<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Not allowing port 3009 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668865#M193823</link>
    <description>&lt;P&gt;I'm working to set up Citrix netscalers with global server load balancing (gslb) across two different locations. &amp;nbsp;The default config on the netscalers when completed makes the two talk to each other over the internet over port TCP 3011. &amp;nbsp;When you choose to encrypt this discussion, it then changes the port to TCP 3009.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site A netscaler (primary) &amp;nbsp;--&amp;gt; &amp;nbsp;Site B netscaler (backup)&lt;/P&gt;&lt;P&gt;DMZ IP: &amp;nbsp; &amp;nbsp; 172.16.20.11 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;172.16.100.13&lt;/P&gt;&lt;P&gt;outside IP: 10.242.145.185 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.115.85.198&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem I'm having, is that these two netscalers are able to talk just fine over 3011, but as soon as I put it to secure on port 3009 I only see one-way traffic. &amp;nbsp;The one-way traffic is only from site A to site B. &amp;nbsp;Site B does not respond at all to site A's requests. &amp;nbsp;The rules on both firewalls at this point are basically:&lt;/P&gt;&lt;P&gt;from DMZ to internet netscaler IP to any all Ports&lt;/P&gt;&lt;P&gt;from anything outside to NAT'd netscaler IP all ports&lt;/P&gt;&lt;P&gt;I tried this same configuration with two netscalers both in the same DMZ and they talk properly over secure port 3009, so I know that it can work. &amp;nbsp;(not to mention they both talk fine over port 3011 with the same rules in place) &amp;nbsp;I thought that maybe it was the policy map in global policy, but nothing sticks out. &amp;nbsp;Also, I can create test services between the two netscalers, and I can get UDP port 3009 to talk together, just not TCP 3009.&lt;/P&gt;&lt;P&gt;Can anyone look at my two firewall configs and see if there's any reason I cannot get these to talk on port 3009? &amp;nbsp;I've color coded the relevant parts of the config to help with finding them. &amp;nbsp;Hopefully that helps. &amp;nbsp;I've also included below some small packet traces from each netscaler.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Primary Site A&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;!&lt;BR /&gt;hostname sd01-5510asa-ha&lt;BR /&gt;domain-name&amp;nbsp;&lt;BR /&gt;enable&amp;nbsp;&lt;BR /&gt;passwd&amp;nbsp;&lt;BR /&gt;names&lt;BR /&gt;name 10.2.3.2 Server_CBDC01 description Carlsbad DC/DNS Server&lt;BR /&gt;name 10.1.3.7 Server_Citrix description Legacy Citrix Metaframe XP Server&lt;BR /&gt;name 10.1.3.2 Server_Domain3 description San Diego DC/DNS Server&lt;BR /&gt;name 172.16.20.7 Network_CAG_MIP description Citrix Access Gateway Management Interface&lt;BR /&gt;name 172.16.20.5 Network_CAG_PRI description Citrix Access Gateway HA Primary&lt;BR /&gt;name 172.16.20.20 Network_CAG_Remote description remote.domain.com Virtual Interface&lt;BR /&gt;name 172.16.20.6 Network_CAG_SEC description Citrix Access Gateway HA Secondary&lt;BR /&gt;name 172.16.20.21 Network_CAG_VPN description vpn.domain.com Virtual Interface&lt;BR /&gt;name 172.16.20.4 Network_FW3-Lab description Linksys Firewall for Lab Network&lt;BR /&gt;name 172.16.20.13 Server_FTP description ftp.domain.com Enterprise FTP Server&lt;BR /&gt;name 10.242.145.138 Public_Network_CAG_Remote description remote.domain.com External IP&lt;BR /&gt;name 10.242.145.139 Public_Network_CAG_VPN description vpn.domain.com External IP&lt;BR /&gt;name 10.242.145.144 Public_Network_FW3-Lab description External IP for Lab Network&lt;BR /&gt;name 10.242.145.140 Public_Server_FTP description ftp.domain.com External IP&lt;BR /&gt;name 172.16.20.12 Server_MailGate description SMTP Mail Gateway&lt;BR /&gt;name 10.242.145.131 Public_Server_MailGate description mail.domain.com External IP&lt;BR /&gt;name 172.16.21.32 NAT_Server_CBDC01 description Translated Address to CBDC01&lt;BR /&gt;name 172.16.21.2 NAT_Server_Domain3 description Translated Address to Domain3&lt;BR /&gt;name 172.16.21.34 NAT_Server_PS02 description Translated Address to PS02&lt;BR /&gt;name 172.16.21.56 NAT_Server_PS06 description Translated Address to PS06&lt;BR /&gt;name 172.16.21.201 NAT_Remote_WI_Virtual_IP description Translated Address to remote.domain.com&lt;BR /&gt;name 10.200.1.201 Remote_WI_Virtual description Virtual IP for remote.domain.com&lt;BR /&gt;name 172.16.21.14 NAT_Server_WEB01-v_Ext_Remote description NAT to remote.domain.com webserver&lt;BR /&gt;name 172.16.21.17 NAT_Server_WEB02-v_Ext_Remote description NAT to remote.domain.com webservr&lt;BR /&gt;name 10.200.1.14 Server_WEB01-v_Ext_Remote description Web Server for remote.domain.com&lt;BR /&gt;name 10.200.1.17 Server_WEB02-v_Ext_Remote description Web Server for remote.domain.com&lt;BR /&gt;name 172.16.20.22 Network_CAG_OWA description owa.domain.com through netscaler&lt;BR /&gt;name 172.16.21.25 NAT_Server_PS03 description Translated Address to PS03&lt;BR /&gt;name 172.16.21.63 NAT_Server_vPS07 description Translated Address to vPS07&lt;BR /&gt;name 172.16.21.20 NAT_Server_vPS11 description Translated address to vPS11&lt;BR /&gt;name 172.16.21.33 NAT_Server_PS01 description Translated address to PS01&lt;BR /&gt;name 172.16.21.35 NAT_Server_PS07-v description Translated Address PS07-v&lt;BR /&gt;name 172.16.21.36 NAT_Server_PS08-v description Translated Address PS08-v&lt;BR /&gt;name 10.200.1.39 Server_BES01-v description Enterprise Blackberry Server&lt;BR /&gt;name 172.16.21.41 NAT_Server_SDDC01-v description Translated Address to SDDC01-v&lt;BR /&gt;name 10.200.1.41 Server_SDDC01-v description San Diego DC/DNS Server&lt;BR /&gt;name 172.16.21.47 NAT_Server_PS09-v description Translated Address PS09-v&lt;BR /&gt;name 172.16.21.48 NAT_Server_PS10-v description Translated Address to PS10-v&lt;BR /&gt;name 172.16.21.54 NAT_Server_PS04 description Translated Address to PS04&lt;BR /&gt;name 172.16.21.55 NAT_Server_PS11 description Translated Address to PS11&lt;BR /&gt;name 10.242.145.143 Public_Network_iPhone description Web Access to iPhone Policy Web&lt;BR /&gt;name 172.16.20.14 Server_WWW description Linux Web Server&lt;BR /&gt;name 172.16.21.68 NAT_Server_PS12-v description Translated address to PS12-v&lt;BR /&gt;name 172.16.21.69 NAT_Server_PS05-v description Translated Address to PS05-v&lt;BR /&gt;name 172.16.21.42 NAT_Server_SDDC02-v description Translated address to SDDC02-v&lt;BR /&gt;name 10.200.1.42 Server_SDDC02-v description Enterprise DC/DNS&lt;BR /&gt;name 10.242.145.160 Public_Server_Tandberg01 description External IP for Tandberg Video Conferencing 1st Floor&lt;BR /&gt;name 10.242.145.161 Public_Server_Tandberg19 description External IP for Tandberg Video Conferencing 19th Floor&lt;BR /&gt;name 10.242.145.162 Public_Server_Tandberg21 description External IP for Tandberg Video Conferencing 21st Floor&lt;BR /&gt;name 10.242.145.163 Public_Server_TandbergMCU description External IP for Tandberg MCU Gateway&lt;BR /&gt;name 10.3.15.110 Server_Tandberg01 description Tandberg Video Conferencing 1st Floor&lt;BR /&gt;name 10.21.15.112 Server_Tandberg21 description Tandberg Video Conferencing 21st Floor&lt;BR /&gt;name 10.19.15.111 Server_Tandberg19 description Tandberg Video Conferencing 19th Floor&lt;BR /&gt;name 172.16.21.15 NAT_Server_meet description Translated Address to meet&lt;BR /&gt;name 172.16.21.16 NAT_Server_meet2 description Translated Address to meet2&lt;BR /&gt;name 10.200.1.93 server_rmf-fs01-lx description rmf linux admin&lt;BR /&gt;name 10.242.145.142 Public_Server_DF_WWW description Public IP for External Datafusion Access&lt;BR /&gt;name 172.16.20.18 Server_DF_WWW description Web Server For Datafusion External&lt;BR /&gt;name 172.16.21.82 NAT_Server_Datafusion description NAT Server Datafusion&lt;BR /&gt;name 10.200.1.82 Server_Datafusion description Internal Datafusion Server&lt;BR /&gt;name 172.16.21.93 NAT_Server_netmgmt07-lx-v description Translated Address to netmgmt07-lx-v&lt;BR /&gt;name 172.16.21.116 NAT_Server_PS13-v description Nat Citrix Server PS13-v&lt;BR /&gt;name 10.200.253.86 Server_TandbergMCU description Tandberg MCU Gateway&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.201.1.2 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 172.16.20.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;description LAN/STATE Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.242.145.130 255.255.255.128&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.202.1.72 255.255.255.0&amp;nbsp;&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;banner login Authorized Use Only&lt;BR /&gt;boot system disk0:/asa825-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;name-server Server_SDDC02-v&lt;BR /&gt;&amp;nbsp;domain-name&amp;nbsp;&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service CAG_Ports tcp&lt;BR /&gt;&amp;nbsp;port-object eq citrix-ica&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object host Public_Network_CAG_Remote&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.156&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.151&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.157&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.166&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.167&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.168&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.169&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.171&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.173&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.172&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.176&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.177&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.182&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.155&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_DF_WWW&lt;BR /&gt;&amp;nbsp;network-object host Public_Network_iPhone&lt;BR /&gt;object-group network Client_Networks&lt;BR /&gt;&amp;nbsp;description All Desktop Client Subnets&lt;BR /&gt;&amp;nbsp;network-object 10.19.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.20.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.21.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.22.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.13.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.3.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.80.0.0 255.255.252.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_MIP&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_PRI&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_SEC&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;object-group network xendesktop_servers&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.127&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.128&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.146&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.237&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.238&lt;BR /&gt;object-group network xenapp_servers&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.116&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.144&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.25&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.32&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.35&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.36&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.47&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.48&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.55&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.56&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.68&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.69&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;&amp;nbsp;network-object host NAT_Remote_WI_Virtual_IP&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_WEB01-v_Ext_Remote&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_WEB02-v_Ext_Remote&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.141&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.71&lt;BR /&gt;&amp;nbsp;group-object xendesktop_servers&lt;BR /&gt;&amp;nbsp;network-object 10.80.0.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.85.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.72&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.72&lt;BR /&gt;&amp;nbsp;group-object xenapp_servers&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.13&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.216&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.40&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.30&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.31&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.196&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.30&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.31&lt;BR /&gt;object-group network cag_virtual_servers&lt;BR /&gt;&amp;nbsp;description Citrix Access Gateway Virtual Servers&lt;BR /&gt;&amp;nbsp;network-object host 10.20.3.50&lt;BR /&gt;&amp;nbsp;network-object host 10.20.3.51&lt;BR /&gt;object-group network dns_servers&lt;BR /&gt;&amp;nbsp;description Internal Enterprise DNS Servers&lt;BR /&gt;&amp;nbsp;network-object host Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;network-object host Server_SDDC02-v&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.150&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq 5010&lt;BR /&gt;&amp;nbsp;port-object eq 7777&lt;BR /&gt;&amp;nbsp;port-object eq 7051&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;&amp;nbsp;port-object eq 9000&lt;BR /&gt;&amp;nbsp;port-object eq 9003&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service RDP tcp&lt;BR /&gt;&amp;nbsp;description Terminal Services&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group service citrix_ica_sr tcp&lt;BR /&gt;&amp;nbsp;description Citrix Metaframe ICA Session Reliability&lt;BR /&gt;&amp;nbsp;port-object eq 2598&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_MIP&lt;BR /&gt;&amp;nbsp;network-object host Server_DF_WWW&lt;BR /&gt;&amp;nbsp;network-object host Server_FTP&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.25&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.34&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.41&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.42&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.43&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.44&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.45&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.46&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.60&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_PRI&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_SEC&lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC02-v&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object tcp eq ldaps&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq ntp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ldap&amp;nbsp;&lt;BR /&gt;object-group network dmz_vpn_network&lt;BR /&gt;&amp;nbsp;description VPN Subnet for Citrix SSL VPN Clients&lt;BR /&gt;&amp;nbsp;network-object 172.16.20.200 255.255.255.248&lt;BR /&gt;object-group network server_network&lt;BR /&gt;&amp;nbsp;description Server Network&lt;BR /&gt;&amp;nbsp;network-object 10.200.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.200.2.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.200.10.0 255.255.255.0&lt;BR /&gt;object-group service rpc_http tcp&lt;BR /&gt;&amp;nbsp;description RPC over HTTP used for Outlook&lt;BR /&gt;&amp;nbsp;port-object eq 135&lt;BR /&gt;object-group service DNS tcp-udp&lt;BR /&gt;&amp;nbsp;port-object eq domain&lt;BR /&gt;object-group network DM_INLINE_NETWORK_8&lt;BR /&gt;&amp;nbsp;group-object Client_Networks&lt;BR /&gt;&amp;nbsp;group-object server_network&lt;BR /&gt;&amp;nbsp;network-object host 10.202.1.5&lt;BR /&gt;&amp;nbsp;network-object 10.92.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.200.145.0 255.255.255.0&lt;BR /&gt;object-group service DM_INLINE_TCP_8 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network all_rfc1918_ip_space&lt;BR /&gt;&amp;nbsp;description all reserved networks&lt;BR /&gt;&amp;nbsp;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.0.0 255.240.0.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_11&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC02-v&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.150&lt;BR /&gt;object-group network DM_INLINE_NETWORK_10&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_MIP&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.43&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.45&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;object-group network DM_INLINE_NETWORK_12&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC02-v&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.150&lt;BR /&gt;object-group service SSL-LDAP tcp&lt;BR /&gt;&amp;nbsp;description SSL LDAP For Mailgate&lt;BR /&gt;&amp;nbsp;port-object eq 3269&lt;BR /&gt;object-group service DM_INLINE_TCP_11 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service tcp3008 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3008&lt;BR /&gt;object-group service tcp3101 tcp&lt;BR /&gt;&amp;nbsp;description BES traffic&lt;BR /&gt;&amp;nbsp;port-object eq 3101&lt;BR /&gt;object-group service tcp5010 tcp&lt;BR /&gt;&amp;nbsp;description Download port for&amp;nbsp;&lt;BR /&gt;&amp;nbsp;port-object eq 5010&lt;BR /&gt;object-group service Lacerte_Tax&lt;BR /&gt;&amp;nbsp;description Ports for Lacerte Tax Application&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10010&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10020&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10030&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10040&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10050&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10051&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10052&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10060&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10070&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10099&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 1275&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 1277&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 1278&amp;nbsp;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_20&lt;BR /&gt;&amp;nbsp;group-object Client_Networks&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.68&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.32&lt;BR /&gt;object-group service external_ssh tcp&lt;BR /&gt;&amp;nbsp;port-object eq 57921&lt;BR /&gt;object-group service DM_INLINE_TCP_5 tcp&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;group-object external_ssh&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service DM_INLINE_TCP_13 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_23&lt;BR /&gt;&amp;nbsp;network-object host 10.202.1.12&lt;BR /&gt;&amp;nbsp;network-object host 10.202.1.13&lt;BR /&gt;&amp;nbsp;network-object host 10.202.1.14&lt;BR /&gt;&amp;nbsp;network-object host 10.202.1.19&lt;BR /&gt;object-group service DM_INLINE_TCP_14 tcp&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;port-object eq ftp-data&lt;BR /&gt;object-group service DM_INLINE_TCP_7 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3268&lt;BR /&gt;&amp;nbsp;port-object eq 3269&lt;BR /&gt;&amp;nbsp;port-object eq ldap&lt;BR /&gt;&amp;nbsp;port-object eq ldaps&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt;&amp;nbsp;service-object icmp echo&lt;BR /&gt;&amp;nbsp;service-object udp eq domain&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq ntp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq domain&amp;nbsp;&lt;BR /&gt;object-group service DM_INLINE_SERVICE_4&lt;BR /&gt;&amp;nbsp;service-object tcp eq domain&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq domain&amp;nbsp;&lt;BR /&gt;object-group network NTP-CLIENTS&lt;BR /&gt;&amp;nbsp;description devices that require external ntp access&lt;BR /&gt;&amp;nbsp;network-object host 10.200.10.38&lt;BR /&gt;&amp;nbsp;network-object host Server_SDDC01-v&lt;BR /&gt;object-group service V_Conf_tcp tcp&lt;BR /&gt;&amp;nbsp;port-object range 5555 5587&lt;BR /&gt;object-group service V_Conf_udp udp&lt;BR /&gt;&amp;nbsp;port-object eq 2837&lt;BR /&gt;&amp;nbsp;port-object range 2326 2485&lt;BR /&gt;object-group network Tandberg_Servers&lt;BR /&gt;&amp;nbsp;network-object host Server_Tandberg19&lt;BR /&gt;&amp;nbsp;network-object host Server_Tandberg21&lt;BR /&gt;&amp;nbsp;network-object host Server_Tandberg01&lt;BR /&gt;&amp;nbsp;network-object host Server_TandbergMCU&lt;BR /&gt;object-group network Public_Tandberg_Servers&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_Tandberg01&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_Tandberg19&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_Tandberg21&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_TandbergMCU&lt;BR /&gt;object-group network DM_INLINE_NETWORK_19&lt;BR /&gt;&amp;nbsp;network-object 10.31.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.33.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.31&lt;BR /&gt;&amp;nbsp;network-object 10.202.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.85.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.28.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.189&lt;BR /&gt;&amp;nbsp;network-object 10.29.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.100.0.0 255.255.0.0&lt;BR /&gt;object-group service CUCM-PROXY-PORTS&lt;BR /&gt;&amp;nbsp;service-object udp eq tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp range 1024 65535&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 2443&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 5061&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 3804&amp;nbsp;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_21&lt;BR /&gt;&amp;nbsp;network-object 10.13.