<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Open firewall Ports despite DENY- ALL access rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/open-firewall-ports-despite-deny-all-access-rule/m-p/2527165#M237306</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See below my firewall rules.&lt;/P&gt;&lt;P&gt;Despite the deny all, runnning nmap from outside still reveals open ports.&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;name 202.1.53.41 fw1.outside.irc.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address fw1.inside.irc.com 255.255.252.0 standby 172.16.86.219&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif SSN-DMZ&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.20.2.1 255.255.255.0 standby 10.20.2.2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif Outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address fw1.outside.irc.com 255.255.255.248 standby NAT-202.1.53.45&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;description Internet Access for Wireless clients on the guest network&lt;BR /&gt;&amp;nbsp;nameif GuestInternet&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.154.2 255.255.254.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 10&lt;BR /&gt;&amp;nbsp;ip address 10.10.200.14 255.255.255.0 standby 10.10.200.15&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 any host &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt;&lt;BR /&gt;access-list inside_access_in remark Deny POP3, SSH, TELNET to Deny-Host-Group 172.16.86.246/249&lt;BR /&gt;access-list inside_access_in extended deny object-group DENY-HOST-GROUP object-group DENY-HOST-GROUP-1 any&lt;BR /&gt;access-list inside_access_in remark Allow SMTP external access to Mail Servers group&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group MAIL-GW-GROUP any eq smtp&lt;BR /&gt;access-list inside_access_in remark Deny Any other Users from sending mails via smtp&lt;BR /&gt;access-list inside_access_in extended deny tcp any any eq smtp&lt;BR /&gt;access-list inside_access_in extended deny ip object-group Botnet_Blacklist any&lt;BR /&gt;access-list inside_access_in extended deny ip any SPAM_MACHINE 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended deny ip any host SPAMIP&lt;BR /&gt;access-list inside_access_in extended permit ip object-group Socialsites_Allowed object-group Facebook&lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_SERVICE_8 any object-group Facebook&lt;BR /&gt;access-list inside_access_in remark Rule to block Internal users from accessing youtube&lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_SERVICE_9 any object-group YoutubeIPs&lt;BR /&gt;access-list inside_access_in remark Suspected Virus Ports&lt;BR /&gt;access-list inside_access_in extended deny tcp any any object-group DM_INLINE_TCP_17&lt;BR /&gt;access-list inside_access_in remark Ports Commonly used by Botnet and Malwares&lt;BR /&gt;access-list inside_access_in extended deny tcp any any object-group IRC&lt;BR /&gt;access-list inside_access_in remark Allow Access to External DNS to ALL&lt;BR /&gt;access-list inside_access_in extended permit object-group DNS-GROUP object-group DNS-SERVERS object-group External_DNS_Servers&lt;BR /&gt;access-list inside_access_in remark Allow Any to Any on Custom TCP/UDP services&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group DM_INLINE_TCP_12&lt;BR /&gt;access-list inside_access_in remark Allow Any to Any VPN Protocols group&lt;BR /&gt;access-list inside_access_in extended permit object-group VPN-GROUP any any&lt;BR /&gt;access-list inside_access_in extended permit ip any host pomttdbsvr&lt;BR /&gt;access-list inside_access_in remark Allow Access to DMZ from Inside&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group DM_INLINE_TCP_10&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_5 any 10.20.2.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit tcp any any eq pop3&lt;BR /&gt;access-list inside_access_in extended permit object-group Web-Access-Group any any&lt;BR /&gt;access-list inside_access_in remark DNS RATING SERVICE FOR BLUECOAT SG510 PROXY&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_11 object-group DM_INLINE_NETWORK_4 eq www inactive&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 202.165.193.134 object-group DM_INLINE_TCP_3&lt;BR /&gt;access-list inside_access_in remark Yahoo Messenger Test&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group YahooMessenger&lt;BR /&gt;access-list inside_access_in extended permit ip host AVIRUSMAN 192.168.254.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group smile&lt;BR /&gt;access-list inside_access_in extended permit udp any host smile.telinet.com.pg object-group smile-udp&lt;BR /&gt;access-list inside_access_in remark testing access for mobile phones behind wireless router&lt;BR /&gt;access-list inside_access_in extended permit ip host Wireless-Router any inactive&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group FTP-Service-Group inactive&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip host mailgate.irc.com any&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 object-group DM_INLINE_NETWORK_2 any object-group NTP&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group web-email-services&lt;BR /&gt;access-list inside_access_in remark Murray PC&lt;BR /&gt;access-list inside_access_in extended permit ip host 10.100.20.36 any&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group Itec-Citrix&lt;BR /&gt;access-list inside_access_in extended permit ip host EP200 any&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group TCP-SMTP&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 202.165.193.134 eq 3391&lt;BR /&gt;access-list inside_access_in extended permit ip object-group IT-Servers any&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_14 any inactive&lt;BR /&gt;access-list inside_access_in extended permit ip host 10.100.20.23 any&lt;BR /&gt;access-list inside_access_in extended permit tcp host NOC-NMS-CDMA host 202.165.193.134 object-group DM_INLINE_TCP_4&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_12 object-group Bluecoat-DNS-Rating eq www&lt;BR /&gt;access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_13 any&lt;BR /&gt;access-list inside_access_in extended permit udp host solarwinds-server any eq snmp&lt;BR /&gt;access-list inside_access_in extended permit tcp host kaikai any object-group test-u inactive&lt;BR /&gt;access-list inside_access_in extended permit tcp any host fw1.outside.irc.com object-group TCP-88&lt;BR /&gt;access-list inside_access_in extended permit udp host solarwinds-server any object-group DM_INLINE_UDP_1&lt;BR /&gt;access-list inside_access_in extended permit ip host IN-WEB-APP-SERVER any&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 host KMS-Server any object-group KMS&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group TeamVIewer-TCP&lt;BR /&gt;access-list inside_access_in extended permit icmp any any traceroute&lt;BR /&gt;access-list inside_access_in extended permit ip host KMS-Server any&lt;BR /&gt;access-list inside_access_in extended deny ip any host 87.255.51.229&lt;BR /&gt;access-list inside_access_in extended deny ip any host 82.165.47.44&lt;BR /&gt;access-list inside_access_in extended permit ip host InterConnect-BillingBox any&lt;BR /&gt;access-list inside_access_in extended permit icmp any host fw1.outside.irc.com&lt;BR /&gt;access-list inside_access_in extended permit icmp any any&lt;BR /&gt;access-list inside_access_in remark For ACCESS MPLS team&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 202.165.193.134 object-group RDP-MPLS-Huawei&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 host mailgate.irc.com any eq domain&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 66.147.244.58 object-group SMTP-26&lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_PROTOCOL_1 any any object-group Airfiji-SW&lt;BR /&gt;access-list inside_access_in extended permit tcp host chief.bula.irc.com any&lt;BR /&gt;access-list inside_access_in extended permit ip host Avabill86.181 any&lt;BR /&gt;access-list inside_access_in extended permit ip any object-group AVG&lt;BR /&gt;access-list inside_access_in extended permit ip host solarwinds-server any&lt;BR /&gt;access-list inside_access_in extended permit tcp host 172.16.87.219 any object-group TCP-4948&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_10 any host Avabill_Consultant_IP_Sri-Lanka&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 69.164.201.123 eq smtp inactive&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group GMAIL inactive&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group NOC1&lt;BR /&gt;access-list inside_access_in extended permit ip host solarwinds-server 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit tcp any host smile.telinet.com.fj object-group tcp-20080-30080&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any object-group SIP-5060-5062&lt;BR /&gt;access-list inside_access_in extended permit ip host LYNC-2013-SERVER any&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_7 object-group Lync_Servers any&lt;BR /&gt;access-list inside_access_in extended permit object-group VPN-GROUP host 10.100.20.94 any inactive&lt;BR /&gt;access-list inside_access_in remark Pocket Solutions -TEMP&lt;BR /&gt;access-list inside_access_in extended permit ip host 10.100.20.121 any&lt;BR /&gt;access-list inside_access_in extended permit tcp host John_sibunakau any object-group JohnTESTPort inactive&lt;BR /&gt;access-list inside_access_in extended permit ip host CiscoRadiusTestPC any&lt;BR /&gt;access-list inside_access_in extended permit ip any host HungaryServer inactive&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com eq ssh&lt;BR /&gt;access-list Outside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any host fw1.outside.irc.com object-group itec-support-tcp-udp&lt;BR /&gt;access-list Outside_access_in remark Allow All to NAT Address on SSL/SSH/SFTP(2222)&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.1.53.43 object-group DM_INLINE_TCP_9&lt;BR /&gt;access-list Outside_access_in remark Allow All to Outside On Fujitsu and 777-7778 ports&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group DM_INLINE_TCP_8&lt;BR /&gt;access-list Outside_access_in remark Allow all to Outside on Custom ports&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group DM_INLINE_TCP_7&lt;BR /&gt;access-list Outside_access_in remark Allow Inbound HTTP to &lt;A href="https://community.cisco.com/WWW.IRC.COM" target="_blank"&gt;WWW.IRC.COM&lt;/A&gt;&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com eq www&lt;BR /&gt;access-list Outside_access_in extended permit icmp any