-class2&lt;BR /&gt;description Servidores DMZ&lt;BR /&gt;match access-list Outside_mpc_2&lt;BR /&gt;class-map Outside-class1&lt;BR /&gt;description Servidores LAN&lt;BR /&gt;match access-list Outside_mpc_1&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect icmp error&lt;BR /&gt;class netflow-export-class&lt;BR /&gt;flow-export event-type all destination 192.168.0.17&lt;BR /&gt;class class-default&lt;BR /&gt;set connection decrement-ttl&lt;BR /&gt;policy-map Outside-policy&lt;BR /&gt;description Servidores DMZ&lt;BR /&gt;class Outside-class&lt;BR /&gt;inspect http&lt;BR /&gt;police input 3000000 1500&lt;BR /&gt;police output 512000 1500&lt;BR /&gt;class Outside-class1&lt;BR /&gt;inspect http&lt;BR /&gt;police output 1000000 1500&lt;BR /&gt;set connection timeout embryonic 0:00:00 half-closed 0:00:00 tcp 0:00:00&lt;BR /&gt;class Outside-class2&lt;BR /&gt;police output 1000000 1500&lt;BR /&gt;set connection timeout embryonic 0:00:00 half-closed 0:00:00 tcp 0:00:00&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy Outside-policy interface Outside&lt;BR /&gt;privilege cmd level 3 mode exec command perfmon&lt;BR /&gt;privilege cmd level 3 mode exec command ping&lt;BR /&gt;privilege cmd level 3 mode exec command who&lt;BR /&gt;privilege cmd level 3 mode exec command logging&lt;BR /&gt;privilege cmd level 3 mode exec command failover&lt;BR /&gt;privilege cmd level 3 mode exec command vpn-sessiondb&lt;BR /&gt;privilege cmd level 3 mode exec command packet-tracer&lt;BR /&gt;privilege show level 5 mode exec command import&lt;BR /&gt;privilege show level 5 mode exec command running-config&lt;BR /&gt;privilege show level 3 mode exec command reload&lt;BR /&gt;privilege show level 3 mode exec command mode&lt;BR /&gt;privilege show level 3 mode exec command firewall&lt;BR /&gt;privilege show level 3 mode exec command asp&lt;BR /&gt;privilege show level 3 mode exec command cpu&lt;BR /&gt;privilege show level 3 mode exec command interface&lt;BR /&gt;privilege show level 3 mode exec command clock&lt;BR /&gt;privilege show level 3 mode exec command dns-hosts&lt;BR /&gt;privilege show level 3 mode exec command access-list&lt;BR /&gt;privilege show level 3 mode exec command logging&lt;BR /&gt;privilege show level 3 mode exec command vlan&lt;BR /&gt;privilege show level 3 mode exec command ip&lt;BR /&gt;privilege show level 3 mode exec command ipv6&lt;BR /&gt;privilege show level 3 mode exec command failover&lt;BR /&gt;privilege show level 3 mode exec command asdm&lt;BR /&gt;privilege show level 3 mode exec command arp&lt;BR /&gt;privilege show level 3 mode exec command route&lt;BR /&gt;privilege show level 3 mode exec command ospf&lt;BR /&gt;privilege show level 3 mode exec command aaa-server&lt;BR /&gt;privilege show level 3 mode exec command aaa&lt;BR /&gt;privilege show level 3 mode exec command eigrp&lt;BR /&gt;privilege show level 3 mode exec command crypto&lt;BR /&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;BR /&gt;privilege show level 3 mode exec command ssh&lt;BR /&gt;privilege show level 3 mode exec command dhcpd&lt;BR /&gt;privilege show level 3 mode exec command vpn&lt;BR /&gt;privilege show level 3 mode exec command blocks&lt;BR /&gt;privilege show level 3 mode exec command wccp&lt;BR /&gt;privilege show level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege show level 3 mode exec command webvpn&lt;BR /&gt;privilege show level 3 mode exec command module&lt;BR /&gt;privilege show level 3 mode exec command uauth&lt;BR /&gt;privilege show level 3 mode exec command compression&lt;BR /&gt;privilege show level 3 mode configure command interface&lt;BR /&gt;privilege show level 3 mode configure command clock&lt;BR /&gt;privilege show level 3 mode configure command access-list&lt;BR /&gt;privilege show level 3 mode configure command logging&lt;BR /&gt;privilege show level 3 mode configure command ip&lt;BR /&gt;privilege show level 3 mode configure command failover&lt;BR /&gt;privilege show level 5 mode configure command asdm&lt;BR /&gt;privilege show level 3 mode configure command arp&lt;BR /&gt;privilege show level 3 mode configure command route&lt;BR /&gt;privilege show level 3 mode configure command aaa-server&lt;BR /&gt;privilege show level 3 mode configure command aaa&lt;BR /&gt;privilege show level 3 mode configure command crypto&lt;BR /&gt;privilege show level 3 mode configure command ssh&lt;BR /&gt;privilege show level 3 mode configure command dhcpd&lt;BR /&gt;privilege show level 5 mode configure command privilege&lt;BR /&gt;privilege clear level 3 mode exec command dns-hosts&lt;BR /&gt;privilege clear level 3 mode exec command logging&lt;BR /&gt;privilege clear level 3 mode exec command arp&lt;BR /&gt;privilege clear level 3 mode exec command aaa-server&lt;BR /&gt;privilege clear level 3 mode exec command crypto&lt;BR /&gt;privilege clear level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege cmd level 3 mode configure command failover&lt;BR /&gt;privilege clear level 3 mode configure command logging&lt;BR /&gt;privilege clear level 3 mode configure command arp&lt;BR /&gt;privilege clear level 3 mode configure command crypto&lt;BR /&gt;privilege clear level 3 mode configure command aaa-server&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:d40c5285fbe30469c114e58ce02bf211&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2017 18:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intra-interface-issue-asa5510/m-p/3014704#M146995</guid>
      <dc:creator>Eduardo Guerra</dc:creator>
      <dc:date>2017-03-10T18:37:30Z</dc:date>
    </item>
  </channel>
</rss>