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.3.1.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_25&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_PRI&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_SEC&lt;BR /&gt;object-group service DM_INLINE_TCP_17 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;port-object eq 3010&lt;BR /&gt;object-group network DM_INLINE_NETWORK_9&lt;BR /&gt;&amp;nbsp;network-object host 10.242.128.100&lt;BR /&gt;&amp;nbsp;network-object host 10.242.128.101&lt;BR /&gt;&amp;nbsp;network-object host 68.105.28.16&lt;BR /&gt;&amp;nbsp;network-object host 68.105.29.16&lt;BR /&gt;&amp;nbsp;network-object host 8.8.8.8&lt;BR /&gt;object-group network internet_bes_servers&lt;BR /&gt;&amp;nbsp;network-object 173.247.32.0 255.255.224.0&lt;BR /&gt;&amp;nbsp;network-object 178.239.80.0 255.255.240.0&lt;BR /&gt;&amp;nbsp;network-object 180.149.148.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 193.109.81.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 204.187.87.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 206.51.26.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 206.53.144.0 255.255.240.0&lt;BR /&gt;&amp;nbsp;network-object 216.9.240.0 255.255.240.0&lt;BR /&gt;&amp;nbsp;network-object 67.223.64.0 255.255.224.0&lt;BR /&gt;&amp;nbsp;network-object 68.171.224.0 255.255.224.0&lt;BR /&gt;&amp;nbsp;network-object 74.82.64.0 255.255.224.0&lt;BR /&gt;&amp;nbsp;network-object 93.186.16.0 255.255.240.0&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 5001&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_6 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 5001&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_15&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.121&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.122&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.202&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.191&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.112&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.90&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.52&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.198&lt;BR /&gt;object-group network DM_INLINE_NETWORK_14&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.121&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.122&lt;BR /&gt;object-group network DM_INLINE_NETWORK_16&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.121&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.122&lt;BR /&gt;object-group network DM_INLINE_NETWORK_7&lt;BR /&gt;&amp;nbsp;network-object 10.28.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.29.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.35.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.36.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.37.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.39.0.0 255.255.0.0&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;&amp;nbsp;service-object tcp eq www&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq https&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq ntp&amp;nbsp;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_17&lt;BR /&gt;&amp;nbsp;network-object host Server_DF_WWW&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.25&lt;BR /&gt;object-group service DM_INLINE_TCP_9 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 9000&lt;BR /&gt;&amp;nbsp;port-object eq 9003&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_SERVICE_5&lt;BR /&gt;&amp;nbsp;service-object icmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 9000&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 9003&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq www&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq https&amp;nbsp;&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 2598&lt;BR /&gt;&amp;nbsp;port-object eq citrix-ica&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_12 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 1640&lt;BR /&gt;&amp;nbsp;port-object eq 2195&lt;BR /&gt;&amp;nbsp;port-object eq 2196&lt;BR /&gt;&amp;nbsp;port-object eq 5223&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_16 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 1640&lt;BR /&gt;&amp;nbsp;port-object eq 2195&lt;BR /&gt;&amp;nbsp;port-object eq 2196&lt;BR /&gt;&amp;nbsp;port-object eq 5223&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_SERVICE_6&lt;BR /&gt;&amp;nbsp;service-object tcp eq 5061&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 5062&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq sip&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5061&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5064&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq sip&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5062&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ssh&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq snmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq snmptrap&amp;nbsp;&lt;BR /&gt;object-group service DM_INLINE_SERVICE_7&lt;BR /&gt;&amp;nbsp;service-object tcp eq 5061&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 5062&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq sip&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5061&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq sip&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5062&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5064&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq snmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq snmptrap&amp;nbsp;&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_4&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_18&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.190&lt;BR /&gt;&amp;nbsp;network-object host Server_BES01-v&lt;BR /&gt;object-group network DM_INLINE_NETWORK_22&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.43&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.44&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.45&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.46&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.60&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_6&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_27&lt;BR /&gt;&amp;nbsp;network-object host 12.149.173.19&lt;BR /&gt;&amp;nbsp;network-object host 12.179.134.64&lt;BR /&gt;&amp;nbsp;network-object 198.31.208.128 255.255.255.224&lt;BR /&gt;&amp;nbsp;network-object host 206.108.40.29&lt;BR /&gt;&amp;nbsp;network-object host 208.240.240.200&lt;BR /&gt;object-group service DM_INLINE_TCP_19 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 2598&lt;BR /&gt;&amp;nbsp;port-object eq citrix-ica&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;BR /&gt;&amp;nbsp;icmp-object echo-reply&lt;BR /&gt;&amp;nbsp;icmp-object time-exceeded&lt;BR /&gt;&amp;nbsp;icmp-object unreachable&lt;BR /&gt;object-group service DM_INLINE_SERVICE_8&lt;BR /&gt;&amp;nbsp;service-object ip&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object icmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object icmp traceroute&lt;BR /&gt;object-group service DM_INLINE_TCP_18 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 8082&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_26&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.41&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.42&lt;BR /&gt;object-group network DM_INLINE_NETWORK_28&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;object-group service DM_INLINE_SERVICE_10&lt;BR /&gt;&amp;nbsp;service-object tcp eq 902&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 903&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq www&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq https&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ssh&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 902&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 9084&amp;nbsp;&lt;BR /&gt;object-group service DM_INLINE_SERVICE_9&lt;BR /&gt;&amp;nbsp;service-object tcp eq 902&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ssh&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 902&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq www&amp;nbsp;&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_5&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_29&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;object-group network DM_INLINE_NETWORK_31&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.239&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.53&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.64&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.64&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.73&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.147&lt;BR /&gt;object-group network DM_INLINE_NETWORK_30&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_7&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_32&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;object-group network DM_INLINE_NETWORK_33&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_8&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_34&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host Server_DF_WWW&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;object-group network DM_INLINE_NETWORK_35&lt;BR /&gt;&amp;nbsp;network-object host 217.138.46.58&lt;BR /&gt;&amp;nbsp;network-object host 23.253.191.93&lt;BR /&gt;object-group service DM_INLINE_TCP_20 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 8443&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_36&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.179&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.180&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.181&lt;BR /&gt;object-group network DM_INLINE_NETWORK_37&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;object-group network DM_INLINE_NETWORK_39&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.152&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.153&lt;BR /&gt;object-group service DM_INLINE_SERVICE_11&lt;BR /&gt;&amp;nbsp;service-object tcp eq 6970&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq tftp&amp;nbsp;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_24&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.60&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;object-group protocol DM_INLINE_PROTOCOL_9&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color:#FF0000;"&gt;&lt;STRONG&gt;object-group network DM_INLINE_NETWORK_13&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;object-group network DM_INLINE_NETWORK_38&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.185&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.186&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_40&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.73&lt;BR /&gt;&amp;nbsp;network-object host 10.80.0.83&lt;BR /&gt;access-list outside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1 log disable inactive&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_9 any object-group DM_INLINE_NETWORK_38 log disable&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.135 eq 8080 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_36 object-group DM_INLINE_TCP_20 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group DM_INLINE_NETWORK_35 host 10.242.145.178 eq https log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any host 10.242.145.185 eq domain log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.149 object-group DM_INLINE_TCP_9 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_TCP_1&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host Public_Server_FTP object-group DM_INLINE_TCP_5 log disable inactive&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended deny object-group DM_INLINE_SERVICE_6 any object-group Public_Tandberg_Servers log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_3 any object-group Public_Tandberg_Servers log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host Public_Server_MailGate eq smtp log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host Public_Server_MailGate object-group DM_INLINE_TCP_8 log disable inactive&amp;nbsp;&lt;BR /&gt;access-list outside_access_in remark Cisco Unified Mobility Advantage&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.130 eq 5443 inactive&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.130 eq 9080 inactive&amp;nbsp;&lt;BR /&gt;access-list outside_access_in remark Cisco Phone Proxy&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_11 any host 10.242.145.154&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.148 object-group DM_INLINE_TCP_3 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in remark Apple Mac MDMServer&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.158 object-group DM_INLINE_TCP_12 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in remark phone proxy&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.154 eq 6970 inactive&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_40 any log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp host 10.200.253.91 any object-group DM_INLINE_TCP_19 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_7 host 10.200.1.53 object-group DM_INLINE_NETWORK_28 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_8 object-group DM_INLINE_NETWORK_19 any log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 10.0.0.0 255.0.0.0 object-group DM_INLINE_NETWORK_7 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark access from vcenter01-v to dmz esx servers&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_9 host 10.200.1.67 object-group DM_INLINE_NETWORK_28 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp 10.220.40.0 255.255.255.248 any object-group DM_INLINE_TCP_6 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 17. eq 2195 log disable inactive&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Allow SMTP relay from inside&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_16 object-group DM_INLINE_NETWORK_24 eq smtp log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_21 object-group DM_INLINE_NETWORK_25 object-group DM_INLINE_TCP_17 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_SERVICE_7 object-group Tandberg_Servers any log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_4 object-group Tandberg_Servers any log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Special port opening to Go System tax software&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group Client_Networks 164.48.0.0 255.240.0.0 eq 2429 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Generic outbound Internet access&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_8 any object-group DM_INLINE_TCP_2 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Rule to allow Lacerte Tax to communicate&lt;BR /&gt;access-list inside_access_in extended permit object-group Lacerte_Tax object-group DM_INLINE_NETWORK_20 object-group DM_INLINE_NETWORK_27 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_23 any object-group DM_INLINE_TCP_14 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip 10.200.199.0 255.255.255.0 host Server_FTP log disable inactive&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 70. object-group RDP log disable inactive&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_4 object-group dns_servers object-group DM_INLINE_NETWORK_9 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit udp object-group NTP-CLIENTS any eq ntp log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip 10.200.199.0 255.255.255.0 10.150.10.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_18 object-group internet_bes_servers object-group tcp3101 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip host 10.200.10.40 any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Allows EC to connect to Kiteworks in DMZ&lt;BR /&gt;access-list inside_access_in extended permit tcp host 10.200.1.224 host 172.16.20.45 eq 8082 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Phone proxy - traffic from Subscriber to public cloud.&lt;BR /&gt;access-list inside_access_in extended permit udp host 10.200.10.33 any eq tftp inactive&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Block everything else from inside to DMZ&lt;BR /&gt;access-list inside_access_in extended deny ip any 172.16.20.0 255.255.255.0 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Deny everything else&lt;BR /&gt;access-list inside_access_in extended deny ip any any log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit ip any any log disable inactive&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#FF0000;"&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit ip object-group DM_INLINE_NETWORK_13 any log disable&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list DMZ_access_in extended permit ip 10.28.0.0 255.255.0.0 host Network_CAG_Remote log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_PROTOCOL_5 object-group DM_INLINE_NETWORK_29 object-group DM_INLINE_NETWORK_31 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit udp object-group DM_INLINE_NETWORK_37 object-group DM_INLINE_NETWORK_39 eq 1812 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_PROTOCOL_8 object-group DM_INLINE_NETWORK_34 any log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_5 host Network_CAG_MIP host 172.16.21.154 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host Server_DF_WWW host NAT_Server_Datafusion eq 1433 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit ip object-group DM_INLINE_NETWORK_30 10.80.0.0 255.255.252.0 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_2 object-group DM_INLINE_NETWORK_17 any log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host Server_FTP host NAT_Server_netmgmt07-lx-v eq ssh log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host Network_CAG_MIP object-group DM_INLINE_NETWORK_15 object-group DM_INLINE_TCP_13 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in remark dmz esx hosts access to vcenter01-v&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_10 object-group DM_INLINE_NETWORK_26 host 10.200.1.67 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_32 object-group DM_INLINE_NETWORK_14 eq smtp log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_3 object-group DM_INLINE_NETWORK_4 object-group DM_INLINE_NETWORK_11 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_10 object-group DM_INLINE_NETWORK_12 object-group DM_INLINE_TCP_7 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_2 object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_TCP_4 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Apple Mac MDMServer&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 172.16.20.34 any object-group DM_INLINE_TCP_16 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allows Accellion controller to talk to the Accellion Connector&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 172.16.20.43 host 172.16.21.225 eq 8812 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allows KiteWorks Controllers to talk to EC&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 172.16.20.45 host 10.200.1.224 object-group DM_INLINE_TCP_18 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_1 object-group DM_INLINE_NETWORK_5 object-group DM_INLINE_NETWORK_6 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Internet&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_22 any object-group DM_INLINE_TCP_11 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow SMTP outbound to Internet&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_33 any eq smtp log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Block everything else from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in extended deny ip any object-group all_rfc1918_ip_space&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Deny everything else&lt;BR /&gt;access-list DMZ_access_in extended deny ip any any log disable&amp;nbsp;&lt;BR /&gt;access-list IPS extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list web extended permit ip host 10.18.1.143 any&amp;nbsp;&lt;BR /&gt;access-list cap1 extended permit ip any host 10.1.99.99&amp;nbsp;&lt;BR /&gt;access-list cap1 extended permit ip host 10.1.99.99 any&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.150.10.0 255.255.255.240&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.150.10.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.28.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.29.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.35.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.36.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.37.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.39.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list mmp_inspect extended permit tcp any any eq 5443&amp;nbsp;&lt;BR /&gt;access-list TIG-VPN_SplitTunnel standard permit 10.0.0.0 255.0.0.0&amp;nbsp;&lt;BR /&gt;access-list phone-proxy extended permit ip any host 10.242.145.154&amp;nbsp;&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 10.0.0.0 255.0.0.0 10.35.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list test extended permit ip host 10.200.10.33 host 10.28.1.20&amp;nbsp;&lt;BR /&gt;access-list test extended permit ip host 10.28.1.20 host 10.200.10.33&amp;nbsp;&lt;BR /&gt;access-list test extended permit ip 10.0.0.0 255.0.0.0 10.28.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list test extended permit ip 10.28.0.0 255.255.0.0 10.0.0.0 255.0.0.0&amp;nbsp;&lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 10.0.0.0 255.0.0.0 10.36.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 10.29.1.11 host 10.200.10.33&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 10.200.10.33 host 10.29.1.11&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 10.200.10.33 host 10.102.1.2&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 10.102.1.2 host 10.200.10.33&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 10.200.10.33 host 70.183.84.66&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 70.183.84.66 host 10.200.10.33&amp;nbsp;&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip 10.0.0.0 255.0.0.0 10.37.