host fw1.outside.irc.com&lt;BR /&gt;access-list Outside_access_in extended permit object-group TCPUDP any host fw1.outside.irc.com object-group BrouardsGroup&lt;BR /&gt;access-list Outside_access_in remark Allow ALL to RealVNC ports&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group RealVNC-TCP5900&lt;BR /&gt;access-list Outside_access_in remark Allow ALL access to 202.1.53.43 on RealVNC ports&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.1.53.43 object-group RealVNC-TCP5900&lt;BR /&gt;access-list Outside_access_in remark Allow DNS queries from Internet to DNS server&lt;BR /&gt;access-list Outside_access_in extended permit object-group TCPUDP object-group ITEC-Group-Inbound host fw1.outside.irc.com object-group itec-sftp&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.1.53.43 object-group DM_INLINE_TCP_14&lt;BR /&gt;access-list Outside_access_in extended permit object-group DM_INLINE_SERVICE_1 host SkyTel host fw1.outside.irc.com&lt;BR /&gt;access-list Outside_access_in remark Telinet/Inomial temp access to test machine M.Orshansky&lt;BR /&gt;access-list Outside_access_in extended permit tcp host 203.92.29.151 host&amp;nbsp;fw1.outside.irc.com eq 3390&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.58.130.43 object-group RDP&lt;BR /&gt;access-list Outside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 object-group ITEC-Group-Inbound host fw1.outside.telikompng.com.pg object-group INTEC-Service&lt;BR /&gt;access-list Outside_access_in extended permit tcp host 220.233.157.98 host fw1.outside.irc.com eq ssh inactive&lt;BR /&gt;access-list Outside_access_in extended permit ip any host fw1.outside.telikompng.com.pg&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.telikompng.com.pg object-group CRM&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.telikompng.com.pg object-group HTTP-8010-CRM&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.telikompng.com.pg object-group HTTP-8005-CRM&lt;BR /&gt;access-list Outside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any object-group NTP&lt;BR /&gt;access-list Outside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any host fw1.outside.irc.com object-group DNS&lt;BR /&gt;access-list Outside_access_in remark Ultra VNC connection to 172.16.84.34@nadi Exchange&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group UVNC&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group UVNC-HTTP&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group POP3-SSL&lt;BR /&gt;access-list Outside_access_in extended permit object-group EMAIL-SMARTPHONES any host fw1.outside.irc.com&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.telikompng.com.pg object-group exchange-RPC&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.1.53.43 object-group exchange-RPC&lt;BR /&gt;access-list Outside_access_in extended permit icmp any host NAT-202.1.53.43&lt;BR /&gt;access-list Outside_access_in remark Access to Solarwinds Management box&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.1.53.43 object-group Solarwinds&lt;BR /&gt;access-list SSN-DMZ_access_in remark Permit DNS Quiries out of DMZ&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit object-group TCPUDP any any eq domain&lt;BR /&gt;access-list SSN-DMZ_access_in remark Allow SQL ports out of DMZ to Host 172.16.86.70&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit tcp any host HOST-172.16.86.70 object-group SQL-Group&lt;BR /&gt;access-list SSN-DMZ_access_in remark Allow Custom protocols out of DMZ to host 172.16.86.27&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit tcp any host HOST-172.16.86.27 object-group DM_INLINE_TCP_2&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit tcp host suva-vdc-int2.suva.irc.com host &lt;A href="https://community.cisco.com/WWW.IRC.COM=PRIV" target="_blank"&gt;WWW.IRC.COM=PRIV&lt;/A&gt; eq 3389&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit object-group Web-Access-Group host &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt; any&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit tcp any host &lt;A href="https://community.cisco.com/WWW.IRC.COM.-PRIV" target="_blank"&gt;WWW.IRC.COM.-PRIV&lt;/A&gt; object-group DMZ-WebAccess&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit ip host pomlynedsvr01_access any&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit ip host pomlynedsvr01_webcon any&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit ip host pomlynedsvr01_AV any&lt;BR /&gt;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.254.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_6 host 10.10.200.1&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any host &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host ns.irc.com any&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.200.200.0 255.255.255.0&lt;BR /&gt;access-list Outside_nat0_outbound extended permit ip 192.168.254.0 255.255.255.0 any&lt;BR /&gt;access-list Outside_nat0_outbound extended permit ip mcr_Management 255.255.255.0 any&lt;BR /&gt;access-list alcatel-my remark Allow Alcatel-my access to TIRC(1)&lt;BR /&gt;access-list alcatel-my standard permit 172.16.24.0 255.255.252.0&lt;BR /&gt;access-list alcatel-my remark Allow Alcatel-my access to TIRC(2)&lt;BR /&gt;access-list alcatel-my standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;&lt;BR /&gt;access-list 131 extended permit ip host MICHAEL any&lt;BR /&gt;&lt;BR /&gt;access-list management_access_in extended permit ip 10.10.200.0 255.255.255.0 mcr_Management 255.255.255.0&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 object-group DM_INLINE_NETWORK_5&lt;BR /&gt;access-list management_access_in extended permit object-group Web-Access-Group host 10.10.200.1 any&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 host 172.16.87.47&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 host IN-WSC&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 object-group DM_INLINE_NETWORK_8&lt;BR /&gt;access-list management_access_in extended permit tcp host 10.10.200.1 object-group DM_INLINE_NETWORK_3 eq 3389&lt;BR /&gt;access-list management_access_in remark To BlueCaot Appliances&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 object-group DM_INLINE_NETWORK_1&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 object-group DM_INLINE_NETWORK_7&lt;BR /&gt;access-list management_access_in extended permit tcp 10.10.200.0 255.255.255.0 object-group Management_Hosts object-group RDP&lt;BR /&gt;access-list management_access_in extended permit icmp host 10.10.200.1 any traceroute&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 host NOC-NMS-CDMA&lt;BR /&gt;access-list management_access_in extended permit object-group DM_INLINE_SERVICE_3 host 10.10.200.1 any&lt;BR /&gt;access-list management_access_in extended permit tcp host 10.10.200.1 any eq ftp&lt;BR /&gt;access-list management_access_in extended permit tcp host bula host 10.10.200.1 object-group RDP inactive&lt;BR /&gt;access-list management_access_in extended permit tcp host 10.100.20.23 host 10.10.200.1 object-group RDP&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 any&lt;BR /&gt;access-list management_access_in extended permit ip host solarwinds-server 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list management_access_in extended permit ip 10.10.200.0 255.255.255.0 host solarwinds-server&lt;BR /&gt;access-list management_access_in extended permit ip any any&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 host bula inactive&lt;BR /&gt;access-list management_access_in extended permit ip any host solarwinds-server&lt;BR /&gt;access-list management_access_in extended permit ip host solarwinds-server any&lt;BR /&gt;access-list management_access_in extended permit ip object-group PacketFence-Servers 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list management_access_in extended permit ip 10.10.200.0 255.255.255.0 object-group PacketFence-Servers&lt;BR /&gt;access-list management_access_in extended permit ip object-group 3750-Switches host solarwinds-server&lt;BR /&gt;access-list management_access_in extended permit ip 10.10.200.0 255.255.255.0 host 10.10.200.1&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list Outside_access_in_1 extended permit ip any any&lt;BR /&gt;&lt;BR /&gt;access-list management_access_in_1 extended permit ip mcr_Management 255.255.255.0 any&lt;BR /&gt;&lt;BR /&gt;access-list inside-networks remark internal tpng corporate subnetwork&lt;BR /&gt;access-list inside-networks standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list inside-networks remark dms10&lt;BR /&gt;access-list inside-networks standard permit host 10.10.0.0&lt;BR /&gt;&lt;BR /&gt;access-list 84-subnet remark 84 subnet&lt;BR /&gt;access-list 84-subnet standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list 84-subnet remark 4 subnet&lt;BR /&gt;access-list 84-subnet standard permit inside-network-extra-subnet 255.255.252.0&lt;BR /&gt;access-list split-tunnel remark 84 subnet&lt;BR /&gt;access-list split-tunnel standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list split-tunnel remark 4 subnet&lt;BR /&gt;access-list split-tunnel standard permit inside-network-extra-subnet 255.255.252.0&lt;BR /&gt;access-list split-tunnel remark Access to internal POP3 server&lt;BR /&gt;access-list split-tunnel standard permit host neptune.waigani.telikompng.com.pg&lt;BR /&gt;access-list split-tunnel remark Access to internal SMTP server&lt;BR /&gt;access-list split-tunnel standard permit host minerva.suva.irc.com&lt;BR /&gt;access-list split-tunnel remark Allow access to the 24 subnet&lt;BR /&gt;access-list split-tunnel standard permit 172.16.24.0 255.255.252.0&lt;BR /&gt;access-list split-tunnel standard permit Cisco-VLans 255.255.0.0&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;access-list inside_authentication extended permit tcp any object-group DM_INLINE_TCP_11 any object-group DM_INLINE_TCP_13 time-range WorkingHours inactive&lt;BR /&gt;&lt;BR /&gt;access-list itsupport standard permit NOC 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit 172.16.96.0 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit 10.20.2.0 255.255.255.0&lt;BR /&gt;access-list itsupport standard permit 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list itsupport standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit inside-network-extra-subnet 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit 10.2.1.0 255.255.255.0&lt;BR /&gt;access-list itsupport standard permit 172.16.88.0 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit Cisco-VLans 255.255.0.0&lt;BR /&gt;access-list itsupport remark Access to IT-LAN-UPGRADE Network&lt;BR /&gt;access-list itsupport standard permit IT-NETWORK-NEW 255.255.0.0&lt;BR /&gt;access-list itsupport remark KWU Exchange subnet&lt;BR /&gt;access-list itsupport standard permit 172.16.188.0 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit ATM-Network 255.255.0.0&lt;BR /&gt;&lt;BR /&gt;access-list global_mpc extended permit ip any any&lt;BR /&gt;&lt;BR /&gt;access-list management_nat0_outbound extended permit ip any inside-network-extra-subnet 255.255.252.0 inactive&lt;BR /&gt;access-list management_nat0_outbound extended permit ip mcr_Management 255.255.255.0 any&lt;BR /&gt;access-list management_nat0_outbound extended permit ip any object-group DM_INLINE_NETWORK_9&lt;BR /&gt;access-list management_nat0_outbound extended permit ip host 10.10.200.1 object-group Management_Hosts&lt;BR /&gt;access-list management_nat0_outbound extended permit ip any 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list management_nat0_outbound extended permit ip any MCR_POM 255.255.255.0&lt;BR /&gt;access-list management_nat0_outbound extended permit ip host 10.10.200.1 object-group DM_INLINE_NETWORK_10&lt;BR /&gt;access-list management_nat0_outbound extended permit ip any Cisco-VLans 255.255.0.0&lt;BR /&gt;access-list management_nat0_outbound extended permit ip 10.10.200.0 255.255.255.0 host solarwinds-server&lt;BR /&gt;access-list management_nat0_outbound extended permit ip 10.10.200.0 255.255.255.0 object-group DM_INLINE_NETWORK_15&lt;BR /&gt;access-list Capture extended permit ip any host 192.118.82.140&lt;BR /&gt;access-list Capture extended permit ip host 192.118.82.140 any&lt;BR /&gt;access-list Capture extended permit ip host 192.118.82.160 any&lt;BR /&gt;access-list Capture extended permit ip any host 192.118.82.160&lt;BR /&gt;a&lt;BR /&gt;access-list inside-network-access-only remark Allow Maggie Talig access to the 84 subnet only&lt;BR /&gt;access-list inside-network-access-only standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list inside-network-access-only remark Allow Maggie Talig access to the 4 subnet only&lt;BR /&gt;access-list inside-network-access-only standard permit inside-network-extra-subnet 255.255.252.0&lt;BR /&gt;&lt;BR /&gt;access-list SSN-DMZ_nat0_outbound extended permit ip host &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt; object-group Internal-Networks&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip host AVIRUSMAN 192.168.254.0 255.255.255.0&lt;BR /&gt;access-list NETFLOW extended permit tcp any any&lt;BR /&gt;access-list NETFLOW extended permit object-group DNS-GROUP any host fw1.outside.irc.com&lt;BR /&gt;access-list NETFLOW extended permit object-group DM_INLINE_SERVICE_6 any host fw1.outside.irc.com&lt;BR /&gt;access-list NETFLOW extended permit udp any host fw1.outside.irc.com&lt;BR /&gt;access-list NETFLOW extended permit tcp any host fw1.outside.irc.com eq smtp&lt;BR /&gt;access-list NETFLOW extended permit tcp any host fw1.outside.irc.com object-group DM_INLINE_TCP_5&lt;BR /&gt;access-list NETFLOW extended permit tcp any host fw1.outside.irc.com object-group TCP-8080&lt;BR /&gt;access-list NETFLOW extended permit object-group DM_INLINE_SERVICE_4 any host NAT-202.58.130.43&lt;BR /&gt;access-list NETFLOW remark Reverse Proxy Inbound Rules from Internet- Lync 2013 Project - Lync Simple URLs&lt;BR /&gt;access-list NETFLOW extended permit tcp any host 202.58.130.69 object-group DM_INLINE_TCP_6&lt;BR /&gt;access-list NETFLOW remark Lync Edge Access Inbound Rule - Restricting Inbound&lt;BR /&gt;access-list NETFLOW extended permit object-group pomlynedsvr01_access_Outside_to_DMZ any host 202.58.130.66&lt;BR /&gt;access-list NETFLOW remark Lync Edge Outside to Inside for AV Interface&lt;BR /&gt;access-list NETFLOW extended permit object-group pomlynedsvr01_webcon_outside_to_DMZ any host 202.58.130.67&lt;BR /&gt;access-list NETFLOW extended permit object-group pomlynedsvr01_AV_Outside_to_DMZ any host 202.58.130.68&lt;BR /&gt;access-list NETFLOW extended permit object-group DM_INLINE_SERVICE_11 any host NAT-fijiircdata&lt;BR /&gt;access-list NETFLOW extended deny ip host SPAMIP any&lt;BR /&gt;access-list NETFLOW extended deny ip SPAM_MACHINE 255.255.255.0 any&lt;BR /&gt;access-list NETFLOW extended deny ip host 220.233.157.99 any log debugging&lt;BR /&gt;&lt;BR /&gt;access-list Huawei-Access-Networks remark HUawei-Network-Elements&lt;BR /&gt;access-list Huawei-Access-Networks standard permit 192.168.200.0 255.255.255.0&lt;BR /&gt;access-list Huawei-Access-Networks remark Access to Ela Beach MPLS network&lt;BR /&gt;access-list Huawei-Access-Networks standard permit 10.100.70.0 255.255.255.0&lt;BR /&gt;access-list Huawei-Access-Networks remark Huawei Network elements&lt;BR /&gt;access-list Huawei-Access-Networks standard permit 192.168.210.0 255.255.255.0&lt;BR /&gt;access-list Huawei-Access-Networks remark Huawei network elements&lt;BR /&gt;access-list Huawei-Access-Networks standard permit 192.168.213.0 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;access-list management_nat0_outbound_1 extended permit ip host solarwinds-server 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list Alcatel-NMS-ACL remark Access allowed to Alcatel NMS devices in NOC&lt;BR /&gt;access-list Alcatel-NMS-ACL standard permit 10.2.1.0 255.255.255.0&lt;BR /&gt;access-list Business-Systems-Access remark Mail Server 1&lt;BR /&gt;access-list Business-Systems-Access standard permit host neptune.waigani.telikompng.com.pg&lt;BR /&gt;access-list Business-Systems-Access remark Mail Server 2&lt;BR /&gt;access-list Business-Systems-Access standard permit host minerva.waigani.telikompng.com.pg&lt;BR /&gt;access-list Business-Systems-Access remark SAP PROD&lt;BR /&gt;access-list Business-Systems-Access standard permit host SAP-SAPPROD&lt;BR /&gt;access-list Business-Systems-Access remark Avabill Application Server&lt;BR /&gt;access-list Business-Systems-Access standard permit host Avabill86.177&lt;BR /&gt;access-list Business-Systems-Access remark Backup Avabill Application Server&lt;BR /&gt;access-list Business-Systems-Access standard permit host Avabill84.170&lt;BR /&gt;access-list Business-Systems-Access remark HRSelfcare&lt;BR /&gt;access-list Business-Systems-Access standard permit host HOST-172.16.86.248&lt;BR /&gt;access-list Business-Systems-Access remark Intranet Server&lt;BR /&gt;access-list Business-Systems-Access standard permit host 172.16.85.32&lt;BR /&gt;access-list IT-Systems-Support remark Access to inside network&lt;BR /&gt;access-list IT-Systems-Support standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list IT-Systems-Support remark Access to IN netwwork&lt;BR /&gt;access-list IT-Systems-Support standard permit 172.16.88.0 255.255.252.0&lt;BR /&gt;access-list IT-Systems-Support standard permit Cisco-VLans 255.255.0.0&lt;BR /&gt;access-list Systems-XS remark Access to 84 subnet&lt;BR /&gt;access-list Systems-XS standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list Systems-XS remark Access to .4 subnet&lt;BR /&gt;access-list Systems-XS standard permit inside-network-extra-subnet 255.255.252.0&lt;BR /&gt;access-list Systems-XS remark Access to 10.100.x.x/24&lt;BR /&gt;access-list Systems-XS standard permit Cisco-VLans 255.255.0.0&lt;BR /&gt;access-list Huawei-NOC standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list Huawei-NOC standard permit Cisco-VLans 255.255.0.0&lt;BR /&gt;access-list Huawei-NOC standard permit HASUT 255.255.255.0&lt;BR /&gt;access-list Huawei-NOC standard permit IT-NETWORK-NEW 255.255.0.0&lt;BR /&gt;&lt;BR /&gt;access-list efdata remark Allow efdata access to above device as per request by chris mkao&lt;BR /&gt;access-list efdata standard permit 172.16.92.0 255.255.252.0&lt;BR /&gt;&lt;BR /&gt;access-list test standard permit 172.16.92.0 255.255.252.0&lt;BR /&gt;access-list Ghu_ES_LAN remark Allow efdata access to fij ES LAN&lt;BR /&gt;access-list Ghu_ES_LAN extended permit ip any 172.16.92.0 255.255.252.0&lt;BR /&gt;access-list GuestInternet_access_in extended permit ip any any&lt;BR /&gt;global (inside) 1 interface&lt;BR /&gt;global (SSN-DMZ) 1 interface&lt;BR /&gt;global (Outside) 1 interface&lt;BR /&gt;global (management) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound_1 outside&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (SSN-DMZ) 0 access-list SSN-DMZ_nat0_outbound&lt;BR /&gt;nat (SSN-DMZ) 1 &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt; 255.255.255.255&lt;BR /&gt;nat (Outside) 0 access-list Outside_nat0_outbound&lt;BR /&gt;nat (GuestInternet) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (management) 0 access-list management_nat0_outbound&lt;BR /&gt;nat (management) 0 access-list management_nat0_outbound_1 outside&lt;BR /&gt;nat (management) 1 10.10.200.1 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10103 mailgate.irc.com 10103 netmask 255.255.255.255&lt;BR /&gt;static (SSN-DMZ,Outside) tcp interface www &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt; www netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface smtp mailgate.irc.com smtp netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface telnet HOST-172.16.84.144 telnet netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface pcanywhere-data HOST-192.168.1.14 pcanywhere-data netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) udp interface pcanywhere-status HOST-192.168.1.14 pcanywhere-status netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface ssh InterConnect-BillingBox ssh netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) udp interface ntp confusious.suva.irc.com ntp netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10002 HOST-172.16.200.121 10002 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10003 HOST-172.16.200.122 10003 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10004 HOST-172.16.41.26 10004 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10005 HOST-172.16.41.27 10005 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface https Avabill86.181 https netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 7778 Avabill86.181 7778 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 8080 Avabill86.181 8080 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 7777 Avabill86.181 7777 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.45 https Avabill86.177 https netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 2222 daywalker.suva.irc.com 2222 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 ftp waigani-pdc-int2.suva.irc.com ftp netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 www neptune.suva.irc.com www netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5900 Primary1352CM 5900 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 5900 Backup1352CM 5900 