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list outside_cryptomap_2 extended permit ip 10.0.0.0 255.0.0.0 10.29.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list SLOW-PRINTING extended permit ip any 10.37.5.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list capout extended permit ip host 70. any&amp;nbsp;&lt;BR /&gt;access-list capout extended permit ip any host 70.&amp;nbsp;&lt;BR /&gt;access-list tcp_bypass extended permit tcp host 10.201.1.2 host 10.200.10.33&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;tcp-map WSOptions&lt;BR /&gt;&amp;nbsp; tcp-options range 24 31 allow&lt;BR /&gt;!&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 65535&lt;BR /&gt;logging monitor warnings&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host management 10.202.1.5&lt;BR /&gt;logging host inside 10.200.1.135&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool IPsecClientIPPool 10.150.10.0-10.150.10.10 mask 255.255.255.0&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit secondary&lt;BR /&gt;failover lan interface Failover Ethernet0/2&lt;BR /&gt;failover link Failover Ethernet0/2&lt;BR /&gt;failover interface ip Failover 192.168.0.1 255.255.255.252 standby 192.168.0.2&lt;BR /&gt;no monitor-interface management&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-645.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (inside) 200 interface&lt;BR /&gt;global (DMZ) 101 interface&lt;BR /&gt;global (outside) 101 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 101 10.201.1.100 255.255.255.255&lt;BR /&gt;nat (inside) 101 172.16.100.0 255.255.255.255&lt;BR /&gt;nat (inside) 101 10.220.40.0 255.255.255.248&lt;BR /&gt;nat (inside) 101 10.1.10.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.3.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.3.15.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.8.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.13.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.18.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.19.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.19.15.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.20.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.21.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.22.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.31.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.33.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.85.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.92.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.200.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.200.2.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.200.10.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.200.145.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.200.199.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.202.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.204.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.80.0.0 255.255.252.0&lt;BR /&gt;nat (inside) 101 10.28.0.0 255.255.0.0&lt;BR /&gt;nat (inside) 101 10.29.0.0 255.255.0.0&lt;BR /&gt;nat (inside) 101 10.100.0.0 255.255.0.0&lt;BR /&gt;nat (inside) 101 192.168.0.0 255.255.0.0&lt;BR /&gt;nat (DMZ) 101 172.16.20.0 255.255.255.0&lt;BR /&gt;nat (outside) 101 10.150.10.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp interface 5443 10.200.10.42 5443 netmask 255.255.255.255 tcp 2048 1024&amp;nbsp;&lt;BR /&gt;static (inside,outside) tcp interface 9080 10.200.10.42 9080 netmask 255.255.255.255 tcp 2048 1024&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) Public_Server_MailGate Server_MailGate netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) Public_Server_FTP Server_FTP netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Remote_WI_Virtual_IP Remote_WI_Virtual netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_WEB01-v_Ext_Remote Server_WEB01-v_Ext_Remote netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_WEB02-v_Ext_Remote Server_WEB02-v_Ext_Remote netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_SDDC01-v Server_SDDC01-v netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_SDDC02-v Server_SDDC02-v netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) Public_Network_iPhone Server_WWW netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) Public_Server_DF_WWW Server_DF_WWW netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.155 172.16.20.30 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.149 172.16.20.24 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.151 172.16.20.26 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) Public_Network_CAG_Remote 172.16.20.27 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.157 172.16.20.28 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.156 Network_CAG_Remote netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.158 172.16.20.34 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.166 172.16.20.29 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.167 172.16.20.36 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.168 172.16.20.43 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.169 172.16.20.44 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (inside,outside) Public_Server_Tandberg01 Server_Tandberg01 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) Public_Server_Tandberg19 Server_Tandberg19 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) Public_Server_Tandberg21 Server_Tandberg21 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) Public_Server_TandbergMCU Server_TandbergMCU netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_netmgmt07-lx-v server_rmf-fs01-lx netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_Datafusion Server_Datafusion netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) 10.242.145.154 10.200.10.33 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) 10.242.145.148 10.220.40.3 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.121 10.200.1.121 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.171 172.16.20.39 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.174 172.16.20.45 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.172 172.16.20.38 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.176 172.16.20.48 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.177 172.16.20.50 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,DMZ) Public_Server_MailGate Server_MailGate netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.178 172.16.20.53 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.179 172.16.20.54 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.180 172.16.20.52 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.181 172.16.20.61 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.182 172.16.20.57 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.135 172.16.20.47 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;static (DMZ,outside) 10.242.145.185 172.16.20.11 netmask 255.255.255.255&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;static (DMZ,outside) 10.242.145.186 172.16.20.56 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.202 10.207.1.202 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.122 10.200.1.122 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.71 10.200.1.71 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.141 10.200.1.141 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 10.80.0.0 10.80.0.0 netmask 255.255.252.0&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 10.85.1.0 10.85.1.0 netmask 255.255.255.0&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 10.200.1.0 10.200.1.0 netmask 255.255.255.0&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.154 10.200.1.154 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.72 10.200.1.72 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.216 10.200.1.16 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.213 10.200.1.13 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.191 10.200.1.191 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.112 10.92.1.12 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.225 10.200.1.225 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) 10.242.145.173 10.200.1.40 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.196 10.200.1.196 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.224 10.200.1.224 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.67 10.200.1.67 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.150 10.200.1.150 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.64 10.200.1.64 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.52 10.200.1.52 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.73 10.200.1.73 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.152 10.200.1.152 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.153 10.200.1.153 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.30 10.200.1.30 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.31 10.200.1.31 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.147 10.200.1.147 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.242.145.29 1&lt;BR /&gt;route management 10.0.0.0 255.0.0.0 10.202.1.1 1&lt;BR /&gt;route inside 10.3.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.3.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.3.15.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.13.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.13.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.19.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.19.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.19.15.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.20.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.20.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.21.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.21.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.21.15.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.22.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.22.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.28.0.0 255.255.0.0 10.201.1.3 1&lt;BR /&gt;route inside 10.29.0.0 255.255.0.0 10.201.1.3 1&lt;BR /&gt;route inside 10.31.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.32.0.0 255.255.0.0 10.201.1.3 1&lt;BR /&gt;route inside 10.33.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route outside 10.35.0.0 255.255.0.0 10.242.145.130 1&lt;BR /&gt;route outside 10.36.0.0 255.255.0.0 10.242.145.130 1&lt;BR /&gt;route inside 10.37.0.0 255.255.0.0 10.200.194.2 1&lt;BR /&gt;route inside 10.80.0.0 255.255.252.0 10.201.1.3 1&lt;BR /&gt;route inside 10.85.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.92.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.100.0.0 255.255.0.0 10.201.1.3 1&lt;BR /&gt;route inside 10.100.193.0 255.255.255.0 10.201.1.1 1&lt;BR /&gt;route inside 10.200.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.200.2.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.200.3.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.200.10.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.200.199.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.200.253.0 255.255.255.252 10.201.1.3 1&lt;BR /&gt;route inside 10.200.253.64 255.255.255.248 10.201.1.3 1&lt;BR /&gt;route inside 10.200.253.72 255.255.255.248 10.201.1.3 1&lt;BR /&gt;route inside 10.200.253.84 255.255.255.252 10.201.1.3 1&lt;BR /&gt;route inside 10.200.253.88 255.255.255.248 10.201.1.3 1&lt;BR /&gt;route inside 10.202.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.202.199.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.207.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.220.40.0 255.255.255.248 10.201.1.3 1&lt;BR /&gt;route inside 172.16.100.0 255.255.255.255 10.201.1.2 1&lt;BR /&gt;route inside 192.168.0.0 255.255.0.0 10.201.1.3 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:10:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;ldap attribute-map LDAPAM&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server LDAP protocol nt&lt;BR /&gt;aaa-server LDAP (inside) host Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;nt-auth-domain-controller domain.local&lt;BR /&gt;url-server (inside) vendor websense host 10.200.1.54 timeout 30 protocol TCP version 4 connections 5&lt;BR /&gt;aaa authentication http console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication telnet console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication serial console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication enable console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authorization command LOCAL&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.6.233 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.7.233 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.6.224 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.6.230 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.7.230 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.7.224 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.7.233 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.6.233 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.7.230 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.6.230 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.6.224 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.7.224 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 10.0.0.0 255.0.0.0 172.16.20.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.80.0.0 255.255.252.0 inside&lt;BR /&gt;http 10.85.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.200.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.201.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.13.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.31.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.0.0.0 255.0.0.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;service resetoutside&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs&amp;nbsp;&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs&amp;nbsp;&lt;BR /&gt;crypto map outside_map 1 set peer&amp;nbsp;&lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set pfs&amp;nbsp;&lt;BR /&gt;crypto map outside_map 2 set peer&amp;nbsp;&lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 3 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 3 set pfs group1&lt;BR /&gt;crypto map outside_map 3 set peer&amp;nbsp;&lt;BR /&gt;crypto map outside_map 3 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 4 match address outside_cryptomap_2&lt;BR /&gt;crypto map outside_map 4 set peer&lt;BR /&gt;crypto map outside_map 4 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto map outside_map3 4 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map3 4 set security-association lifetime kilobytes 4608000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;crypto ca certificate chain cuma&lt;BR /&gt;&amp;nbsp;certificate ca&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 5&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.201.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.200.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.200.199.1 255.255.255.255 inside&lt;BR /&gt;ssh 10.1.99.99 255.255.255.255 inside&lt;BR /&gt;ssh 10.13.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.1.3.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.31.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.150.10.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.85.1.0 255.255.255.0 inside&lt;BR /&gt;ssh Server_FTP 255.255.255.255 DMZ&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 management&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;!&lt;BR /&gt;tls-proxy ASA-tls-proxy&lt;BR /&gt;&amp;nbsp;server trust-point _internal_PP_ctl_phoneproxy_file&lt;BR /&gt;&amp;nbsp;no server authenticate-client&lt;BR /&gt;ctl-file ctl_phoneproxy_file&lt;BR /&gt;&amp;nbsp;record-entry cucm-tftp trustpoint pp_sub_trustpoint address 10.242.145.154&lt;BR /&gt;&amp;nbsp;no shutdown&lt;BR /&gt;!&lt;BR /&gt;media-termination asdm_media_termination&lt;BR /&gt;&amp;nbsp;address 10.242.145.154&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;phone-proxy ASA-phone-proxy&lt;BR /&gt;&amp;nbsp;media-termination asdm_media_termination&lt;BR /&gt;&amp;nbsp;tftp-server address 10.200.10.33 interface inside&lt;BR /&gt;&amp;nbsp;tls-proxy ASA-tls-proxy&lt;BR /&gt;&amp;nbsp;cipc security-mode authenticated&lt;BR /&gt;&amp;nbsp;ctl-file ctl_phoneproxy_file&lt;BR /&gt;&amp;nbsp;no disable service-settings&lt;BR /&gt;&amp;nbsp;proxy-server address 10.200.10.33 interface inside&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;url-block url-mempool 10240&lt;BR /&gt;url-block url-size 4&lt;BR /&gt;url-block block 128&lt;BR /&gt;ntp server Server_SDDC01-v source inside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;svc image disk0:/anyconnect-macosx-i386-2.1.0148-k9.pkg 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;!&lt;BR /&gt;class-map sec_sip&lt;BR /&gt;&amp;nbsp;match port tcp eq 5061&lt;BR /&gt;class-map tcp-bypass&lt;BR /&gt;&amp;nbsp;description "TCP traffic that bypasses stateful firewall"&lt;BR /&gt;&amp;nbsp;match access-list tcp_bypass&lt;BR /&gt;class-map WSOptions-class&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;class-map IPS_Class_Map&lt;BR /&gt;&amp;nbsp;match access-list IPS&lt;BR /&gt;class-map cuma_proxy&lt;BR /&gt;&amp;nbsp;match access-list mmp_inspect&lt;BR /&gt;class-map sec_sccp&lt;BR /&gt;&amp;nbsp;match port tcp eq 2443&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map SLOW-PRINTING&lt;BR /&gt;&amp;nbsp;description Throttles traffic to Austin printer VLAN&lt;BR /&gt;&amp;nbsp;match access-list SLOW-PRINTING&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect pptp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp error&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp;class IPS_Class_Map&lt;BR /&gt;&amp;nbsp; ips promiscuous fail-open&lt;BR /&gt;&amp;nbsp;class WSOptions-class&lt;BR /&gt;&amp;nbsp; set connection advanced-options WSOptions&lt;BR /&gt;policy-map type inspect ip-options ip-options-map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; eool action allow&lt;BR /&gt;&amp;nbsp; nop action allow&lt;BR /&gt;&amp;nbsp; router-alert action allow&lt;BR /&gt;policy-map voice_policy&lt;BR /&gt;&amp;nbsp;class sec_sccp&lt;BR /&gt;&amp;nbsp; inspect skinny phone-proxy ASA-phone-proxy&amp;nbsp;&lt;BR /&gt;&amp;nbsp;class sec_sip&lt;BR /&gt;&amp;nbsp; inspect sip phone-proxy ASA-phone-proxy&amp;nbsp;&lt;BR /&gt;policy-map SLOW-PRINTING&lt;BR /&gt;&amp;nbsp;class SLOW-PRINTING&lt;BR /&gt;&amp;nbsp; police input 10240000&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy voice_policy interface outside&lt;BR /&gt;privilege cmd level 3 mode exec command perfmon&lt;BR /&gt;privilege cmd level 3 mode exec command ping&lt;BR /&gt;privilege cmd level 3 mode exec command who&lt;BR /&gt;privilege cmd level 3 mode exec command logging&lt;BR /&gt;privilege cmd level 3 mode exec command failover&lt;BR /&gt;privilege cmd level 3 mode exec command packet-tracer&lt;BR /&gt;privilege show level 5 mode exec command import&lt;BR /&gt;privilege show level 5 mode exec command running-config&lt;BR /&gt;privilege show level 3 mode exec command reload&lt;BR /&gt;privilege show level 3 mode exec command mode&lt;BR /&gt;privilege show level 3 mode exec command firewall&lt;BR /&gt;privilege show level 3 mode exec command asp&lt;BR /&gt;privilege show level 3 mode exec command cpu&lt;BR /&gt;privilege show level 3 mode exec command interface&lt;BR /&gt;privilege show level 3 mode exec command clock&lt;BR /&gt;privilege show level 3 mode exec command dns-hosts&lt;BR /&gt;privilege show level 3 mode exec command access-list&lt;BR /&gt;privilege show level 3 mode exec command logging&lt;BR /&gt;privilege show level 3 mode exec command vlan&lt;BR /&gt;privilege show level 3 mode exec command ip&lt;BR /&gt;privilege show level 3 mode exec command ipv6&lt;BR /&gt;privilege show level 3 mode exec command failover&lt;BR /&gt;privilege show level 3 mode exec command asdm&lt;BR /&gt;privilege show level 3 mode exec command arp&lt;BR /&gt;privilege show level 3 mode exec command route&lt;BR /&gt;privilege show level 3 mode exec command ospf&lt;BR /&gt;privilege show level 3 mode exec command aaa-server&lt;BR /&gt;privilege show level 3 mode exec command aaa&lt;BR /&gt;privilege show level 3 mode exec command eigrp&lt;BR /&gt;privilege show level 3 mode exec command crypto&lt;BR /&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;BR /&gt;privilege show level 3 mode exec command ssh&lt;BR /&gt;privilege show level 3 mode exec command dhcpd&lt;BR /&gt;privilege show level 3 mode exec command vpn&lt;BR /&gt;privilege show level 3 mode exec command blocks&lt;BR /&gt;privilege show level 3 mode exec command wccp&lt;BR /&gt;privilege show level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege show level 3 mode exec command webvpn&lt;BR /&gt;privilege show level 3 mode exec command module&lt;BR /&gt;privilege show level 3 mode exec command uauth&lt;BR /&gt;privilege show level 3 mode exec command compression&lt;BR /&gt;privilege show level 3 mode configure command interface&lt;BR /&gt;privilege show level 3 mode configure command clock&lt;BR /&gt;privilege show level 3 mode configure command access-list&lt;BR /&gt;privilege show level 3 mode configure command logging&lt;BR /&gt;privilege show level 3 mode configure command ip&lt;BR /&gt;privilege show level 3 mode configure command failover&lt;BR /&gt;privilege show level 5 mode configure command asdm&lt;BR /&gt;privilege show level 3 mode configure command arp&lt;BR /&gt;privilege show level 3 mode configure command route&lt;BR /&gt;privilege show level 3 mode configure command aaa-server&lt;BR /&gt;privilege show level 3 mode configure command aaa&lt;BR /&gt;privilege show level 3 mode configure command crypto&lt;BR /&gt;privilege show level 3 mode configure command ssh&lt;BR /&gt;privilege show level 3 mode configure command dhcpd&lt;BR /&gt;privilege show level 5 mode configure command privilege&lt;BR /&gt;privilege clear level 3 mode exec command dns-hosts&lt;BR /&gt;privilege clear level 3 mode exec command logging&lt;BR /&gt;privilege clear level 3 mode exec command arp&lt;BR /&gt;privilege clear level 3 mode exec command aaa-server&lt;BR /&gt;privilege clear level 3 mode exec command crypto&lt;BR /&gt;privilege clear level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege cmd level 3 mode configure command failover&lt;BR /&gt;privilege clear level 3 mode configure command logging&lt;BR /&gt;privilege clear level 3 mode configure command arp&lt;BR /&gt;privilege clear level 3 mode configure command crypto&lt;BR /&gt;privilege clear level 3 mode configure command aaa-server&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;no call-home reporting anonymous&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;: end&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Backup Site B&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size:10px;"&gt;ASA Version 8.2(5)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname dr-5510asa&lt;BR /&gt;domain-name&amp;nbsp;&lt;BR /&gt;enable&lt;BR /&gt;passwd&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.100.194.2 255.255.255.252&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 172.16.100.