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 https neptune.suva.irc.com https netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 24 HOST-172.16.86.87 24 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) udp interface domain ns.irc.com domain netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface pop3 neptune.suva.irc.com pop3 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 7780 Apache-WebServer 7780 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 8000 CRM-SERVER2 8000 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 8010 CRM-SERVER4 8010 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 8005 CRM-SERVER3 8005 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 123 confusious.suva.irc.com 123 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface imap4 neptune.suva.irc.com imap4 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface domain ns.irc.com domain netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface ftp telitgate.irc.com ftp netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5901 uvnc-server 5901 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5801 uvnc-server 5801 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5902 172.16.84.200 5902 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5802 172.16.84.200 5802 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 995 neptune.suva.irc.com 995 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 993 neptune.suva.irc.com 993 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 6001 neptune.suva.irc.com 6001 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 6002 neptune.suva.irc.com 6002 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 6004 neptune.suva.irc.com 6004 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 6001 minerva.suva.irc.com 6001 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 6002 minerva.suva.irc.com 6002 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 6004 minerva.suva.irc.com 6004 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 8720 solarwinds-server 8720 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 9000 solarwinds-server 9000 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 2055 solarwinds-server 2055 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 88 A-10.100.20.250 88 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10000 ns.irc.com 10000 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) udp Ext-R2-Outside-Interface 2055 solarwinds-server 2055 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) udp Ext-R2-Outside-Interface snmp solarwinds-server snmp netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 135 neptune.suva.irc.com 135 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 3389 BT-DesktopPC 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.65 www IN-WSC www netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.65 https IN-WSC https netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 ssh Avabill86.176 ssh netmask 255.255.255.255&lt;BR /&gt;static (Outside,inside) tcp 10.100.20.36 5432 smile.telinet.com.pg 5432 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 222 chief.suva.irc.com ssh netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5061 LYNC-2013-SERVER 5061 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5432 10.100.20.36 5432 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 182 dadbsvr www netmask 255.255.255.255&lt;BR /&gt;static (SSN-DMZ,Outside) 202.58.130.69 pomlynrprx01 netmask 255.255.255.255&lt;BR /&gt;static (SSN-DMZ,Outside) 202.58.130.66 pomlynedsvr01_access netmask 255.255.255.255&lt;BR /&gt;static (SSN-DMZ,Outside) 202.58.130.67 pomlynedsvr01_webcon netmask 255.255.255.255&lt;BR /&gt;static (SSN-DMZ,Outside) 202.58.130.68 pomlynedsvr01_AV netmask 255.255.255.255&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group SSN-DMZ_access_in in interface SSN-DMZ&lt;BR /&gt;access-group Outside_access_in_1 in interface Outside control-plane&lt;BR /&gt;access-group NETFLOW in interface Outside&lt;BR /&gt;access-group GuestInternet_access_in in interface GuestInternet&lt;BR /&gt;access-group management_access_in_1 in interface management control-plane&lt;BR /&gt;access-group management_access_in in interface management&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 Ext-R1-Inside-Interface 1&lt;BR /&gt;route inside 10.2.1.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.8.0.0 255.255.255.0 VPNGATE 1&lt;BR /&gt;route inside 10.9.254.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.1.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.2.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.3.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.4.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.5.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.10.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.15.100.0 255.255.255.0 fw1.outside.irc.com 1&lt;BR /&gt;route inside Cisco-VLans 255.255.0.0 Cisco7200 1&lt;BR /&gt;route inside VLan20-2F 255.255.255.0 Cisco7200 1&lt;BR /&gt;route inside 10.100.67.0 255.255.255.0 IPVPN-Router 1&lt;BR /&gt;route inside 10.100.74.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.75.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.76.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside LAE 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.91.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.110.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.111.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.114.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.200.200.0 255.255.255.0 Cisco7200 1&lt;BR /&gt;route inside A-10.250.0.0 255.255.0.0 Cisco7200 1&lt;BR /&gt;route inside 10.254.2.0 255.255.255.252 IPVPN-Router 1&lt;BR /&gt;route inside 11.11.3.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 11.11.4.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 11.11.8.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 11.11.9.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 20.200.200.0 255.255.255.0 172.16.86.17 1&lt;BR /&gt;route inside inside-network-extra-subnet 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.8.0 255.255.252.0 Cisco7200 1&lt;BR /&gt;route inside 172.16.12.0 255.255.252.0 172.16.86.197 1&lt;BR /&gt;route inside 172.16.24.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside NOC 255.255.252.0 172.16.87.187 1&lt;BR /&gt;route inside 172.16.48.0 255.255.252.0 172.16.84.41 1&lt;BR /&gt;route inside 172.16.52.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.56.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.60.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.64.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.68.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.72.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.76.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.80.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.84.185 255.255.255.255 172.16.86.217 1&lt;BR /&gt;route inside CRM-SERVER1 255.255.255.255 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.88.0 255.255.252.0 Cisco7200 1&lt;BR /&gt;route inside 172.16.92.0 255.255.252.0 Cisco7200 1&lt;BR /&gt;route inside 172.16.96.0 255.255.252.0 172.16.87.172 1&lt;BR /&gt;route inside 172.16.104.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.108.0 255.255.252.0 IPVPN-Router 1&lt;BR /&gt;route inside 172.16.112.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.120.0 255.255.252.0 TFIJIG-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.124.0 255.255.252.0 IPVPN-Router 1&lt;BR /&gt;route inside 172.16.128.0 255.255.252.0 172.16.86.185 1&lt;BR /&gt;route inside 172.16.132.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.136.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.140.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.144.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.148.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.152.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.156.0 255.255.252.0 IPVPN-Router 1&lt;BR /&gt;route inside 172.16.160.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.164.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.168.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.172.0 255.255.252.0 172.16.87.172 1&lt;BR /&gt;route inside 172.16.180.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.184.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.188.0 255.255.252.0 172.16.86.85 1&lt;BR /&gt;route inside 172.16.188.0 255.255.252.0 Cisco7200 1&lt;BR /&gt;route inside 172.16.192.0 255.255.252.0 172.16.86.194 1&lt;BR /&gt;route inside 172.16.200.0 255.255.252.0 172.16.87.11 1&lt;BR /&gt;route inside 172.16.204.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.208.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.212.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.220.0 255.255.252.0 IPVPN-Router 1&lt;BR /&gt;route inside 172.16.224.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.236.0 255.255.252.0 172.16.87.254 1&lt;BR /&gt;route inside 172.16.240.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.248.0 255.255.252.0 IPVPN-Router 1&lt;BR /&gt;route inside 172.17.84.0 255.255.255.224 IPVPN-Router 1&lt;BR /&gt;route inside 172.18.252.0 255.255.252.0 172.16.84.15 1&lt;BR /&gt;route inside 172.20.0.0 255.255.252.0 172.16.87.11 1&lt;BR /&gt;route management 172.20.1.32 255.255.255.240 10.10.200.18 1&lt;BR /&gt;route inside 192.167.5.0 255.255.255.0 172.16.86.42 1&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 HOST-172.16.84.144 1&lt;BR /&gt;route inside 192.168.1.96 255.255.255.224 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.1.128 255.255.255.224 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.2.0 255.255.255.0 172.16.87.192 1&lt;BR /&gt;route inside 192.168.5.0 255.255.255.0 HOST-172.16.84.144 1&lt;BR /&gt;route inside 192.168.11.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.150.0 255.255.255.0 IPVPN-Router 1&lt;BR /&gt;route inside 192.168.200.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.201.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.202.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.210.0 255.255.255.0 Cisco7200 1&lt;BR /&gt;route inside 192.168.213.0 255.255.255.0 Cisco7200 1&lt;BR /&gt;route inside 192.168.254.0 255.255.255.0 fw1.outside.irc.com 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map flow_export_class&lt;BR /&gt;&amp;nbsp;match access-list global_mpc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;&amp;nbsp; inspect ipsec-pass-thru&lt;BR /&gt;&amp;nbsp; inspect mgcp&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect snmp&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ftp strict&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp;class flow_export_class&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination solarwinds-server&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 172.16.86.16&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:24270eebd6c941fb7b302b034e32bba1&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:21:39 GMT</pubDate>
    <dc:creator>Pius Nolih</dc:creator>
    <dc:date>2019-03-12T04:21:39Z</dc:date>
    <item>
      <title>Open firewall Ports despite DENY- ALL access rule</title>
      <link>https://community.cisco.com/t5/network-security/open-firewall-ports-despite-deny-all-access-rule/m-p/2527165#M237306</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See below my firewall rules.&lt;/P&gt;&lt;P&gt;Despite the deny all, runnning nmap from outside still reveals open ports.&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;name 202.1.53.41 fw1.outside.irc.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address fw1.inside.irc.com 255.255.252.0 standby 172.16.86.219&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif SSN-DMZ&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.20.2.1 255.255.255.0 standby 10.20.2.2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif Outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address fw1.outside.irc.com 255.255.255.248 standby NAT-202.1.53.45&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;description Internet Access for Wireless clients on the guest network&lt;BR /&gt;&amp;nbsp;nameif GuestInternet&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.154.2 255.255.254.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 10&lt;BR /&gt;&amp;nbsp;ip address 10.10.200.14 255.255.255.0 standby 10.10.200.15&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 any host &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt;&lt;BR /&gt;access-list inside_access_in remark Deny POP3, SSH, TELNET to Deny-Host-Group 172.16.86.246/249&lt;BR /&gt;access-list inside_access_in extended deny object-group DENY-HOST-GROUP object-group DENY-HOST-GROUP-1 any&lt;BR /&gt;access-list inside_access_in remark Allow SMTP external access to Mail Servers group&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group MAIL-GW-GROUP any eq smtp&lt;BR /&gt;access-list inside_access_in remark Deny Any other Users from sending mails via smtp&lt;BR /&gt;access-list inside_access_in extended deny tcp any any eq smtp&lt;BR /&gt;access-list inside_access_in extended deny ip object-group Botnet_Blacklist any&lt;BR /&gt;access-list inside_access_in extended deny ip any SPAM_MACHINE 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended deny ip any host SPAMIP&lt;BR /&gt;access-list inside_access_in extended permit ip object-group Socialsites_Allowed object-group Facebook&lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_SERVICE_8 any object-group Facebook&lt;BR /&gt;access-list inside_access_in remark Rule to block Internal users from accessing youtube&lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_SERVICE_9 any object-group YoutubeIPs&lt;BR /&gt;access-list inside_access_in remark Suspected Virus Ports&lt;BR /&gt;access-list inside_access_in extended deny tcp any any object-group DM_INLINE_TCP_17&lt;BR /&gt;access-list inside_access_in remark Ports Commonly used by Botnet and Malwares&lt;BR /&gt;access-list inside_access_in extended deny tcp any any object-group IRC&lt;BR /&gt;access-list inside_access_in remark Allow Access to External DNS to ALL&lt;BR /&gt;access-list inside_access_in extended permit object-group DNS-GROUP object-group DNS-SERVERS object-group External_DNS_Servers&lt;BR /&gt;access-list inside_access_in remark Allow Any to Any on Custom TCP/UDP services&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group DM_INLINE_TCP_12&lt;BR /&gt;access-list inside_access_in remark Allow Any to Any VPN Protocols group&lt;BR /&gt;access-list inside_access_in extended permit object-group VPN-GROUP any any&lt;BR /&gt;access-list inside_access_in extended permit ip any host pomttdbsvr&lt;BR /&gt;access-list inside_access_in remark Allow Access to DMZ from Inside&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group DM_INLINE_TCP_10&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_5 any 10.20.2.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit tcp any any eq pop3&lt;BR /&gt;access-list inside_access_in extended permit object-group Web-Access-Group any any&lt;BR /&gt;access-list inside_access_in remark DNS RATING SERVICE FOR BLUECOAT SG510 PROXY&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_11 object-group DM_INLINE_NETWORK_4 eq www inactive&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 202.165.193.134 object-group DM_INLINE_TCP_3&lt;BR /&gt;access-list inside_access_in remark Yahoo Messenger Test&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group YahooMessenger&lt;BR /&gt;access-list inside_access_in extended permit ip host AVIRUSMAN 192.168.254.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group smile&lt;BR /&gt;access-list inside_access_in extended permit udp any host smile.telinet.com.pg object-group smile-udp&lt;BR /&gt;access-list inside_access_in remark testing access for mobile phones behind wireless router&lt;BR /&gt;access-list inside_access_in extended permit ip host Wireless-Router any inactive&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group FTP-Service-Group inactive&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip host mailgate.irc.com any&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 object-group DM_INLINE_NETWORK_2 any object-group NTP&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group web-email-services&lt;BR /&gt;access-list inside_access_in remark Murray PC&lt;BR /&gt;access-list inside_access_in extended permit ip host 10.100.20.36 any&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group Itec-Citrix&lt;BR /&gt;access-list inside_access_in extended permit ip host EP200 any&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group TCP-SMTP&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 202.165.193.134 eq 3391&lt;BR /&gt;access-list inside_access_in extended permit ip object-group IT-Servers any&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_14 any inactive&lt;BR /&gt;access-list inside_access_in extended permit ip host 10.100.20.23 any&lt;BR /&gt;access-list inside_access_in extended permit tcp host NOC-NMS-CDMA host 202.165.193.134 object-group DM_INLINE_TCP_4&lt;BR /&gt;access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_12 object-group Bluecoat-DNS-Rating eq www&lt;BR /&gt;access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_13 any&lt;BR /&gt;access-list inside_access_in extended permit udp host solarwinds-server any eq snmp&lt;BR /&gt;access-list inside_access_in extended permit tcp host kaikai any object-group test-u inactive&lt;BR /&gt;access-list inside_access_in extended permit tcp any host fw1.outside.irc.com object-group TCP-88&lt;BR /&gt;access-list inside_access_in extended permit udp host solarwinds-server any object-group DM_INLINE_UDP_1&lt;BR /&gt;access-list inside_access_in extended permit ip host IN-WEB-APP-SERVER any&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 host KMS-Server any object-group KMS&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group TeamVIewer-TCP&lt;BR /&gt;access-list inside_access_in extended permit icmp any any traceroute&lt;BR /&gt;access-list inside_access_in extended permit ip host KMS-Server any&lt;BR /&gt;access-list inside_access_in extended deny ip any host 87.255.51.229&lt;BR /&gt;access-list inside_access_in extended deny ip any host 82.165.47.44&lt;BR /&gt;access-list inside_access_in extended permit ip host InterConnect-BillingBox any&lt;BR /&gt;access-list inside_access_in extended permit icmp any host fw1.outside.irc.com&lt;BR /&gt;access-list inside_access_in extended permit icmp any any&lt;BR /&gt;access-list inside_access_in remark For ACCESS MPLS team&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 202.165.193.134 object-group RDP-MPLS-Huawei&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 host mailgate.irc.com any eq domain&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 66.147.244.58 object-group SMTP-26&lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_PROTOCOL_1 any any object-group Airfiji-SW&lt;BR /&gt;access-list inside_access_in extended permit tcp host chief.bula.irc.com any&lt;BR /&gt;access-list inside_access_in extended permit ip host Avabill86.181 any&lt;BR /&gt;access-list inside_access_in extended permit ip any object-group AVG&lt;BR /&gt;access-list inside_access_in extended permit ip host solarwinds-server any&lt;BR /&gt;access-list inside_access_in extended permit tcp host 172.16.87.219 any object-group TCP-4948&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_10 any host Avabill_Consultant_IP_Sri-Lanka&lt;BR /&gt;access-list inside_access_in extended permit tcp any host 69.164.201.123 eq smtp inactive&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group GMAIL inactive&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group NOC1&lt;BR /&gt;access-list inside_access_in extended permit ip host solarwinds-server 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit tcp any host smile.telinet.com.fj object-group tcp-20080-30080&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any object-group SIP-5060-5062&lt;BR /&gt;access-list inside_access_in extended permit ip host LYNC-2013-SERVER any&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_7 object-group Lync_Servers any&lt;BR /&gt;access-list inside_access_in extended permit object-group VPN-GROUP host 10.100.20.94 any inactive&lt;BR /&gt;access-list inside_access_in remark Pocket Solutions -TEMP&lt;BR /&gt;access-list inside_access_in extended permit ip host 10.100.20.121 any&lt;BR /&gt;access-list inside_access_in extended permit tcp host John_sibunakau any object-group JohnTESTPort inactive&lt;BR /&gt;access-list inside_access_in extended permit ip host CiscoRadiusTestPC any&lt;BR /&gt;access-list inside_access_in extended permit ip any host HungaryServer inactive&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com eq ssh&lt;BR /&gt;access-list Outside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any host fw1.outside.irc.com object-group itec-support-tcp-udp&lt;BR /&gt;access-list Outside_access_in remark Allow All to NAT Address on SSL/SSH/SFTP(2222)&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.1.53.43 object-group DM_INLINE_TCP_9&lt;BR /&gt;access-list Outside_access_in remark Allow All to Outside On Fujitsu and 777-7778 ports&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group