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.115.85.212 255.255.255.248&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.100.199.15 255.255.255.0&amp;nbsp;&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa825-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup management&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name&amp;nbsp;&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq smtp&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object tcp eq domain&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ldap&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ldaps&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq domain&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq ntp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object icmp&amp;nbsp;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.11&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.13&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.30&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network xenapp_nat_servers&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.125&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.132&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.135&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.136&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.147&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.148&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.155&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.156&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.169&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.168&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.216&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.244&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.13&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;&amp;nbsp;network-object host 10.115.85.196&lt;BR /&gt;&amp;nbsp;network-object host 10.115.85.194&lt;BR /&gt;&amp;nbsp;network-object host 10.115.85.199&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 2598&lt;BR /&gt;&amp;nbsp;port-object eq citrix-ica&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.13&lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt;&amp;nbsp;network-object 10.80.0.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.85.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.13&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.28&lt;BR /&gt;&amp;nbsp;network-object host 172.16.102.237&lt;BR /&gt;&amp;nbsp;network-object host 10.100.205.30&lt;BR /&gt;&amp;nbsp;network-object host 172.16.102.30&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.30&lt;BR /&gt;object-group service DM_INLINE_TCP_5 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3268&lt;BR /&gt;&amp;nbsp;port-object eq 3269&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.30&lt;BR /&gt;object-group network DM_INLINE_NETWORK_8&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.141&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;object-group protocol DM_INLINE_PROTOCOL_4&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color:#FF0000;"&gt;&lt;STRONG&gt;object-group network DM_INLINE_NETWORK_7&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.13&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list dmz_access_in extended permit object-group DM_INLINE_PROTOCOL_2 host 172.16.100.10 any log disable inactive&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#FF0000;"&gt;&lt;STRONG&gt;access-list dmz_access_in extended permit ip object-group DM_INLINE_NETWORK_7 any log disable&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list dmz_access_in extended permit object-group DM_INLINE_PROTOCOL_3 any any log disable inactive&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit tcp object-group DM_INLINE_NETWORK_5 any object-group DM_INLINE_TCP_2 log disable&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit object-group DM_INLINE_SERVICE_1 object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_NETWORK_8 log disable&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit tcp object-group DM_INLINE_NETWORK_4 host 172.16.101.14 object-group DM_INLINE_TCP_3 log disable inactive&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit tcp object-group DM_INLINE_NETWORK_2 object-group DM_INLINE_NETWORK_6 object-group DM_INLINE_TCP_4 log disable&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 172.16.100.10 host 172.16.101.12 object-group DM_INLINE_TCP_5 log warnings&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 10.0.0.0 255.0.0.0 any log warnings&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_4 any host 10.115.85.198 log disable&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_TCP_1 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.115.85.196 eq smtp log warnings&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any host 10.115.85.198 eq domain log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp host 71.41.5.42 any log warnings&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.115.85.200 eq 3389 log disable inactive&amp;nbsp;&lt;BR /&gt;access-list RemoteAccess_splitTunnelAcl standard permit 10.100.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.100.0.0 255.255.0.0 10.254.100.0 255.255.255.240&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging list acl-deny message 106023&lt;BR /&gt;logging asdm acl-deny&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool vpn_ip_pool 10.254.100.0-10.254.100.10 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-731-101.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (dmz) 1 interface&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 172.16.20.0 255.255.255.255&lt;BR /&gt;nat (inside) 1 10.92.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.100.85.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.100.199.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.100.205.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.200.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.200.145.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.202.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.100.80.0 255.255.252.0&lt;BR /&gt;nat (dmz) 1 172.16.100.0 255.255.255.0&lt;BR /&gt;static (inside,dmz) 172.16.101.12 10.100.205.12 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (dmz,outside) 10.115.85.196 172.16.100.10 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.101.23 10.100.205.23 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.101.141 10.200.1.41 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (dmz,dmz) 10.115.85.196 172.16.100.10 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (dmz,outside) 10.115.85.194 172.16.100.18 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.101.13 10.100.205.13 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.101.28 10.100.205.28 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 10.100.205.30 10.100.205.30 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.102.237 10.200.1.237 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 10.80.0.0 10.80.0.0 netmask 255.255.252.0&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 10.85.1.0 10.85.1.0 netmask 255.255.255.0&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.102.30 10.200.1.30 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;static (dmz,outside) 10.115.85.198 172.16.100.13 netmask 255.255.255.255&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;static (dmz,outside) 10.115.85.199 172.16.100.19 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (dmz,inside) 10.115.85.199 172.16.100.19 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;!&lt;BR /&gt;router eigrp 100&lt;BR /&gt;&amp;nbsp;network 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp;network 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp;passive-interface default&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.115.85.209 1&lt;BR /&gt;route inside 10.0.0.0 255.0.0.0 10.100.194.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.0.0.0 255.0.0.0 inside&lt;BR /&gt;http 10.0.0.0 255.0.0.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs&amp;nbsp;&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 inside&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 management&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.200.1.41 source inside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy &amp;nbsp;internal&lt;BR /&gt;group-policy attributes&lt;BR /&gt;&amp;nbsp;dns-server value 10.100.205.12&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol IPSec&amp;nbsp;&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value&lt;BR /&gt;&amp;nbsp;default-domain value&amp;nbsp;&lt;BR /&gt;&amp;nbsp;vlan none&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&lt;BR /&gt;tunnel-group RemoteAccess type remote-access&lt;BR /&gt;tunnel-group RemoteAccess general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpn_ip_pool&lt;BR /&gt;&amp;nbsp;default-group-policy&amp;nbsp;&lt;BR /&gt;tunnel-group RemoteAccess ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:&lt;BR /&gt;: end&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;Packet Traces&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;Primary Site A&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;16:57:58.666504 IP 172.16.20.11.18356 &amp;gt; 10.115.85.198.3009: Flags [S], seq 430645583, win 8190, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:04.607505 IP 172.16.20.11.18356 &amp;gt; 10.115.85.198.3009: Flags [R.], seq 430645584, ack 0, win 9829, length 0&lt;BR /&gt;16:58:12.607538 IP 172.16.20.11.38003 &amp;gt; 10.115.85.198.3009: Flags [S], seq 433025705, win 8190, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:13.626502 IP 172.16.20.11.38003 &amp;gt; 10.115.85.198.3009: Flags [S], seq 433025705, win 8190, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:15.646499 IP 172.16.20.11.38003 &amp;gt; 10.115.85.198.3009: Flags [S], seq 433025705, win 8190, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:19.656501 IP 172.16.20.11.38003 &amp;gt; 10.115.85.198.3009: Flags [S], seq 433025705, win 8190, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Backup Site B&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;16:58:14.610285 IP wsip-10-242-145-185.sd.sd.cox.net.18356 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2128981880, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:22.620422 IP wsip-10-242-145-185.sd.sd.cox.net.18356 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2128981880, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:28.562413 IP wsip-10-242-145-185.sd.sd.cox.net.18356 &amp;gt; 172.16.100.13.3009: Flags [R.], seq 2128981881, ack 2987039257, win 9829, length 0&lt;BR /&gt;16:58:36.561098 IP wsip-10-242-145-185.sd.sd.cox.net.38003 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2895697572, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:37.579755 IP wsip-10-242-145-185.sd.sd.cox.net.38003 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2895697572, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:39.599893 IP wsip-10-242-145-185.sd.sd.cox.net.38003 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2895697572, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:16:03 GMT</pubDate>
    <dc:creator>Ryan Fisher</dc:creator>
    <dc:date>2019-03-12T06:16:03Z</dc:date>
    <item>
      <title>ASA Not allowing port 3009</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668865#M193823</link>
      <description>&lt;P&gt;I'm working to set up Citrix netscalers with global server load balancing (gslb) across two different locations. &amp;nbsp;The default config on the netscalers when completed makes the two talk to each other over the internet over port TCP 3011. &amp;nbsp;When you choose to encrypt this discussion, it then changes the port to TCP 3009.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site A netscaler (primary) &amp;nbsp;--&amp;gt; &amp;nbsp;Site B netscaler (backup)&lt;/P&gt;&lt;P&gt;DMZ IP: &amp;nbsp; &amp;nbsp; 172.16.20.11 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;172.16.100.13&lt;/P&gt;&lt;P&gt;outside IP: 10.242.145.185 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.115.85.198&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem I'm having, is that these two netscalers are able to talk just fine over 3011, but as soon as I put it to secure on port 3009 I only see one-way traffic. &amp;nbsp;The one-way traffic is only from site A to site B. &amp;nbsp;Site B does not respond at all to site A's requests. &amp;nbsp;The rules on both firewalls at this point are basically:&lt;/P&gt;&lt;P&gt;from DMZ to internet netscaler IP to any all Ports&lt;/P&gt;&lt;P&gt;from anything outside to NAT'd netscaler IP all ports&lt;/P&gt;&lt;P&gt;I tried this same configuration with two netscalers both in the same DMZ and they talk properly over secure port 3009, so I know that it can work. &amp;nbsp;(not to mention they both talk fine over port 3011 with the same rules in place) &amp;nbsp;I thought that maybe it was the policy map in global policy, but nothing sticks out. &amp;nbsp;Also, I can create test services between the two netscalers, and I can get UDP port 3009 to talk together, just not TCP 3009.&lt;/P&gt;&lt;P&gt;Can anyone look at my two firewall configs and see if there's any reason I cannot get these to talk on port 3009? &amp;nbsp;I've color coded the relevant parts of the config to help with finding them. &amp;nbsp;Hopefully that helps. &amp;nbsp;I've also included below some small packet traces from each netscaler.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Primary Site A&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;!&lt;BR /&gt;hostname sd01-5510asa-ha&lt;BR /&gt;domain-name&amp;nbsp;&lt;BR /&gt;enable&amp;nbsp;&lt;BR /&gt;passwd&amp;nbsp;&lt;BR /&gt;names&lt;BR /&gt;name 10.2.3.2 Server_CBDC01 description Carlsbad DC/DNS Server&lt;BR /&gt;name 10.1.3.7 Server_Citrix description Legacy Citrix Metaframe XP Server&lt;BR /&gt;name 10.1.3.2 Server_Domain3 description San Diego DC/DNS Server&lt;BR /&gt;name 172.16.20.7 Network_CAG_MIP description Citrix Access Gateway Management Interface&lt;BR /&gt;name 172.16.20.5 Network_CAG_PRI description Citrix Access Gateway HA Primary&lt;BR /&gt;name 172.16.20.20 Network_CAG_Remote description remote.domain.com Virtual Interface&lt;BR /&gt;name 172.16.20.6 Network_CAG_SEC description Citrix Access Gateway HA Secondary&lt;BR /&gt;name 172.16.20.21 Network_CAG_VPN description vpn.domain.com Virtual Interface&lt;BR /&gt;name 172.16.20.4 Network_FW3-Lab description Linksys Firewall for Lab Network&lt;BR /&gt;name 172.16.20.13 Server_FTP description ftp.domain.com Enterprise FTP Server&lt;BR /&gt;name 10.242.145.138 Public_Network_CAG_Remote description remote.domain.com External IP&lt;BR /&gt;name 10.242.145.139 Public_Network_CAG_VPN description vpn.domain.com External IP&lt;BR /&gt;name 10.242.145.144 Public_Network_FW3-Lab description External IP for Lab Network&lt;BR /&gt;name 10.242.145.140 Public_Server_FTP description ftp.domain.com External IP&lt;BR /&gt;name 172.16.20.12 Server_MailGate description SMTP Mail Gateway&lt;BR /&gt;name 10.242.145.131 Public_Server_MailGate description mail.domain.com External IP&lt;BR /&gt;name 172.16.21.32 NAT_Server_CBDC01 description Translated Address to CBDC01&lt;BR /&gt;name 172.16.21.2 NAT_Server_Domain3 description Translated Address to Domain3&lt;BR /&gt;name 172.16.21.34 NAT_Server_PS02 description Translated Address to PS02&lt;BR /&gt;name 172.16.21.56 NAT_Server_PS06 description Translated Address to PS06&lt;BR /&gt;name 172.16.21.201 NAT_Remote_WI_Virtual_IP description Translated Address to remote.domain.com&lt;BR /&gt;name 10.200.1.201 Remote_WI_Virtual description Virtual IP for remote.domain.com&lt;BR /&gt;name 172.16.21.14 NAT_Server_WEB01-v_Ext_Remote description NAT to remote.domain.com webserver&lt;BR /&gt;name 172.16.21.17 NAT_Server_WEB02-v_Ext_Remote description NAT to remote.domain.com webservr&lt;BR /&gt;name 10.200.1.14 Server_WEB01-v_Ext_Remote description Web Server for remote.domain.com&lt;BR /&gt;name 10.200.1.17 Server_WEB02-v_Ext_Remote description Web Server for remote.domain.com&lt;BR /&gt;name 172.16.20.22 Network_CAG_OWA description owa.domain.com through netscaler&lt;BR /&gt;name 172.16.21.25 NAT_Server_PS03 description Translated Address to PS03&lt;BR /&gt;name 172.16.21.63 NAT_Server_vPS07 description Translated Address to vPS07&lt;BR /&gt;name 172.16.21.20 NAT_Server_vPS11 description Translated address to vPS11&lt;BR /&gt;name 172.16.21.33 NAT_Server_PS01 description Translated address to PS01&lt;BR /&gt;name 172.16.21.35 NAT_Server_PS07-v description Translated Address PS07-v&lt;BR /&gt;name 172.16.21.36 NAT_Server_PS08-v description Translated Address PS08-v&lt;BR /&gt;name 10.200.1.39 Server_BES01-v description Enterprise Blackberry Server&lt;BR /&gt;name 172.16.21.41 NAT_Server_SDDC01-v description Translated Address to SDDC01-v&lt;BR /&gt;name 10.200.1.41 Server_SDDC01-v description San Diego DC/DNS Server&lt;BR /&gt;name 172.16.21.47 NAT_Server_PS09-v description Translated Address PS09-v&lt;BR /&gt;name 172.16.21.48 NAT_Server_PS10-v description Translated Address to PS10-v&lt;BR /&gt;name 172.16.21.54 NAT_Server_PS04 description Translated Address to PS04&lt;BR /&gt;name 172.16.21.55 NAT_Server_PS11 description Translated Address to PS11&lt;BR /&gt;name 10.242.145.143 Public_Network_iPhone description Web Access to iPhone Policy Web&lt;BR /&gt;name 172.16.20.14 Server_WWW description Linux Web Server&lt;BR /&gt;name 172.16.21.68 NAT_Server_PS12-v description Translated address to PS12-v&lt;BR /&gt;name 172.16.21.69 NAT_Server_PS05-v description Translated Address to PS05-v&lt;BR /&gt;name 172.16.21.42 NAT_Server_SDDC02-v description Translated address to SDDC02-v&lt;BR /&gt;name 10.200.1.42 Server_SDDC02-v description Enterprise DC/DNS&lt;BR /&gt;name 10.242.145.160 Public_Server_Tandberg01 description External IP for Tandberg Video Conferencing 1st Floor&lt;BR /&gt;name 10.242.145.161 Public_Server_Tandberg19 description External IP for Tandberg Video Conferencing 19th Floor&lt;BR /&gt;name 10.242.145.162 Public_Server_Tandberg21 description External IP for Tandberg Video Conferencing 21st Floor&lt;BR /&gt;name 10.242.145.163 Public_Server_TandbergMCU description External IP for Tandberg MCU Gateway&lt;BR /&gt;name 10.3.15.110 Server_Tandberg01 description Tandberg Video Conferencing 1st Floor&lt;BR /&gt;name 10.21.15.112 Server_Tandberg21 description Tandberg Video Conferencing 21st Floor&lt;BR /&gt;name 10.19.15.111 Server_Tandberg19 description Tandberg Video Conferencing 19th Floor&lt;BR /&gt;name 172.16.21.15 NAT_Server_meet description Translated Address to meet&lt;BR /&gt;name 172.16.21.16 NAT_Server_meet2 description Translated Address to meet2&lt;BR /&gt;name 10.200.1.93 server_rmf-fs01-lx description rmf linux admin&lt;BR /&gt;name 10.242.145.142 Public_Server_DF_WWW description Public IP for External Datafusion Access&lt;BR /&gt;name 172.16.20.18 Server_DF_WWW description Web Server For Datafusion External&lt;BR /&gt;name 172.16.21.82 NAT_Server_Datafusion description NAT Server Datafusion&lt;BR /&gt;name 10.200.1.82 Server_Datafusion description Internal Datafusion Server&lt;BR /&gt;name 172.16.21.93 NAT_Server_netmgmt07-lx-v description Translated Address to netmgmt07-lx-v&lt;BR /&gt;name 172.16.21.116 NAT_Server_PS13-v description Nat Citrix Server PS13-v&lt;BR /&gt;name 10.200.253.86 Server_TandbergMCU description Tandberg MCU Gateway&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.201.1.2 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 172.16.20.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;description LAN/STATE Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.242.145.130 255.255.255.128&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.202.1.72 255.255.255.0&amp;nbsp;&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;banner login Authorized Use Only&lt;BR /&gt;boot system disk0:/asa825-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;name-server Server_SDDC02-v&lt;BR /&gt;&amp;nbsp;domain-name&amp;nbsp;&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service CAG_Ports tcp&lt;BR /&gt;&amp;nbsp;port-object eq citrix-ica&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object host Public_Network_CAG_Remote&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.156&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.151&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.157&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.166&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.167&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.168&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.169&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.171&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.173&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.172&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.176&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.177&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.182&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.155&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_DF_WWW&lt;BR /&gt;&amp;nbsp;network-object host Public_Network_iPhone&lt;BR /&gt;object-group network Client_Networks&lt;BR /&gt;&amp;nbsp;description All Desktop Client Subnets&lt;BR /&gt;&amp;nbsp;network-object 10.19.