DM_INLINE_TCP_8&lt;BR /&gt;access-list Outside_access_in remark Allow all to Outside on Custom ports&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group DM_INLINE_TCP_7&lt;BR /&gt;access-list Outside_access_in remark Allow Inbound HTTP to &lt;A href="https://community.cisco.com/WWW.IRC.COM" target="_blank"&gt;WWW.IRC.COM&lt;/A&gt;&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com eq www&lt;BR /&gt;access-list Outside_access_in extended permit icmp any host fw1.outside.irc.com&lt;BR /&gt;access-list Outside_access_in extended permit object-group TCPUDP any host fw1.outside.irc.com object-group BrouardsGroup&lt;BR /&gt;access-list Outside_access_in remark Allow ALL to RealVNC ports&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group RealVNC-TCP5900&lt;BR /&gt;access-list Outside_access_in remark Allow ALL access to 202.1.53.43 on RealVNC ports&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.1.53.43 object-group RealVNC-TCP5900&lt;BR /&gt;access-list Outside_access_in remark Allow DNS queries from Internet to DNS server&lt;BR /&gt;access-list Outside_access_in extended permit object-group TCPUDP object-group ITEC-Group-Inbound host fw1.outside.irc.com object-group itec-sftp&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.1.53.43 object-group DM_INLINE_TCP_14&lt;BR /&gt;access-list Outside_access_in extended permit object-group DM_INLINE_SERVICE_1 host SkyTel host fw1.outside.irc.com&lt;BR /&gt;access-list Outside_access_in remark Telinet/Inomial temp access to test machine M.Orshansky&lt;BR /&gt;access-list Outside_access_in extended permit tcp host 203.92.29.151 host&amp;nbsp;fw1.outside.irc.com eq 3390&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.58.130.43 object-group RDP&lt;BR /&gt;access-list Outside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 object-group ITEC-Group-Inbound host fw1.outside.telikompng.com.pg object-group INTEC-Service&lt;BR /&gt;access-list Outside_access_in extended permit tcp host 220.233.157.98 host fw1.outside.irc.com eq ssh inactive&lt;BR /&gt;access-list Outside_access_in extended permit ip any host fw1.outside.telikompng.com.pg&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.telikompng.com.pg object-group CRM&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.telikompng.com.pg object-group HTTP-8010-CRM&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.telikompng.com.pg object-group HTTP-8005-CRM&lt;BR /&gt;access-list Outside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any object-group NTP&lt;BR /&gt;access-list Outside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any host fw1.outside.irc.com object-group DNS&lt;BR /&gt;access-list Outside_access_in remark Ultra VNC connection to 172.16.84.34@nadi Exchange&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group UVNC&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group UVNC-HTTP&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.irc.com object-group POP3-SSL&lt;BR /&gt;access-list Outside_access_in extended permit object-group EMAIL-SMARTPHONES any host fw1.outside.irc.com&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host fw1.outside.telikompng.com.pg object-group exchange-RPC&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.1.53.43 object-group exchange-RPC&lt;BR /&gt;access-list Outside_access_in extended permit icmp any host NAT-202.1.53.43&lt;BR /&gt;access-list Outside_access_in remark Access to Solarwinds Management box&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host NAT-202.1.53.43 object-group Solarwinds&lt;BR /&gt;access-list SSN-DMZ_access_in remark Permit DNS Quiries out of DMZ&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit object-group TCPUDP any any eq domain&lt;BR /&gt;access-list SSN-DMZ_access_in remark Allow SQL ports out of DMZ to Host 172.16.86.70&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit tcp any host HOST-172.16.86.70 object-group SQL-Group&lt;BR /&gt;access-list SSN-DMZ_access_in remark Allow Custom protocols out of DMZ to host 172.16.86.27&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit tcp any host HOST-172.16.86.27 object-group DM_INLINE_TCP_2&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit tcp host suva-vdc-int2.suva.irc.com host &lt;A href="https://community.cisco.com/WWW.IRC.COM=PRIV" target="_blank"&gt;WWW.IRC.COM=PRIV&lt;/A&gt; eq 3389&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit object-group Web-Access-Group host &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt; any&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit tcp any host &lt;A href="https://community.cisco.com/WWW.IRC.COM.-PRIV" target="_blank"&gt;WWW.IRC.COM.-PRIV&lt;/A&gt; object-group DMZ-WebAccess&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit ip host pomlynedsvr01_access any&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit ip host pomlynedsvr01_webcon any&lt;BR /&gt;access-list SSN-DMZ_access_in extended permit ip host pomlynedsvr01_AV any&lt;BR /&gt;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.254.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_6 host 10.10.200.1&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any host &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host ns.irc.com any&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.200.200.0 255.255.255.0&lt;BR /&gt;access-list Outside_nat0_outbound extended permit ip 192.168.254.0 255.255.255.0 any&lt;BR /&gt;access-list Outside_nat0_outbound extended permit ip mcr_Management 255.255.255.0 any&lt;BR /&gt;access-list alcatel-my remark Allow Alcatel-my access to TIRC(1)&lt;BR /&gt;access-list alcatel-my standard permit 172.16.24.0 255.255.252.0&lt;BR /&gt;access-list alcatel-my remark Allow Alcatel-my access to TIRC(2)&lt;BR /&gt;access-list alcatel-my standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;&lt;BR /&gt;access-list 131 extended permit ip host MICHAEL any&lt;BR /&gt;&lt;BR /&gt;access-list management_access_in extended permit ip 10.10.200.0 255.255.255.0 mcr_Management 255.255.255.0&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 object-group DM_INLINE_NETWORK_5&lt;BR /&gt;access-list management_access_in extended permit object-group Web-Access-Group host 10.10.200.1 any&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 host 172.16.87.47&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 host IN-WSC&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 object-group DM_INLINE_NETWORK_8&lt;BR /&gt;access-list management_access_in extended permit tcp host 10.10.200.1 object-group DM_INLINE_NETWORK_3 eq 3389&lt;BR /&gt;access-list management_access_in remark To BlueCaot Appliances&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 object-group DM_INLINE_NETWORK_1&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 object-group DM_INLINE_NETWORK_7&lt;BR /&gt;access-list management_access_in extended permit tcp 10.10.200.0 255.255.255.0 object-group Management_Hosts object-group RDP&lt;BR /&gt;access-list management_access_in extended permit icmp host 10.10.200.1 any traceroute&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 host NOC-NMS-CDMA&lt;BR /&gt;access-list management_access_in extended permit object-group DM_INLINE_SERVICE_3 host 10.10.200.1 any&lt;BR /&gt;access-list management_access_in extended permit tcp host 10.10.200.1 any eq ftp&lt;BR /&gt;access-list management_access_in extended permit tcp host bula host 10.10.200.1 object-group RDP inactive&lt;BR /&gt;access-list management_access_in extended permit tcp host 10.100.20.23 host 10.10.200.1 object-group RDP&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 any&lt;BR /&gt;access-list management_access_in extended permit ip host solarwinds-server 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list management_access_in extended permit ip 10.10.200.0 255.255.255.0 host solarwinds-server&lt;BR /&gt;access-list management_access_in extended permit ip any any&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 host bula inactive&lt;BR /&gt;access-list management_access_in extended permit ip any host solarwinds-server&lt;BR /&gt;access-list management_access_in extended permit ip host solarwinds-server any&lt;BR /&gt;access-list management_access_in extended permit ip object-group PacketFence-Servers 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list management_access_in extended permit ip 10.10.200.0 255.255.255.0 object-group PacketFence-Servers&lt;BR /&gt;access-list management_access_in extended permit ip object-group 3750-Switches host solarwinds-server&lt;BR /&gt;access-list management_access_in extended permit ip 10.10.200.0 255.255.255.0 host 10.10.200.1&lt;BR /&gt;access-list management_access_in extended permit ip host 10.10.200.1 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list Outside_access_in_1 extended permit ip any any&lt;BR /&gt;&lt;BR /&gt;access-list management_access_in_1 extended permit ip mcr_Management 255.255.255.0 any&lt;BR /&gt;&lt;BR /&gt;access-list inside-networks remark internal tpng corporate subnetwork&lt;BR /&gt;access-list inside-networks standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list inside-networks remark dms10&lt;BR /&gt;access-list inside-networks standard permit host 10.10.0.0&lt;BR /&gt;&lt;BR /&gt;access-list 84-subnet remark 84 subnet&lt;BR /&gt;access-list 84-subnet standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list 84-subnet remark 4 subnet&lt;BR /&gt;access-list 84-subnet standard permit inside-network-extra-subnet 255.255.252.0&lt;BR /&gt;access-list split-tunnel remark 84 subnet&lt;BR /&gt;access-list split-tunnel standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list split-tunnel remark 4 subnet&lt;BR /&gt;access-list split-tunnel standard permit inside-network-extra-subnet 255.255.252.0&lt;BR /&gt;access-list split-tunnel remark Access to internal POP3 server&lt;BR /&gt;access-list split-tunnel standard permit host neptune.waigani.telikompng.com.pg&lt;BR /&gt;access-list split-tunnel remark Access to internal SMTP server&lt;BR /&gt;access-list split-tunnel standard permit host minerva.suva.irc.com&lt;BR /&gt;access-list split-tunnel remark Allow access to the 24 subnet&lt;BR /&gt;access-list split-tunnel standard permit 172.16.24.0 255.255.252.0&lt;BR /&gt;access-list split-tunnel standard permit Cisco-VLans 255.255.0.0&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;access-list inside_authentication extended permit tcp any object-group DM_INLINE_TCP_11 any object-group DM_INLINE_TCP_13 time-range WorkingHours inactive&lt;BR /&gt;&lt;BR /&gt;access-list itsupport standard permit NOC 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit 172.16.96.0 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit 10.20.2.0 255.255.255.0&lt;BR /&gt;access-list itsupport standard permit 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list itsupport standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit inside-network-extra-subnet 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit 10.2.1.0 255.255.255.0&lt;BR /&gt;access-list itsupport standard permit 172.16.88.0 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit Cisco-VLans 255.255.0.0&lt;BR /&gt;access-list itsupport remark Access to IT-LAN-UPGRADE Network&lt;BR /&gt;access-list itsupport standard permit IT-NETWORK-NEW 255.255.0.0&lt;BR /&gt;access-list itsupport remark KWU Exchange subnet&lt;BR /&gt;access-list itsupport standard permit 172.16.188.0 255.255.252.0&lt;BR /&gt;access-list itsupport standard permit ATM-Network 255.255.0.0&lt;BR /&gt;&lt;BR /&gt;access-list global_mpc extended permit ip any any&lt;BR /&gt;&lt;BR /&gt;access-list management_nat0_outbound extended permit ip any inside-network-extra-subnet 255.255.252.0 inactive&lt;BR /&gt;access-list management_nat0_outbound extended permit ip mcr_Management 255.255.255.0 any&lt;BR /&gt;access-list management_nat0_outbound extended permit ip any object-group DM_INLINE_NETWORK_9&lt;BR /&gt;access-list management_nat0_outbound extended permit ip host 10.10.200.1 object-group Management_Hosts&lt;BR /&gt;access-list management_nat0_outbound extended permit ip any 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list management_nat0_outbound extended permit ip any MCR_POM 255.255.255.0&lt;BR /&gt;access-list management_nat0_outbound extended permit ip host 10.10.200.1 object-group DM_INLINE_NETWORK_10&lt;BR /&gt;access-list management_nat0_outbound extended permit ip any Cisco-VLans 255.255.0.0&lt;BR /&gt;access-list management_nat0_outbound extended permit ip 10.10.200.0 255.255.255.0 host solarwinds-server&lt;BR /&gt;access-list management_nat0_outbound extended permit ip 10.10.200.0 255.255.255.0 object-group DM_INLINE_NETWORK_15&lt;BR /&gt;access-list Capture extended permit ip any host 192.118.82.140&lt;BR /&gt;access-list Capture extended permit ip host 192.118.82.140 any&lt;BR /&gt;access-list Capture extended permit ip host 192.118.82.160 any&lt;BR /&gt;access-list Capture extended permit ip any host 192.118.82.160&lt;BR /&gt;a&lt;BR /&gt;access-list inside-network-access-only remark Allow Maggie Talig access to the 84 subnet only&lt;BR /&gt;access-list inside-network-access-only standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list inside-network-access-only remark Allow Maggie Talig access to the 4 subnet only&lt;BR /&gt;access-list inside-network-access-only standard permit inside-network-extra-subnet 255.255.252.0&lt;BR /&gt;&lt;BR /&gt;access-list SSN-DMZ_nat0_outbound extended permit ip host &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt; object-group Internal-Networks&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip host AVIRUSMAN 192.168.254.0 255.255.255.0&lt;BR /&gt;access-list NETFLOW extended permit tcp any any&lt;BR /&gt;access-list NETFLOW extended permit object-group DNS-GROUP any host fw1.outside.irc.com&lt;BR /&gt;access-list NETFLOW extended permit object-group DM_INLINE_SERVICE_6 any host fw1.outside.irc.com&lt;BR /&gt;access-list NETFLOW extended permit udp any host fw1.outside.irc.com&lt;BR /&gt;access-list NETFLOW extended permit tcp any host fw1.outside.irc.com eq smtp&lt;BR /&gt;access-list NETFLOW extended permit tcp any host fw1.outside.irc.com object-group DM_INLINE_TCP_5&lt;BR /&gt;access-list NETFLOW extended permit tcp any host fw1.outside.irc.com object-group TCP-8080&lt;BR /&gt;access-list NETFLOW extended permit object-group DM_INLINE_SERVICE_4 any host NAT-202.58.130.43&lt;BR /&gt;access-list NETFLOW remark Reverse Proxy Inbound Rules from Internet- Lync 2013 Project - Lync Simple URLs&lt;BR /&gt;access-list NETFLOW extended permit tcp any host 202.58.130.69 object-group DM_INLINE_TCP_6&lt;BR /&gt;access-list NETFLOW remark Lync Edge Access Inbound Rule - Restricting Inbound&lt;BR /&gt;access-list NETFLOW extended permit object-group pomlynedsvr01_access_Outside_to_DMZ any host 202.58.130.66&lt;BR /&gt;access-list NETFLOW remark Lync Edge Outside to Inside for AV Interface&lt;BR /&gt;access-list NETFLOW extended permit object-group pomlynedsvr01_webcon_outside_to_DMZ any host 202.58.130.67&lt;BR /&gt;access-list NETFLOW extended permit object-group pomlynedsvr01_AV_Outside_to_DMZ any host 202.58.130.68&lt;BR /&gt;access-list NETFLOW extended permit object-group DM_INLINE_SERVICE_11 any host NAT-fijiircdata&lt;BR /&gt;access-list NETFLOW extended deny ip host SPAMIP any&lt;BR /&gt;access-list NETFLOW extended deny ip SPAM_MACHINE 255.255.255.0 any&lt;BR /&gt;access-list NETFLOW extended deny ip host 220.233.157.99 any log debugging&lt;BR /&gt;&lt;BR /&gt;access-list Huawei-Access-Networks remark HUawei-Network-Elements&lt;BR /&gt;access-list Huawei-Access-Networks standard permit 192.168.200.0 255.255.255.0&lt;BR /&gt;access-list Huawei-Access-Networks remark Access to Ela Beach MPLS network&lt;BR /&gt;access-list Huawei-Access-Networks standard permit 10.100.70.0 255.255.255.0&lt;BR /&gt;access-list Huawei-Access-Networks remark Huawei Network elements&lt;BR /&gt;access-list Huawei-Access-Networks standard permit 192.168.210.0 255.255.255.0&lt;BR /&gt;access-list Huawei-Access-Networks remark Huawei network elements&lt;BR /&gt;access-list Huawei-Access-Networks standard permit 192.168.213.0 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;access-list management_nat0_outbound_1 extended permit ip host solarwinds-server 10.10.200.0 255.255.255.0&lt;BR /&gt;access-list Alcatel-NMS-ACL remark Access allowed to Alcatel NMS devices in NOC&lt;BR /&gt;access-list Alcatel-NMS-ACL standard permit 10.2.1.0 255.255.255.0&lt;BR /&gt;access-list Business-Systems-Access remark Mail Server 1&lt;BR /&gt;access-list Business-Systems-Access standard permit host neptune.waigani.telikompng.com.pg&lt;BR /&gt;access-list Business-Systems-Access remark Mail Server 2&lt;BR /&gt;access-list Business-Systems-Access standard permit host minerva.waigani.telikompng.com.pg&lt;BR /&gt;access-list Business-Systems-Access remark SAP PROD&lt;BR /&gt;access-list Business-Systems-Access standard permit host SAP-SAPPROD&lt;BR /&gt;access-list Business-Systems-Access remark Avabill Application Server&lt;BR /&gt;access-list Business-Systems-Access standard permit host Avabill86.177&lt;BR /&gt;access-list Business-Systems-Access remark Backup Avabill Application Server&lt;BR /&gt;access-list Business-Systems-Access standard permit host Avabill84.170&lt;BR /&gt;access-list Business-Systems-Access remark HRSelfcare&lt;BR /&gt;access-list Business-Systems-Access standard permit host HOST-172.16.86.248&lt;BR /&gt;access-list Business-Systems-Access remark Intranet Server&lt;BR /&gt;access-list Business-Systems-Access standard permit host 172.16.85.32&lt;BR /&gt;access-list IT-Systems-Support remark Access to inside network&lt;BR /&gt;access-list IT-Systems-Support standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list IT-Systems-Support remark Access to IN netwwork&lt;BR /&gt;access-list IT-Systems-Support standard permit 172.16.88.0 255.255.252.0&lt;BR /&gt;access-list IT-Systems-Support standard permit Cisco-VLans 255.255.0.0&lt;BR /&gt;access-list Systems-XS remark Access to 84 subnet&lt;BR /&gt;access-list Systems-XS standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list Systems-XS remark Access to .4 subnet&lt;BR /&gt;access-list Systems-XS standard permit inside-network-extra-subnet 255.255.252.0&lt;BR /&gt;access-list Systems-XS remark Access to 10.100.x.x/24&lt;BR /&gt;access-list Systems-XS standard permit Cisco-VLans 255.255.0.0&lt;BR /&gt;access-list Huawei-NOC standard permit 172.16.84.0 255.255.252.0&lt;BR /&gt;access-list Huawei-NOC standard permit Cisco-VLans 255.255.0.0&lt;BR /&gt;access-list Huawei-NOC standard permit HASUT 255.255.255.0&lt;BR /&gt;access-list Huawei-NOC standard permit IT-NETWORK-NEW 255.255.0.0&lt;BR /&gt;&lt;BR /&gt;access-list efdata remark Allow efdata access to above device as per request by chris mkao&lt;BR /&gt;access-list efdata standard permit 172.16.92.0 255.255.252.0&lt;BR /&gt;&lt;BR /&gt;access-list test standard permit 172.16.92.0 255.255.252.0&lt;BR /&gt;access-list Ghu_ES_LAN remark Allow efdata access to fij ES LAN&lt;BR /&gt;access-list Ghu_ES_LAN extended permit ip any 172.16.92.0 255.255.252.0&lt;BR /&gt;access-list GuestInternet_access_in extended permit ip any any&lt;BR /&gt;global (inside) 1 interface&lt;BR /&gt;global (SSN-DMZ) 1 interface&lt;BR /&gt;global (Outside) 1 interface&lt;BR /&gt;global (management) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound_1 outside&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (SSN-DMZ) 0 access-list SSN-DMZ_nat0_outbound&lt;BR /&gt;nat (SSN-DMZ) 1 &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt; 255.255.255.255&lt;BR /&gt;nat (Outside) 0 access-list Outside_nat0_outbound&lt;BR /&gt;nat (GuestInternet) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (management) 0 access-list management_nat0_outbound&lt;BR /&gt;nat (management) 0 access-list management_nat0_outbound_1 outside&lt;BR /&gt;nat (management) 1 10.10.200.1 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10103 mailgate.irc.com 10103 netmask 255.255.255.255&lt;BR /&gt;static (SSN-DMZ,Outside) tcp interface www &lt;A href="https://community.cisco.com/WWW.IRC.COM-PRIV" target="_blank"&gt;WWW.IRC.COM-PRIV&lt;/A&gt; www netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface smtp mailgate.irc.com smtp netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface telnet HOST-172.16.84.144 telnet netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface pcanywhere-data HOST-192.168.1.14 pcanywhere-data netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) udp interface pcanywhere-status HOST-192.168.1.14 pcanywhere-status netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface ssh InterConnect-BillingBox ssh netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) udp interface ntp confusious.suva.irc.com ntp netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10002 HOST-172.16.200.121 10002 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10003 HOST-172.16.200.122 10003 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10004 HOST-172.16.41.26 10004 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10005 HOST-172.16.41.27 10005 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface https Avabill86.181 https netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 7778 Avabill86.181 7778 