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.20.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.21.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.22.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.13.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.3.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.80.0.0 255.255.252.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_MIP&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_PRI&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_SEC&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;object-group network xendesktop_servers&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.127&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.128&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.146&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.237&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.238&lt;BR /&gt;object-group network xenapp_servers&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.116&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.144&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.25&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.32&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.35&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.36&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.47&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.48&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.55&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.56&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.68&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.69&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;&amp;nbsp;network-object host NAT_Remote_WI_Virtual_IP&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_WEB01-v_Ext_Remote&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_WEB02-v_Ext_Remote&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.141&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.71&lt;BR /&gt;&amp;nbsp;group-object xendesktop_servers&lt;BR /&gt;&amp;nbsp;network-object 10.80.0.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.85.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.72&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.72&lt;BR /&gt;&amp;nbsp;group-object xenapp_servers&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.13&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.216&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.40&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.30&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.31&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.196&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.30&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.31&lt;BR /&gt;object-group network cag_virtual_servers&lt;BR /&gt;&amp;nbsp;description Citrix Access Gateway Virtual Servers&lt;BR /&gt;&amp;nbsp;network-object host 10.20.3.50&lt;BR /&gt;&amp;nbsp;network-object host 10.20.3.51&lt;BR /&gt;object-group network dns_servers&lt;BR /&gt;&amp;nbsp;description Internal Enterprise DNS Servers&lt;BR /&gt;&amp;nbsp;network-object host Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;network-object host Server_SDDC02-v&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.150&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq 5010&lt;BR /&gt;&amp;nbsp;port-object eq 7777&lt;BR /&gt;&amp;nbsp;port-object eq 7051&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;&amp;nbsp;port-object eq 9000&lt;BR /&gt;&amp;nbsp;port-object eq 9003&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service RDP tcp&lt;BR /&gt;&amp;nbsp;description Terminal Services&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group service citrix_ica_sr tcp&lt;BR /&gt;&amp;nbsp;description Citrix Metaframe ICA Session Reliability&lt;BR /&gt;&amp;nbsp;port-object eq 2598&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_MIP&lt;BR /&gt;&amp;nbsp;network-object host Server_DF_WWW&lt;BR /&gt;&amp;nbsp;network-object host Server_FTP&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.25&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.34&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.41&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.42&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.43&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.44&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.45&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.46&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.60&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_PRI&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_SEC&lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC02-v&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object tcp eq ldaps&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq ntp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ldap&amp;nbsp;&lt;BR /&gt;object-group network dmz_vpn_network&lt;BR /&gt;&amp;nbsp;description VPN Subnet for Citrix SSL VPN Clients&lt;BR /&gt;&amp;nbsp;network-object 172.16.20.200 255.255.255.248&lt;BR /&gt;object-group network server_network&lt;BR /&gt;&amp;nbsp;description Server Network&lt;BR /&gt;&amp;nbsp;network-object 10.200.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.200.2.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.200.10.0 255.255.255.0&lt;BR /&gt;object-group service rpc_http tcp&lt;BR /&gt;&amp;nbsp;description RPC over HTTP used for Outlook&lt;BR /&gt;&amp;nbsp;port-object eq 135&lt;BR /&gt;object-group service DNS tcp-udp&lt;BR /&gt;&amp;nbsp;port-object eq domain&lt;BR /&gt;object-group network DM_INLINE_NETWORK_8&lt;BR /&gt;&amp;nbsp;group-object Client_Networks&lt;BR /&gt;&amp;nbsp;group-object server_network&lt;BR /&gt;&amp;nbsp;network-object host 10.202.1.5&lt;BR /&gt;&amp;nbsp;network-object 10.92.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.200.145.0 255.255.255.0&lt;BR /&gt;object-group service DM_INLINE_TCP_8 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network all_rfc1918_ip_space&lt;BR /&gt;&amp;nbsp;description all reserved networks&lt;BR /&gt;&amp;nbsp;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.0.0 255.240.0.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_11&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC02-v&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.150&lt;BR /&gt;object-group network DM_INLINE_NETWORK_10&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_MIP&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.43&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.45&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;object-group network DM_INLINE_NETWORK_12&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;network-object host NAT_Server_SDDC02-v&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.150&lt;BR /&gt;object-group service SSL-LDAP tcp&lt;BR /&gt;&amp;nbsp;description SSL LDAP For Mailgate&lt;BR /&gt;&amp;nbsp;port-object eq 3269&lt;BR /&gt;object-group service DM_INLINE_TCP_11 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service tcp3008 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3008&lt;BR /&gt;object-group service tcp3101 tcp&lt;BR /&gt;&amp;nbsp;description BES traffic&lt;BR /&gt;&amp;nbsp;port-object eq 3101&lt;BR /&gt;object-group service tcp5010 tcp&lt;BR /&gt;&amp;nbsp;description Download port for&amp;nbsp;&lt;BR /&gt;&amp;nbsp;port-object eq 5010&lt;BR /&gt;object-group service Lacerte_Tax&lt;BR /&gt;&amp;nbsp;description Ports for Lacerte Tax Application&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10010&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10020&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10030&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10040&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10050&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10051&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10052&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10060&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10070&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 10099&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 1275&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 1277&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 1278&amp;nbsp;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_20&lt;BR /&gt;&amp;nbsp;group-object Client_Networks&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.68&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.32&lt;BR /&gt;object-group service external_ssh tcp&lt;BR /&gt;&amp;nbsp;port-object eq 57921&lt;BR /&gt;object-group service DM_INLINE_TCP_5 tcp&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;group-object external_ssh&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service DM_INLINE_TCP_13 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_23&lt;BR /&gt;&amp;nbsp;network-object host 10.202.1.12&lt;BR /&gt;&amp;nbsp;network-object host 10.202.1.13&lt;BR /&gt;&amp;nbsp;network-object host 10.202.1.14&lt;BR /&gt;&amp;nbsp;network-object host 10.202.1.19&lt;BR /&gt;object-group service DM_INLINE_TCP_14 tcp&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;port-object eq ftp-data&lt;BR /&gt;object-group service DM_INLINE_TCP_7 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3268&lt;BR /&gt;&amp;nbsp;port-object eq 3269&lt;BR /&gt;&amp;nbsp;port-object eq ldap&lt;BR /&gt;&amp;nbsp;port-object eq ldaps&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt;&amp;nbsp;service-object icmp echo&lt;BR /&gt;&amp;nbsp;service-object udp eq domain&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq ntp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq domain&amp;nbsp;&lt;BR /&gt;object-group service DM_INLINE_SERVICE_4&lt;BR /&gt;&amp;nbsp;service-object tcp eq domain&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq domain&amp;nbsp;&lt;BR /&gt;object-group network NTP-CLIENTS&lt;BR /&gt;&amp;nbsp;description devices that require external ntp access&lt;BR /&gt;&amp;nbsp;network-object host 10.200.10.38&lt;BR /&gt;&amp;nbsp;network-object host Server_SDDC01-v&lt;BR /&gt;object-group service V_Conf_tcp tcp&lt;BR /&gt;&amp;nbsp;port-object range 5555 5587&lt;BR /&gt;object-group service V_Conf_udp udp&lt;BR /&gt;&amp;nbsp;port-object eq 2837&lt;BR /&gt;&amp;nbsp;port-object range 2326 2485&lt;BR /&gt;object-group network Tandberg_Servers&lt;BR /&gt;&amp;nbsp;network-object host Server_Tandberg19&lt;BR /&gt;&amp;nbsp;network-object host Server_Tandberg21&lt;BR /&gt;&amp;nbsp;network-object host Server_Tandberg01&lt;BR /&gt;&amp;nbsp;network-object host Server_TandbergMCU&lt;BR /&gt;object-group network Public_Tandberg_Servers&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_Tandberg01&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_Tandberg19&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_Tandberg21&lt;BR /&gt;&amp;nbsp;network-object host Public_Server_TandbergMCU&lt;BR /&gt;object-group network DM_INLINE_NETWORK_19&lt;BR /&gt;&amp;nbsp;network-object 10.31.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.33.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.31&lt;BR /&gt;&amp;nbsp;network-object 10.202.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.85.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.28.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.189&lt;BR /&gt;&amp;nbsp;network-object 10.29.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.100.0.0 255.255.0.0&lt;BR /&gt;object-group service CUCM-PROXY-PORTS&lt;BR /&gt;&amp;nbsp;service-object udp eq tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp range 1024 65535&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 2443&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 5061&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 3804&amp;nbsp;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_21&lt;BR /&gt;&amp;nbsp;network-object 10.13.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.3.1.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_25&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_PRI&lt;BR /&gt;&amp;nbsp;network-object host Network_CAG_SEC&lt;BR /&gt;object-group service DM_INLINE_TCP_17 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;port-object eq 3010&lt;BR /&gt;object-group network DM_INLINE_NETWORK_9&lt;BR /&gt;&amp;nbsp;network-object host 10.242.128.100&lt;BR /&gt;&amp;nbsp;network-object host 10.242.128.101&lt;BR /&gt;&amp;nbsp;network-object host 68.105.28.16&lt;BR /&gt;&amp;nbsp;network-object host 68.105.29.16&lt;BR /&gt;&amp;nbsp;network-object host 8.8.8.8&lt;BR /&gt;object-group network internet_bes_servers&lt;BR /&gt;&amp;nbsp;network-object 173.247.32.0 255.255.224.0&lt;BR /&gt;&amp;nbsp;network-object 178.239.80.0 255.255.240.0&lt;BR /&gt;&amp;nbsp;network-object 180.149.148.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 193.109.81.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 204.187.87.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 206.51.26.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 206.53.144.0 255.255.240.0&lt;BR /&gt;&amp;nbsp;network-object 216.9.240.0 255.255.240.0&lt;BR /&gt;&amp;nbsp;network-object 67.223.64.0 255.255.224.0&lt;BR /&gt;&amp;nbsp;network-object 68.171.224.0 255.255.224.0&lt;BR /&gt;&amp;nbsp;network-object 74.82.64.0 255.255.224.0&lt;BR /&gt;&amp;nbsp;network-object 93.186.16.0 255.255.240.0&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 5001&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_6 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 5001&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_15&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.121&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.122&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.202&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.191&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.112&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.90&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.52&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.198&lt;BR /&gt;object-group network DM_INLINE_NETWORK_14&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.121&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.122&lt;BR /&gt;object-group network DM_INLINE_NETWORK_16&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.121&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.122&lt;BR /&gt;object-group network DM_INLINE_NETWORK_7&lt;BR /&gt;&amp;nbsp;network-object 10.28.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.29.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.35.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.36.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.37.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.39.0.0 255.255.0.0&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;&amp;nbsp;service-object tcp eq www&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq https&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq ntp&amp;nbsp;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_17&lt;BR /&gt;&amp;nbsp;network-object host Server_DF_WWW&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.25&lt;BR /&gt;object-group service DM_INLINE_TCP_9 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 9000&lt;BR /&gt;&amp;nbsp;port-object eq 9003&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_SERVICE_5&lt;BR /&gt;&amp;nbsp;service-object icmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 9000&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 9003&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq www&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq https&amp;nbsp;&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 2598&lt;BR /&gt;&amp;nbsp;port-object eq citrix-ica&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_12 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 1640&lt;BR /&gt;&amp;nbsp;port-object eq 2195&lt;BR /&gt;&amp;nbsp;port-object eq 2196&lt;BR /&gt;&amp;nbsp;port-object eq 5223&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_16 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 1640&lt;BR /&gt;&amp;nbsp;port-object eq 2195&lt;BR /&gt;&amp;nbsp;port-object eq 2196&lt;BR /&gt;&amp;nbsp;port-object eq 5223&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_SERVICE_6&lt;BR /&gt;&amp;nbsp;service-object tcp eq 5061&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 5062&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq sip&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5061&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5064&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq sip&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5062&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ssh&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq snmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq snmptrap&amp;nbsp;&lt;BR /&gt;object-group service DM_INLINE_SERVICE_7&lt;BR /&gt;&amp;nbsp;service-object tcp eq 5061&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 5062&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq sip&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5061&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq sip&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5062&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 5064&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq snmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq snmptrap&amp;nbsp;&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_4&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_18&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.190&lt;BR /&gt;&amp;nbsp;network-object host Server_BES01-v&lt;BR /&gt;object-group network DM_INLINE_NETWORK_22&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.43&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.44&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.45&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.46&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.60&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_6&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_27&lt;BR /&gt;&amp;nbsp;network-object host 12.149.173.19&lt;BR /&gt;&amp;nbsp;network-object host 12.179.134.64&lt;BR /&gt;&amp;nbsp;network-object 198.31.208.128 255.255.255.224&lt;BR /&gt;&amp;nbsp;network-object host 206.108.40.29&lt;BR /&gt;&amp;nbsp;network-object host 208.240.240.200&lt;BR /&gt;object-group service DM_INLINE_TCP_19 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 2598&lt;BR /&gt;&amp;nbsp;port-object eq citrix-ica&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;BR /&gt;&amp;nbsp;icmp-object echo-reply&lt;BR /&gt;&amp;nbsp;icmp-object time-exceeded&lt;BR /&gt;&amp;nbsp;icmp-object unreachable&lt;BR /&gt;object-group service DM_INLINE_SERVICE_8&lt;BR /&gt;&amp;nbsp;service-object ip&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object icmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object icmp traceroute&lt;BR /&gt;object-group service DM_INLINE_TCP_18 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 8082&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_26&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.41&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.42&lt;BR /&gt;object-group network DM_INLINE_NETWORK_28&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;object-group service DM_INLINE_SERVICE_10&lt;BR /&gt;&amp;nbsp;service-object tcp eq 902&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 903&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq www&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq https&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ssh&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 902&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq 9084&amp;nbsp;&lt;BR /&gt;object-group service DM_INLINE_SERVICE_9&lt;BR /&gt;&amp;nbsp;service-object tcp eq 902&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ssh&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq 902&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq www&amp;nbsp;&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_5&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_29&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;object-group network DM_INLINE_NETWORK_31&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.239&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.53&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.64&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.64&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.73&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.147&lt;BR /&gt;object-group network DM_INLINE_NETWORK_30&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_7&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_32&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;object-group network DM_INLINE_NETWORK_33&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_8&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_34&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host Server_DF_WWW&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;object-group network DM_INLINE_NETWORK_35&lt;BR /&gt;&amp;nbsp;network-object host 217.138.46.58&lt;BR /&gt;&amp;nbsp;network-object host 23.253.191.93&lt;BR /&gt;object-group service DM_INLINE_TCP_20 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 8443&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_36&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.179&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.180&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.181&lt;BR /&gt;object-group network DM_INLINE_NETWORK_37&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;object-group network DM_INLINE_NETWORK_39&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.152&lt;BR /&gt;&amp;nbsp;network-object host 172.16.21.153&lt;BR /&gt;object-group service DM_INLINE_SERVICE_11&lt;BR /&gt;&amp;nbsp;service-object tcp eq 6970&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq tftp&amp;nbsp;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_24&lt;BR /&gt;&amp;nbsp;network-object host Server_MailGate&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.60&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;object-group protocol DM_INLINE_PROTOCOL_9&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color:#FF0000;"&gt;&lt;STRONG&gt;object-group network DM_INLINE_NETWORK_13&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;object-group network DM_INLINE_NETWORK_38&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.185&lt;BR /&gt;&amp;nbsp;network-object host 10.242.145.186&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_40&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.73&lt;BR /&gt;&amp;nbsp;network-object host 10.80.0.83&lt;BR /&gt;access-list outside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1 log disable inactive&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_9 any object-group DM_INLINE_NETWORK_38 log disable&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.135 eq 8080 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_36 object-group DM_INLINE_TCP_20 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group DM_INLINE_NETWORK_35 host 10.242.145.178 eq https log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any host 10.242.145.185 eq domain log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.149 object-group DM_INLINE_TCP_9 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_TCP_1&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host Public_Server_FTP object-group DM_INLINE_TCP_5 log disable inactive&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended deny object-group DM_INLINE_SERVICE_6 any object-group Public_Tandberg_Servers log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_3 any object-group Public_Tandberg_Servers log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host Public_Server_MailGate eq smtp log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host Public_Server_MailGate object-group DM_INLINE_TCP_8 log disable inactive&amp;nbsp;&lt;BR /&gt;access-list outside_access_in remark Cisco Unified Mobility Advantage&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.130 eq 5443 inactive&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.130 eq 9080 inactive&amp;nbsp;&lt;BR /&gt;access-list outside_access_in remark Cisco Phone Proxy&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_11 any host 10.242.145.154&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.148 object-group DM_INLINE_TCP_3 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in remark Apple Mac MDMServer&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.158 object-group DM_INLINE_TCP_12 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in remark phone proxy&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.242.145.154 eq 6970 inactive&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_40 any log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp host 10.200.253.91 any object-group DM_INLINE_TCP_19 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_7 host 10.200.1.53 object-group DM_INLINE_NETWORK_28 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_8 object-group DM_INLINE_NETWORK_19 any log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 10.0.0.0 255.0.0.0 object-group DM_INLINE_NETWORK_7 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark access from vcenter01-v to dmz esx servers&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_9 host 10.200.1.67 object-group DM_INLINE_NETWORK_28 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp 10.220.40.0 255.255.255.248 any object-group DM_INLINE_TCP_6 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 17. eq 2195 log disable inactive&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Allow SMTP relay from inside&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_16 object-group DM_INLINE_NETWORK_24 eq smtp log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_21 object-group DM_INLINE_NETWORK_25 object-group DM_INLINE_TCP_17 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_SERVICE_7 object-group Tandberg_Servers any log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_4 object-group Tandberg_Servers any log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Special port opening to Go System tax software&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group Client_Networks 164.48.0.0 255.240.0.0 eq 2429 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Generic outbound Internet access&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_8 any object-group DM_INLINE_TCP_2 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Rule to allow Lacerte Tax to communicate&lt;BR /&gt;access-list inside_access_in extended permit object-group Lacerte_Tax object-group DM_INLINE_NETWORK_20 object-group DM_INLINE_NETWORK_27 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_23 any object-group DM_INLINE_TCP_14 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip 10.200.199.0 255.255.255.0 host Server_FTP log disable inactive&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 70. object-group RDP log disable inactive&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_4 object-group dns_servers object-group DM_INLINE_NETWORK_9 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit udp object-group NTP-CLIENTS any eq ntp log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip 10.200.199.0 255.255.255.0 10.150.10.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_18 object-group internet_bes_servers object-group tcp3101 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip host 10.200.10.40 any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Allows EC to connect to Kiteworks in DMZ&lt;BR /&gt;access-list inside_access_in extended permit tcp host 10.200.1.224 host 172.16.20.45 eq 8082 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Phone proxy - traffic from Subscriber to public cloud.&lt;BR /&gt;access-list inside_access_in extended permit udp host 10.200.10.33 any eq tftp inactive&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Block everything else from inside to DMZ&lt;BR /&gt;access-list inside_access_in extended deny ip any 172.16.20.0 255.255.255.0 log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Deny everything else&lt;BR /&gt;access-list inside_access_in extended deny ip any any log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit ip any any log disable inactive&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#FF0000;"&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit ip object-group DM_INLINE_NETWORK_13 any log disable&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list DMZ_access_in extended permit ip 10.28.0.0 255.255.0.0 host Network_CAG_Remote log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_PROTOCOL_5 object-group DM_INLINE_NETWORK_29 object-group DM_INLINE_NETWORK_31 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit udp object-group DM_INLINE_NETWORK_37 object-group DM_INLINE_NETWORK_39 eq 1812 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_PROTOCOL_8 object-group DM_INLINE_NETWORK_34 any log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_5 host Network_CAG_MIP host 172.16.21.154 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host Server_DF_WWW host NAT_Server_Datafusion eq 1433 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit ip object-group DM_INLINE_NETWORK_30 10.80.0.0 255.255.252.0 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_2 object-group DM_INLINE_NETWORK_17 any log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host Server_FTP host NAT_Server_netmgmt07-lx-v eq ssh log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host Network_CAG_MIP object-group DM_INLINE_NETWORK_15 object-group DM_INLINE_TCP_13 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in remark dmz esx hosts access to vcenter01-v&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_10 object-group DM_INLINE_NETWORK_26 host 10.200.1.67 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_32 object-group DM_INLINE_NETWORK_14 eq smtp log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_3 object-group DM_INLINE_NETWORK_4 object-group DM_INLINE_NETWORK_11 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_10 object-group DM_INLINE_NETWORK_12 object-group DM_INLINE_TCP_7 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_2 object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_TCP_4 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Apple Mac MDMServer&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 172.16.20.34 any object-group DM_INLINE_TCP_16 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allows Accellion controller to talk to the Accellion Connector&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 172.16.20.43 host 172.16.21.225 eq 8812 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allows KiteWorks Controllers to talk to EC&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 172.16.20.45 host 10.200.1.224 object-group DM_INLINE_TCP_18 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_1 object-group DM_INLINE_NETWORK_5 object-group DM_INLINE_NETWORK_6 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow specific access from DMZ to Internet&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_22 any object-group DM_INLINE_TCP_11 log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Allow SMTP outbound to Internet&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_33 any eq smtp log disable&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Block everything else from DMZ to Inside&lt;BR /&gt;access-list DMZ_access_in extended deny ip any object-group all_rfc1918_ip_space&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in remark Deny everything else&lt;BR /&gt;access-list DMZ_access_in extended deny ip any any log disable&amp;nbsp;&lt;BR /&gt;access-list IPS extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list web extended permit ip host 10.18.1.143 any&amp;nbsp;&lt;BR /&gt;access-list cap1 extended permit ip any host 10.1.99.99&amp;nbsp;&lt;BR /&gt;access-list cap1 extended permit ip host 10.1.99.99 any&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.150.10.0 255.255.255.240&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.150.10.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.28.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.29.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.35.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.36.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.37.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.39.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list mmp_inspect extended permit tcp any any eq 5443&amp;nbsp;&lt;BR /&gt;access-list TIG-VPN_SplitTunnel standard permit 10.0.0.0 255.0.0.0&amp;nbsp;&lt;BR /&gt;access-list phone-proxy extended permit ip any host 10.242.145.154&amp;nbsp;&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 10.0.0.0 255.0.0.0 10.35.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list test extended permit ip host 10.200.10.33 host 10.28.1.20&amp;nbsp;&lt;BR /&gt;access-list test extended permit ip host 10.28.1.20 host 10.200.10.33&amp;nbsp;&lt;BR /&gt;access-list test extended permit ip 10.0.0.0 255.0.0.0 10.28.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list test extended permit ip 10.28.0.0 255.255.0.0 10.0.0.0 255.0.0.0&amp;nbsp;&lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 10.0.0.0 255.0.0.0 10.36.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 10.29.1.11 host 10.200.10.33&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 10.200.10.33 host 10.29.1.11&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 10.200.10.33 host 10.102.1.2&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 10.102.1.2 host 10.200.10.33&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 10.200.10.33 host 70.183.84.66&amp;nbsp;&lt;BR /&gt;access-list capin extended permit ip host 70.183.84.66 host 10.200.10.33&amp;nbsp;&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip 10.0.0.0 255.0.0.0 10.37.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list outside_cryptomap_2 extended permit ip 10.0.0.0 255.0.0.0 10.29.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list SLOW-PRINTING extended permit ip any 10.37.5.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list capout extended permit ip host 70. any&amp;nbsp;&lt;BR /&gt;access-list capout extended permit ip any host 70.&amp;nbsp;&lt;BR /&gt;access-list tcp_bypass extended permit tcp host 10.201.1.2 host 10.200.10.33&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;tcp-map WSOptions&lt;BR /&gt;&amp;nbsp; tcp-options range 24 31 allow&lt;BR /&gt;!&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 65535&lt;BR /&gt;logging monitor warnings&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host management 10.202.1.5&lt;BR /&gt;logging host inside 10.200.1.135&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool IPsecClientIPPool 10.150.10.0-10.150.10.10 mask 255.255.255.0&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit secondary&lt;BR /&gt;failover lan interface Failover Ethernet0/2&lt;BR /&gt;failover link Failover Ethernet0/2&lt;BR /&gt;failover interface ip Failover 192.168.0.1 255.255.255.252 standby 192.168.0.2&lt;BR /&gt;no monitor-interface management&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-645.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (inside) 200 interface&lt;BR /&gt;global (DMZ) 101 interface&lt;BR /&gt;global (outside) 101 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 101 10.201.1.100 255.255.255.255&lt;BR /&gt;nat (inside) 101 172.16.100.0 255.255.255.255&lt;BR /&gt;nat (inside) 101 10.220.40.0 255.255.255.248&lt;BR /&gt;nat (inside) 101 10.1.10.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.3.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.3.15.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.8.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.13.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.18.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.19.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.19.15.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.20.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.21.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.22.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.31.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.33.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.85.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.92.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.200.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.200.2.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.200.10.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.200.145.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.200.199.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.202.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.204.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 101 10.80.0.0 255.255.252.0&lt;BR /&gt;nat (inside) 101 10.28.0.0 255.255.0.0&lt;BR /&gt;nat (inside) 101 10.29.0.0 255.255.0.0&lt;BR /&gt;nat (inside) 101 10.100.0.0 255.255.0.0&lt;BR /&gt;nat (inside) 101 192.168.0.0 255.255.0.0&lt;BR /&gt;nat (DMZ) 101 172.16.20.0 255.255.255.0&lt;BR /&gt;nat (outside) 101 10.150.10.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp interface 5443 10.200.10.42 5443 netmask 255.255.255.255 tcp 2048 1024&amp;nbsp;&lt;BR /&gt;static (inside,outside) tcp interface 9080 10.200.10.42 9080 netmask 255.255.255.255 tcp 2048 1024&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) Public_Server_MailGate Server_MailGate netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) Public_Server_FTP Server_FTP netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Remote_WI_Virtual_IP Remote_WI_Virtual netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_WEB01-v_Ext_Remote Server_WEB01-v_Ext_Remote netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_WEB02-v_Ext_Remote Server_WEB02-v_Ext_Remote netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_SDDC01-v Server_SDDC01-v netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_SDDC02-v Server_SDDC02-v netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) Public_Network_iPhone Server_WWW netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) Public_Server_DF_WWW Server_DF_WWW netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.155 172.16.20.30 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.149 172.16.20.24 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.151 172.16.20.26 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) Public_Network_CAG_Remote 172.16.20.27 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.157 172.16.20.28 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.156 Network_CAG_Remote netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.158 172.16.20.34 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.166 172.16.20.29 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.167 172.16.20.36 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.168 172.16.20.43 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.169 172.16.20.44 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (inside,outside) Public_Server_Tandberg01 Server_Tandberg01 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) Public_Server_Tandberg19 Server_Tandberg19 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) Public_Server_Tandberg21 Server_Tandberg21 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) Public_Server_TandbergMCU Server_TandbergMCU netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_netmgmt07-lx-v server_rmf-fs01-lx netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) NAT_Server_Datafusion Server_Datafusion netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) 10.242.145.154 10.200.10.33 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) 10.242.145.148 10.220.40.3 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.121 10.200.1.121 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.171 172.16.20.39 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.174 172.16.20.45 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.172 172.16.20.38 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.176 172.16.20.48 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.177 172.16.20.50 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,DMZ) Public_Server_MailGate Server_MailGate netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.178 172.16.20.53 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.179 172.16.20.54 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.180 172.16.20.52 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.181 172.16.20.61 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.182 172.16.20.57 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (DMZ,outside) 10.242.145.135 172.16.20.47 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;static (DMZ,outside) 10.242.145.185 172.16.20.11 netmask 255.255.255.255&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;static (DMZ,outside) 10.242.145.186 172.16.20.56 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.202 10.207.1.202 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.122 10.200.1.122 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.71 10.200.1.71 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.141 10.200.1.141 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 10.80.0.0 10.80.0.0 netmask 255.255.252.0&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 10.85.1.0 10.85.1.0 netmask 255.255.255.0&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 10.200.1.0 10.200.1.0 netmask 255.255.255.0&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.154 10.200.1.154 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.72 10.200.1.72 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.216 10.200.1.16 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.213 10.200.1.13 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.191 10.200.1.191 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.112 10.92.1.12 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.225 10.200.1.225 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) 10.242.145.173 10.200.1.40 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.196 10.200.1.196 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.224 10.200.1.224 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.67 10.200.1.67 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.150 10.200.1.150 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.64 10.200.1.64 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.52 10.200.1.52 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.73 10.200.1.73 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.152 10.200.1.152 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.153 10.200.1.153 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.30 10.200.1.30 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.31 10.200.1.31 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,DMZ) 172.16.21.147 10.200.1.147 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.242.145.29 1&lt;BR /&gt;route management 10.0.0.0 255.0.0.0 10.202.1.1 1&lt;BR /&gt;route inside 10.3.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.3.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.3.15.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.13.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.13.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.19.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.19.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.19.15.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.20.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.20.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.21.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.21.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.21.15.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.22.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.22.10.0 255.255.255.0 10.201.1.2 1&lt;BR /&gt;route inside 10.28.0.0 255.255.0.0 10.201.1.3 1&lt;BR /&gt;route inside 10.29.0.0 255.255.0.0 10.201.1.3 1&lt;BR /&gt;route inside 10.31.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.32.0.0 255.255.0.0 10.201.1.3 1&lt;BR /&gt;route inside 10.33.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route outside 10.35.0.0 255.255.0.0 10.242.145.130 1&lt;BR /&gt;route outside 10.36.0.0 255.255.0.0 10.242.145.130 1&lt;BR /&gt;route inside 10.37.0.0 255.255.0.0 10.200.194.2 1&lt;BR /&gt;route inside 10.80.0.0 255.255.252.0 10.201.1.3 1&lt;BR /&gt;route inside 10.85.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.92.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.100.0.0 255.255.0.0 10.201.1.3 1&lt;BR /&gt;route inside 10.100.193.0 255.255.255.0 10.201.1.1 1&lt;BR /&gt;route inside 10.200.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.200.2.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.200.3.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.200.10.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.200.199.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.200.253.0 255.255.255.252 10.201.1.3 1&lt;BR /&gt;route inside 10.200.253.64 255.255.255.248 10.201.1.3 1&lt;BR /&gt;route inside 10.200.253.72 255.255.255.248 10.201.1.3 1&lt;BR /&gt;route inside 10.200.253.84 255.255.255.252 10.201.1.3 1&lt;BR /&gt;route inside 10.200.253.88 255.255.255.248 10.201.1.3 1&lt;BR /&gt;route inside 10.202.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.202.199.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.207.1.0 255.255.255.0 10.201.1.3 1&lt;BR /&gt;route inside 10.220.40.0 255.255.255.248 10.201.1.3 1&lt;BR /&gt;route inside 172.16.100.0 255.255.255.255 10.201.1.2 1&lt;BR /&gt;route inside 192.168.0.0 255.255.0.0 10.201.1.3 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:10:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;ldap attribute-map LDAPAM&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server LDAP protocol nt&lt;BR /&gt;aaa-server LDAP (inside) host Server_SDDC01-v&lt;BR /&gt;&amp;nbsp;nt-auth-domain-controller domain.local&lt;BR /&gt;url-server (inside) vendor websense host 10.200.1.54 timeout 30 protocol TCP version 4 connections 5&lt;BR /&gt;aaa authentication http console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication telnet console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication serial console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication enable console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authorization command LOCAL&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.6.233 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.7.233 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.6.224 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.6.230 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.7.230 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter https except 0.0.0.0 0.0.0.0 167.68.7.224 255.255.255.255 allow&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.7.233 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.6.233 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.7.230 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.6.230 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.6.224 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 167.68.7.224 255.255.255.255&amp;nbsp;&lt;BR /&gt;filter url except 10.0.0.0 255.0.0.0 172.16.20.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.80.0.0 255.255.252.0 inside&lt;BR /&gt;http 10.85.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.200.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.201.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.13.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.31.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.0.0.0 255.0.0.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;service resetoutside&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs&amp;nbsp;&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs&amp;nbsp;&lt;BR /&gt;crypto map outside_map 1 set peer&amp;nbsp;&lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set pfs&amp;nbsp;&lt;BR /&gt;crypto map outside_map 2 set peer&amp;nbsp;&lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 3 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 3 set pfs group1&lt;BR /&gt;crypto map outside_map 3 set peer&amp;nbsp;&lt;BR /&gt;crypto map outside_map 3 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 4 match address outside_cryptomap_2&lt;BR /&gt;crypto map outside_map 4 set peer&lt;BR /&gt;crypto map outside_map 4 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto map outside_map3 4 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map3 4 set security-association lifetime kilobytes 4608000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;crypto ca certificate chain cuma&lt;BR /&gt;&amp;nbsp;certificate ca&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 5&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.201.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.200.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.200.199.1 255.255.255.255 inside&lt;BR /&gt;ssh 10.1.99.99 255.255.255.255 inside&lt;BR /&gt;ssh 10.13.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.1.3.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.31.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.150.10.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.85.1.0 255.255.255.0 inside&lt;BR /&gt;ssh Server_FTP 255.255.255.255 DMZ&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 management&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;!&lt;BR /&gt;tls-proxy ASA-tls-proxy&lt;BR /&gt;&amp;nbsp;server trust-point _internal_PP_ctl_phoneproxy_file&lt;BR /&gt;&amp;nbsp;no server authenticate-client&lt;BR /&gt;ctl-file ctl_phoneproxy_file&lt;BR /&gt;&amp;nbsp;record-entry cucm-tftp trustpoint pp_sub_trustpoint address 10.242.145.154&lt;BR /&gt;&amp;nbsp;no shutdown&lt;BR /&gt;!&lt;BR /&gt;media-termination asdm_media_termination&lt;BR /&gt;&amp;nbsp;address 10.242.145.154&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;phone-proxy ASA-phone-proxy&lt;BR /&gt;&amp;nbsp;media-termination asdm_media_termination&lt;BR /&gt;&amp;nbsp;tftp-server address 10.200.10.33 interface inside&lt;BR /&gt;&amp;nbsp;tls-proxy ASA-tls-proxy&lt;BR /&gt;&amp;nbsp;cipc security-mode authenticated&lt;BR /&gt;&amp;nbsp;ctl-file ctl_phoneproxy_file&lt;BR /&gt;&amp;nbsp;no disable service-settings&lt;BR /&gt;&amp;nbsp;proxy-server address 10.200.10.33 interface inside&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;url-block url-mempool 10240&lt;BR /&gt;url-block url-size 4&lt;BR /&gt;url-block block 128&lt;BR /&gt;ntp server Server_SDDC01-v source inside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;svc image disk0:/anyconnect-macosx-i386-2.1.0148-k9.pkg 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;!&lt;BR /&gt;class-map sec_sip&lt;BR /&gt;&amp;nbsp;match port tcp eq 5061&lt;BR /&gt;class-map tcp-bypass&lt;BR /&gt;&amp;nbsp;description "TCP traffic that bypasses stateful firewall"&lt;BR /&gt;&amp;nbsp;match access-list tcp_bypass&lt;BR /&gt;class-map WSOptions-class&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;class-map IPS_Class_Map&lt;BR /&gt;&amp;nbsp;match access-list IPS&lt;BR /&gt;class-map cuma_proxy&lt;BR /&gt;&amp;nbsp;match access-list mmp_inspect&lt;BR /&gt;class-map sec_sccp&lt;BR /&gt;&amp;nbsp;match port tcp eq 2443&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map SLOW-PRINTING&lt;BR /&gt;&amp;nbsp;description Throttles traffic to Austin printer VLAN&lt;BR /&gt;&amp;nbsp;match access-list SLOW-PRINTING&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect pptp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp error&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp;class IPS_Class_Map&lt;BR /&gt;&amp;nbsp; ips promiscuous fail-open&lt;BR /&gt;&amp;nbsp;class WSOptions-class&lt;BR /&gt;&amp;nbsp; set connection advanced-options WSOptions&lt;BR /&gt;policy-map type inspect ip-options ip-options-map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; eool action allow&lt;BR /&gt;&amp;nbsp; nop action allow&lt;BR /&gt;&amp;nbsp; router-alert action allow&lt;BR /&gt;policy-map voice_policy&lt;BR /&gt;&amp;nbsp;class sec_sccp&lt;BR /&gt;&amp;nbsp; inspect skinny phone-proxy ASA-phone-proxy&amp;nbsp;&lt;BR /&gt;&amp;nbsp;class sec_sip&lt;BR /&gt;&amp;nbsp; inspect sip phone-proxy ASA-phone-proxy&amp;nbsp;&lt;BR /&gt;policy-map SLOW-PRINTING&lt;BR /&gt;&amp;nbsp;class SLOW-PRINTING&lt;BR /&gt;&amp;nbsp; police input 10240000&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy voice_policy interface outside&lt;BR /&gt;privilege cmd level 3 mode exec command perfmon&lt;BR /&gt;privilege cmd level 3 mode exec command ping&lt;BR /&gt;privilege cmd level 3 mode exec command who&lt;BR /&gt;privilege cmd level 3 mode exec command logging&lt;BR /&gt;privilege cmd level 3 mode exec command failover&lt;BR /&gt;privilege cmd level 3 mode exec command packet-tracer&lt;BR /&gt;privilege show level 5 mode exec command import&lt;BR /&gt;privilege show level 5 mode exec command running-config&lt;BR /&gt;privilege show level 3 mode exec command reload&lt;BR /&gt;privilege show level 3 mode exec command mode&lt;BR /&gt;privilege show level 3 mode exec command firewall&lt;BR /&gt;privilege show level 3 mode exec command asp&lt;BR /&gt;privilege show level 3 mode exec command cpu&lt;BR /&gt;privilege show level 3 mode exec command interface&lt;BR /&gt;privilege show level 3 mode exec command clock&lt;BR /&gt;privilege show level 3 mode exec command dns-hosts&lt;BR /&gt;privilege show level 3 mode exec command access-list&lt;BR /&gt;privilege show level 3 mode exec command logging&lt;BR /&gt;privilege show level 3 mode exec command vlan&lt;BR /&gt;privilege show level 3 mode exec command ip&lt;BR /&gt;privilege show level 3 mode exec command ipv6&lt;BR /&gt;privilege show level 3 mode exec command failover&lt;BR /&gt;privilege show level 3 mode exec command asdm&lt;BR /&gt;privilege show level 3 mode exec command arp&lt;BR /&gt;privilege show level 3 mode exec command route&lt;BR /&gt;privilege show level 3 mode exec command ospf&lt;BR /&gt;privilege show level 3 mode exec command aaa-server&lt;BR /&gt;privilege show level 3 mode exec command aaa&lt;BR /&gt;privilege show level 3 mode exec command eigrp&lt;BR /&gt;privilege show level 3 mode exec command crypto&lt;BR /&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;BR /&gt;privilege show level 3 mode exec command ssh&lt;BR /&gt;privilege show level 3 mode exec command dhcpd&lt;BR /&gt;privilege show level 3 mode exec command vpn&lt;BR /&gt;privilege show level 3 mode exec command blocks&lt;BR /&gt;privilege show level 3 mode exec command wccp&lt;BR /&gt;privilege show level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege show level 3 mode exec command webvpn&lt;BR /&gt;privilege show level 3 mode exec command module&lt;BR /&gt;privilege show level 3 mode exec command uauth&lt;BR /&gt;privilege show level 3 mode exec command compression&lt;BR /&gt;privilege show level 3 mode configure command interface&lt;BR /&gt;privilege show level 3 mode configure command clock&lt;BR /&gt;privilege show level 3 mode configure command access-list&lt;BR /&gt;privilege show level 3 mode configure command logging&lt;BR /&gt;privilege show level 3 mode configure command ip&lt;BR /&gt;privilege show level 3 mode configure command failover&lt;BR /&gt;privilege show level 5 mode configure command asdm&lt;BR /&gt;privilege show level 3 mode configure command arp&lt;BR /&gt;privilege show level 3 mode configure command route&lt;BR /&gt;privilege show level 3 mode configure command aaa-server&lt;BR /&gt;privilege show level 3 mode configure command aaa&lt;BR /&gt;privilege show level 3 mode configure command crypto&lt;BR /&gt;privilege show level 3 mode configure command ssh&lt;BR /&gt;privilege show level 3 mode configure command dhcpd&lt;BR /&gt;privilege show level 5 mode configure command privilege&lt;BR /&gt;privilege clear level 3 mode exec command dns-hosts&lt;BR /&gt;privilege clear level 3 mode exec command logging&lt;BR /&gt;privilege clear level 3 mode exec command arp&lt;BR /&gt;privilege clear level 3 mode exec command aaa-server&lt;BR /&gt;privilege clear level 3 mode exec command crypto&lt;BR /&gt;privilege clear level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege cmd level 3 mode configure command failover&lt;BR /&gt;privilege clear level 3 mode configure command logging&lt;BR /&gt;privilege clear level 3 mode configure command arp&lt;BR /&gt;privilege clear level 3 mode configure command crypto&lt;BR /&gt;privilege clear level 3 mode configure command aaa-server&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;no call-home reporting anonymous&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;: end&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Backup Site B&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size:10px;"&gt;ASA Version 8.2(5)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname dr-5510asa&lt;BR /&gt;domain-name&amp;nbsp;&lt;BR /&gt;enable&lt;BR /&gt;passwd&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.100.194.2 255.255.255.252&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 172.16.100.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.115.85.212 255.255.255.248&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.100.199.15 255.255.255.0&amp;nbsp;&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa825-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup management&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name&amp;nbsp;&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq smtp&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object tcp eq domain&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ldap&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp eq ldaps&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq domain&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object udp eq ntp&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object icmp&amp;nbsp;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.11&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.13&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.30&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network xenapp_nat_servers&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.125&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.132&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.135&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.136&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.147&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.148&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.155&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.156&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.169&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.168&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.216&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.244&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.13&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;&amp;nbsp;network-object host 10.115.85.196&lt;BR /&gt;&amp;nbsp;network-object host 10.115.85.194&lt;BR /&gt;&amp;nbsp;network-object host 10.115.85.199&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 2598&lt;BR /&gt;&amp;nbsp;port-object eq citrix-ica&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.13&lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt;&amp;nbsp;network-object 10.80.0.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.85.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.13&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.28&lt;BR /&gt;&amp;nbsp;network-object host 172.16.102.237&lt;BR /&gt;&amp;nbsp;network-object host 10.100.205.30&lt;BR /&gt;&amp;nbsp;network-object host 172.16.102.30&lt;BR /&gt;&amp;nbsp;network-object host 10.200.1.30&lt;BR /&gt;object-group service DM_INLINE_TCP_5 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3268&lt;BR /&gt;&amp;nbsp;port-object eq 3269&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.30&lt;BR /&gt;object-group network DM_INLINE_NETWORK_8&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.101.141&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;object-group protocol DM_INLINE_PROTOCOL_4&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color:#FF0000;"&gt;&lt;STRONG&gt;object-group network DM_INLINE_NETWORK_7&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.13&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list dmz_access_in extended permit object-group DM_INLINE_PROTOCOL_2 host 172.16.100.10 any log disable inactive&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#FF0000;"&gt;&lt;STRONG&gt;access-list dmz_access_in extended permit ip object-group DM_INLINE_NETWORK_7 any log disable&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list dmz_access_in extended permit object-group DM_INLINE_PROTOCOL_3 any any log disable inactive&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit tcp object-group DM_INLINE_NETWORK_5 any object-group DM_INLINE_TCP_2 log disable&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit object-group DM_INLINE_SERVICE_1 object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_NETWORK_8 log disable&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit tcp object-group DM_INLINE_NETWORK_4 host 172.16.101.14 object-group DM_INLINE_TCP_3 log disable inactive&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit tcp object-group DM_INLINE_NETWORK_2 object-group DM_INLINE_NETWORK_6 object-group DM_INLINE_TCP_4 log disable&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 172.16.100.10 host 172.16.101.12 object-group DM_INLINE_TCP_5 log warnings&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 10.0.0.0 255.0.0.0 any log warnings&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_4 any host 10.115.85.198 log disable&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_TCP_1 log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.115.85.196 eq smtp log warnings&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any host 10.115.85.198 eq domain log disable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp host 71.41.5.42 any log warnings&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.115.85.200 eq 3389 log disable inactive&amp;nbsp;&lt;BR /&gt;access-list RemoteAccess_splitTunnelAcl standard permit 10.100.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.100.0.0 255.255.0.0 10.254.100.0 255.255.255.240&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging list acl-deny message 106023&lt;BR /&gt;logging asdm acl-deny&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool vpn_ip_pool 10.254.100.0-10.254.100.10 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-731-101.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (dmz) 1 interface&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 172.16.20.0 255.255.255.255&lt;BR /&gt;nat (inside) 1 10.92.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.100.85.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.100.199.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.100.205.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.200.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.200.145.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.202.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.100.80.0 255.255.252.0&lt;BR /&gt;nat (dmz) 1 172.16.100.0 255.255.255.0&lt;BR /&gt;static (inside,dmz) 172.16.101.12 10.100.205.12 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (dmz,outside) 10.115.85.196 172.16.100.10 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.101.23 10.100.205.23 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.101.141 10.200.1.41 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (dmz,dmz) 10.115.85.196 172.16.100.10 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (dmz,outside) 10.115.85.194 172.16.100.18 netmask 255.255.255.255 dns&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.101.13 10.100.205.13 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.101.28 10.100.205.28 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 10.100.205.30 10.100.205.30 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.102.237 10.200.1.237 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 10.80.0.0 10.80.0.0 netmask 255.255.252.0&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 10.85.1.0 10.85.1.0 netmask 255.255.255.0&amp;nbsp;&lt;BR /&gt;static (inside,dmz) 172.16.102.30 10.200.1.30 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color:#EE82EE;"&gt;&lt;STRONG&gt;static (dmz,outside) 10.115.85.198 172.16.100.13 netmask 255.255.255.255&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;static (dmz,outside) 10.115.85.199 172.16.100.19 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (dmz,inside) 10.115.85.199 172.16.100.19 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;!&lt;BR /&gt;router eigrp 100&lt;BR /&gt;&amp;nbsp;network 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp;network 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp;passive-interface default&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.115.85.209 1&lt;BR /&gt;route inside 10.0.0.0 255.0.0.0 10.100.194.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.0.0.0 255.0.0.0 inside&lt;BR /&gt;http 10.0.0.0 255.0.0.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs&amp;nbsp;&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 inside&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 management&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.200.1.41 source inside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy &amp;nbsp;internal&lt;BR /&gt;group-policy attributes&lt;BR /&gt;&amp;nbsp;dns-server value 10.100.205.12&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol IPSec&amp;nbsp;&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value&lt;BR /&gt;&amp;nbsp;default-domain value&amp;nbsp;&lt;BR /&gt;&amp;nbsp;vlan none&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&amp;nbsp;&lt;BR /&gt;username&lt;BR /&gt;tunnel-group RemoteAccess type remote-access&lt;BR /&gt;tunnel-group RemoteAccess general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpn_ip_pool&lt;BR /&gt;&amp;nbsp;default-group-policy&amp;nbsp;&lt;BR /&gt;tunnel-group RemoteAccess ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:&lt;BR /&gt;: end&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;Packet Traces&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;Primary Site A&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;16:57:58.666504 IP 172.16.20.11.18356 &amp;gt; 10.115.85.198.3009: Flags [S], seq 430645583, win 8190, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:04.607505 IP 172.16.20.11.18356 &amp;gt; 10.115.85.198.3009: Flags [R.], seq 430645584, ack 0, win 9829, length 0&lt;BR /&gt;16:58:12.607538 IP 172.16.20.11.38003 &amp;gt; 10.115.85.198.3009: Flags [S], seq 433025705, win 8190, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:13.626502 IP 172.16.20.11.38003 &amp;gt; 10.115.85.198.3009: Flags [S], seq 433025705, win 8190, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:15.646499 IP 172.16.20.11.38003 &amp;gt; 10.115.85.198.3009: Flags [S], seq 433025705, win 8190, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:19.656501 IP 172.16.20.11.38003 &amp;gt; 10.115.85.198.3009: Flags [S], seq 433025705, win 8190, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Backup Site B&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;16:58:14.610285 IP wsip-10-242-145-185.sd.sd.cox.net.18356 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2128981880, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:22.620422 IP wsip-10-242-145-185.sd.sd.cox.net.18356 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2128981880, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:28.562413 IP wsip-10-242-145-185.sd.sd.cox.net.18356 &amp;gt; 172.16.100.13.3009: Flags [R.], seq 2128981881, ack 2987039257, win 9829, length 0&lt;BR /&gt;16:58:36.561098 IP wsip-10-242-145-185.sd.sd.cox.net.38003 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2895697572, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:37.579755 IP wsip-10-242-145-185.sd.sd.cox.net.38003 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2895697572, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;BR /&gt;16:58:39.599893 IP wsip-10-242-145-185.sd.sd.cox.net.38003 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2895697572, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:16:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668865#M193823</guid>
      <dc:creator>Ryan Fisher</dc:creator>
      <dc:date>2019-03-12T06:16:03Z</dc:date>
    </item>
    <item>
      <title>Hello Ryan,Can you ran this</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668866#M193824</link>
      <description>&lt;P&gt;Hello Ryan,&lt;/P&gt;&lt;P&gt;Can you ran this commands on the firewalls:&lt;/P&gt;&lt;P&gt;packet in dmz tcp 172.16.20.11 1025 10.115.85.198 3009&lt;/P&gt;&lt;P&gt;packet in dmz tcp wsip-10-242-145-185.sd.sd.cox.net 1025 172.16.100.13 3009&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;16:57:58.666504 IP 172.16.20.11.18356 &amp;gt; 10.115.85.198.3009: Flags [S], seq 430645583, win 8190, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;16:58:14.610285 IP wsip-10-242-145-185.sd.sd.cox.net.18356 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2128981880, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 00:36:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668866#M193824</guid>
      <dc:creator>joseoroz</dc:creator>
      <dc:date>2015-07-15T00:36:42Z</dc:date>
    </item>
    <item>
      <title>ok, so I'm focusing on one</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668867#M193825</link>
      <description>&lt;P&gt;ok, so I'm focusing on one ASA at the remote site right now. &amp;nbsp;When I run the packet tracer like you suggested on the one:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;packet-tracer input dmz tcp 10.242.145.185 1025 172.16.100.13 3009&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I get:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 172.16.100.0 &amp;nbsp; &amp;nbsp;255.255.255.0 &amp;nbsp; dmz&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;​When I look to see what&amp;nbsp;the rule is that it dropped on, it's the any to any deny all implicit rule at the end on the DMZ interface. &amp;nbsp;If I add a rule on the DMZ interface to allow any to any all ports:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;access-list dmz_access_in extended permit object-group DM_INLINE_PROTOCOL_3 any any log disable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Then run a packet trace, I get dropped because of a nat rule:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 172.16.100.0 &amp;nbsp; &amp;nbsp;255.255.255.0 &amp;nbsp; dmz&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-list dmz_access_in extended permit object-group DM_INLINE_PROTOCOL_3 any any log disable&amp;nbsp;&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (dmz) 1 172.16.100.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip dmz 172.16.100.0 255.255.255.0 dmz any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 1 (172.16.100.1 [Interface PAT])&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The NAT rule that shows it's dropping it now is:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;global (dmz) 1 interface&lt;BR /&gt;global (outside) 1 interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;nat (dmz) 1 172.16.100.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So, I guess what I don't get out of this:&lt;/P&gt;&lt;P&gt;Why in the first place is the access rule blocking the packet flow? &amp;nbsp;It's not seeing the ACL for this traffic? &amp;nbsp;But also, the interface that should be letting this traffic in should be on the outside interface, because 172.16.100.13 is being NAT'd to the outside address 10.116.85.198. &amp;nbsp;So that's the interface that should be letting it in to the DMZ, no? &amp;nbsp;That's how it's working for everything else I'm NATing to the outside.&lt;/P&gt;&lt;P&gt;If I do a packet trace from 10.242.145.185 to 10.115.85.198, it lets it through, just as it should. &amp;nbsp;I guess I'm at a loss here as to what rule is blocking it and why.&lt;/P&gt;&lt;P&gt;Another thing on these packet traces, if I do that same packet trace to a DMZ address that's working right now, like a website that I can access just fine, it still shows the packets getting dropped. &amp;nbsp;So I'm thinking that this isn't a good test. &amp;nbsp;I also would be thinking that this trace should be run using the outside interface, not the DMZ interface, since ingress is the outside. &amp;nbsp;No? &amp;nbsp;But alas, the packets are dropped when I use either interface, so it doesn't matter I guess. &amp;nbsp;All I know is these other websites are working fine and the packet tracer shows that the packets are dropped.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 21:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668867#M193825</guid>
      <dc:creator>Ryan Fisher</dc:creator>
      <dc:date>2015-07-15T21:13:31Z</dc:date>
    </item>
    <item>
      <title>Hello Ryan,I used the name</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668868#M193826</link>
      <description>&lt;P&gt;Hello Ryan,&lt;/P&gt;&lt;P&gt;I used the name that appeared on the trace. I forgot to mention that that needed to be changed with the IP of the DMZ client that was making the request.&lt;/P&gt;&lt;P&gt;This should be the correct packet tracer:&lt;/P&gt;&lt;P&gt;packet in DMZ tcp 172.16.20.11 1025 172.16.100.13 3009&lt;/P&gt;&lt;P&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 10.242.145.185 172.16.20.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;16:58:14.610285 IP wsip-10-242-145-185.sd.sd.cox.net.18356 &amp;gt; 172.16.100.13.3009: Flags [S], seq 2128981880, win 8190, options [mss 1380,nop,wscale 4,nop,nop,sackOK], length 0&lt;/P&gt;&lt;P&gt;-------------------------------------------&lt;/P&gt;&lt;P&gt;Now when we ran the packet tracer we do it from the source interface like we do in an inbound ACL. So we are using the IP from the DMZ as the source and the destination the remote server with the destination port that the server is going to reply on.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please send me this packet tracer when you have a chance.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jose Orozco.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 02:01:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668868#M193826</guid>
      <dc:creator>joseoroz</dc:creator>
      <dc:date>2015-07-16T02:01:03Z</dc:date>
    </item>
    <item>
      <title>Thanks for helping me out.  I</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668869#M193827</link>
      <description>&lt;P&gt;Thanks for helping me out. Doing that packet trace at the primary site (Site A that's hosting 172.16.20.11) the packet shows allowed&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size:10px;"&gt;sd01-5510asa-ha# packet-tracer input dmz&amp;nbsp;tcp 172.16.20.11 1025 172.16.100.13 3$&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-list DMZ_access_in extended permit ip object-group DM_INLINE_NETWORK_13 any log disable&lt;BR /&gt;object-group network DM_INLINE_NETWORK_13&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map WSOptions-class&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class WSOptions-class&lt;BR /&gt;&amp;nbsp; set connection advanced-options WSOptions&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 6&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 7&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (DMZ,outside) 10.242.145.185 172.16.20.11 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip DMZ host 172.16.20.11 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; static translation to 10.242.145.185&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 3593, untranslate_hits = 1889&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.20.11/0 to 10.242.145.185/0 using netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (DMZ,outside) 10.242.145.185 172.16.20.11 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip DMZ host 172.16.20.11 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; static translation to 10.242.145.185&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 3593, untranslate_hits = 1889&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 770013867, packet dispatched to next module&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The packet also shows allowed at the remote site (Site B hosting 172.16.100.13)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;dr-5510asa# packet-tracer input dmz tcp 172.16.100.13 1025 172.16.20.11 3009&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-list dmz_access_in extended permit ip object-group DM_INLINE_NETWORK_7 any log disable&lt;BR /&gt;object-group network DM_INLINE_NETWORK_7&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.13&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (dmz,outside) 10.115.85.198 172.16.100.13 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip dmz host 172.16.100.13 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; static translation to 10.115.85.198&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 3486, untranslate_hits = 13395&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.100.13/0 to 10.115.85.198/0 using netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (dmz,outside) 10.115.85.198 172.16.100.13 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip dmz host 172.16.100.13 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; static translation to 10.115.85.198&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 3486, untranslate_hits = 13395&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 41077529, packet dispatched to next module&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, that is showing that both firewalls are able to send OUT on port 3009, right? &amp;nbsp;What about to RECEIVE on that port? &amp;nbsp;Is this the correct packet trace?&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;sd01-5510asa-ha# packet-tracer input dmz&amp;nbsp;tcp 172.16.100.13 1025 172.16.20.11 3009&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 172.16.20.0 &amp;nbsp; &amp;nbsp; 255.255.255.0 &amp;nbsp; DMZ&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-list DMZ_access_in extended deny ip any object-group all_rfc1918_ip_space&lt;BR /&gt;access-list DMZ_access_in remark Deny everything else&lt;BR /&gt;object-group network all_rfc1918_ip_space&lt;BR /&gt;&amp;nbsp;description: all reserved networks&lt;BR /&gt;&amp;nbsp;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.0.0 255.240.0.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;dr-5510asa# packet-tracer input dmz tcp 172.16.20.11 1025 172.16.100.13 3009&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 172.16.100.0 &amp;nbsp; &amp;nbsp;255.255.255.0 &amp;nbsp; dmz&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 03:35:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668869#M193827</guid>
      <dc:creator>Ryan Fisher</dc:creator>
      <dc:date>2015-07-16T03:35:45Z</dc:date>
    </item>
    <item>
      <title>Also, I just ran the packet</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668870#M193828</link>
      <description>&lt;P&gt;Also, I just ran the packet tracer to include the detail:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;sd01-5510asa-ha# packet-tracer input dmZ tcp 172.16.20.11 1025 172.16.100.13 3009 detailed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xab9637f8, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=433038009, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-list DMZ_access_in extended permit ip object-group DM_INLINE_NETWORK_13 any log disable&lt;BR /&gt;object-group network DM_INLINE_NETWORK_13&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.10&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.11&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.55&lt;BR /&gt;&amp;nbsp;network-object host 172.16.20.56&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xaeb0abc8, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=726562, user_data=0xa8ad3840, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=172.16.20.11, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map WSOptions-class&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class WSOptions-class&lt;BR /&gt;&amp;nbsp; set connection advanced-options WSOptions&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xae4b6260, priority=7, domain=conn-set, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=138349220, user_data=0xae4b53a8, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xab9ffa08, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=87443115, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 6&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xae4a79b8, priority=50, domain=ids, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=138349448, user_data=0xae4a73c8, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 7&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xabb5c5b8, priority=20, domain=lu, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=88120610, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (DMZ,outside) 10.242.145.185 172.16.20.11 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip DMZ host 172.16.20.11 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; static translation to 10.242.145.185&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 3598, untranslate_hits = 1898&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.20.11/0 to 10.242.145.185/0 using netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xaf28b8e8, priority=5, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=4276, user_data=0xab9c23b0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=172.16.20.11, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (DMZ,outside) 10.242.145.185 172.16.20.11 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip DMZ host 172.16.20.11 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; static translation to 10.242.145.185&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 3598, untranslate_hits = 1898&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xab9c2470, priority=5, domain=host, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=747610, user_data=0xab9c23b0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=172.16.20.11, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xabb6b0e0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=523956680, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 770072791, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;dr-5510asa# packet-tracer input dmz tcp 172.16.100.13 1025 172.16.20.11 3009 detailed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-list dmz_access_in extended permit ip object-group DM_INLINE_NETWORK_7 any log disable&lt;BR /&gt;object-group network DM_INLINE_NETWORK_7&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.12&lt;BR /&gt;&amp;nbsp;network-object host 172.16.100.13&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xaba6f7e0, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=35389, user_data=0xa8b0bb80, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=172.16.100.13, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xab91c5e0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=32898999, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (dmz,outside) 10.115.85.198 172.16.100.13 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip dmz host 172.16.100.13 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; static translation to 10.115.85.198&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 3488, untranslate_hits = 13409&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.100.13/0 to 10.115.85.198/0 using netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xae1d4b80, priority=5, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=4209, user_data=0xaba546e0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=172.16.100.13, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (dmz,outside) 10.115.85.198 172.16.100.13 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip dmz host 172.16.100.13 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; static translation to 10.115.85.198&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 3488, untranslate_hits = 13409&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xaba54ae0, priority=5, domain=host, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=1106758, user_data=0xaba546e0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=172.16.100.13, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xab96b190, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=11393398, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 41085666, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 04:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668870#M193828</guid>
      <dc:creator>Ryan Fisher</dc:creator>
      <dc:date>2015-07-16T04:12:37Z</dc:date>
    </item>
    <item>
      <title>This has been resolved.</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668871#M193829</link>
      <description>&lt;P&gt;This has been resolved. &amp;nbsp;Opened a case with TAC and we found that the ASA wasn't modifying any packets and was allowing what it needed to through. &amp;nbsp;We also saw that the remote site netscaler was not responding to the primary site's requests.&lt;/P&gt;&lt;P&gt;Upon further inspection, it was a bug&amp;nbsp;on the netscaler that was preventing the secure connection from coming up.&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 15:40:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668871#M193829</guid>
      <dc:creator>Ryan Fisher</dc:creator>
      <dc:date>2015-07-17T15:40:33Z</dc:date>
    </item>
    <item>
      <title>Hello Ryan, I'm glad that the</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668872#M193830</link>
      <description>&lt;P&gt;Hello Ryan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm glad that the problem has been solved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jose Orozco.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 16:07:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-port-3009/m-p/2668872#M193830</guid>
      <dc:creator>joseoroz</dc:creator>
      <dc:date>2015-07-17T16:07:00Z</dc:date>
    </item>
  </channel>
</rss>