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 8080 Avabill86.181 8080 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 7777 Avabill86.181 7777 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.45 https Avabill86.177 https netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 2222 daywalker.suva.irc.com 2222 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 ftp waigani-pdc-int2.suva.irc.com ftp netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 www neptune.suva.irc.com www netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5900 Primary1352CM 5900 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 5900 Backup1352CM 5900 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 https neptune.suva.irc.com https netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 24 HOST-172.16.86.87 24 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) udp interface domain ns.irc.com domain netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface pop3 neptune.suva.irc.com pop3 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 7780 Apache-WebServer 7780 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 8000 CRM-SERVER2 8000 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 8010 CRM-SERVER4 8010 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 8005 CRM-SERVER3 8005 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 123 confusious.suva.irc.com 123 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface imap4 neptune.suva.irc.com imap4 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface domain ns.irc.com domain netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface ftp telitgate.irc.com ftp netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5901 uvnc-server 5901 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5801 uvnc-server 5801 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5902 172.16.84.200 5902 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5802 172.16.84.200 5802 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 995 neptune.suva.irc.com 995 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 993 neptune.suva.irc.com 993 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 6001 neptune.suva.irc.com 6001 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 6002 neptune.suva.irc.com 6002 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 6004 neptune.suva.irc.com 6004 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 6001 minerva.suva.irc.com 6001 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 6002 minerva.suva.irc.com 6002 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 6004 minerva.suva.irc.com 6004 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 8720 solarwinds-server 8720 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 9000 solarwinds-server 9000 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 2055 solarwinds-server 2055 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 88 A-10.100.20.250 88 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 10000 ns.irc.com 10000 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) udp Ext-R2-Outside-Interface 2055 solarwinds-server 2055 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) udp Ext-R2-Outside-Interface snmp solarwinds-server snmp netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 135 neptune.suva.irc.com 135 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 3389 BT-DesktopPC 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.65 www IN-WSC www netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.65 https IN-WSC https netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 ssh Avabill86.176 ssh netmask 255.255.255.255&lt;BR /&gt;static (Outside,inside) tcp 10.100.20.36 5432 smile.telinet.com.pg 5432 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 222 chief.suva.irc.com ssh netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5061 LYNC-2013-SERVER 5061 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp interface 5432 10.100.20.36 5432 netmask 255.255.255.255&lt;BR /&gt;static (inside,Outside) tcp NAT-202.58.130.43 182 dadbsvr www netmask 255.255.255.255&lt;BR /&gt;static (SSN-DMZ,Outside) 202.58.130.69 pomlynrprx01 netmask 255.255.255.255&lt;BR /&gt;static (SSN-DMZ,Outside) 202.58.130.66 pomlynedsvr01_access netmask 255.255.255.255&lt;BR /&gt;static (SSN-DMZ,Outside) 202.58.130.67 pomlynedsvr01_webcon netmask 255.255.255.255&lt;BR /&gt;static (SSN-DMZ,Outside) 202.58.130.68 pomlynedsvr01_AV netmask 255.255.255.255&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group SSN-DMZ_access_in in interface SSN-DMZ&lt;BR /&gt;access-group Outside_access_in_1 in interface Outside control-plane&lt;BR /&gt;access-group NETFLOW in interface Outside&lt;BR /&gt;access-group GuestInternet_access_in in interface GuestInternet&lt;BR /&gt;access-group management_access_in_1 in interface management control-plane&lt;BR /&gt;access-group management_access_in in interface management&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 Ext-R1-Inside-Interface 1&lt;BR /&gt;route inside 10.2.1.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.8.0.0 255.255.255.0 VPNGATE 1&lt;BR /&gt;route inside 10.9.254.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.1.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.2.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.3.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.4.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.5.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.10.10.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 10.15.100.0 255.255.255.0 fw1.outside.irc.com 1&lt;BR /&gt;route inside Cisco-VLans 255.255.0.0 Cisco7200 1&lt;BR /&gt;route inside VLan20-2F 255.255.255.0 Cisco7200 1&lt;BR /&gt;route inside 10.100.67.0 255.255.255.0 IPVPN-Router 1&lt;BR /&gt;route inside 10.100.74.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.75.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.76.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside LAE 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.91.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.110.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.111.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.100.114.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 10.200.200.0 255.255.255.0 Cisco7200 1&lt;BR /&gt;route inside A-10.250.0.0 255.255.0.0 Cisco7200 1&lt;BR /&gt;route inside 10.254.2.0 255.255.255.252 IPVPN-Router 1&lt;BR /&gt;route inside 11.11.3.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 11.11.4.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 11.11.8.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 11.11.9.0 255.255.255.0 172.16.86.0 1&lt;BR /&gt;route inside 20.200.200.0 255.255.255.0 172.16.86.17 1&lt;BR /&gt;route inside inside-network-extra-subnet 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.8.0 255.255.252.0 Cisco7200 1&lt;BR /&gt;route inside 172.16.12.0 255.255.252.0 172.16.86.197 1&lt;BR /&gt;route inside 172.16.24.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside NOC 255.255.252.0 172.16.87.187 1&lt;BR /&gt;route inside 172.16.48.0 255.255.252.0 172.16.84.41 1&lt;BR /&gt;route inside 172.16.52.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.56.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.60.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.64.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.68.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.72.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.76.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.80.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.84.185 255.255.255.255 172.16.86.217 1&lt;BR /&gt;route inside CRM-SERVER1 255.255.255.255 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.88.0 255.255.252.0 Cisco7200 1&lt;BR /&gt;route inside 172.16.92.0 255.255.252.0 Cisco7200 1&lt;BR /&gt;route inside 172.16.96.0 255.255.252.0 172.16.87.172 1&lt;BR /&gt;route inside 172.16.104.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.108.0 255.255.252.0 IPVPN-Router 1&lt;BR /&gt;route inside 172.16.112.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.120.0 255.255.252.0 TFIJIG-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.124.0 255.255.252.0 IPVPN-Router 1&lt;BR /&gt;route inside 172.16.128.0 255.255.252.0 172.16.86.185 1&lt;BR /&gt;route inside 172.16.132.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.136.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.140.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.144.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.148.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.152.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.156.0 255.255.252.0 IPVPN-Router 1&lt;BR /&gt;route inside 172.16.160.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.164.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.168.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.172.0 255.255.252.0 172.16.87.172 1&lt;BR /&gt;route inside 172.16.180.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.184.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.188.0 255.255.252.0 172.16.86.85 1&lt;BR /&gt;route inside 172.16.188.0 255.255.252.0 Cisco7200 1&lt;BR /&gt;route inside 172.16.192.0 255.255.252.0 172.16.86.194 1&lt;BR /&gt;route inside 172.16.200.0 255.255.252.0 172.16.87.11 1&lt;BR /&gt;route inside 172.16.204.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.208.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.212.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.220.0 255.255.252.0 IPVPN-Router 1&lt;BR /&gt;route inside 172.16.224.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.236.0 255.255.252.0 172.16.87.254 1&lt;BR /&gt;route inside 172.16.240.0 255.255.252.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 172.16.248.0 255.255.252.0 IPVPN-Router 1&lt;BR /&gt;route inside 172.17.84.0 255.255.255.224 IPVPN-Router 1&lt;BR /&gt;route inside 172.18.252.0 255.255.252.0 172.16.84.15 1&lt;BR /&gt;route inside 172.20.0.0 255.255.252.0 172.16.87.11 1&lt;BR /&gt;route management 172.20.1.32 255.255.255.240 10.10.200.18 1&lt;BR /&gt;route inside 192.167.5.0 255.255.255.0 172.16.86.42 1&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 HOST-172.16.84.144 1&lt;BR /&gt;route inside 192.168.1.96 255.255.255.224 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.1.128 255.255.255.224 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.2.0 255.255.255.0 172.16.87.192 1&lt;BR /&gt;route inside 192.168.5.0 255.255.255.0 HOST-172.16.84.144 1&lt;BR /&gt;route inside 192.168.11.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.150.0 255.255.255.0 IPVPN-Router 1&lt;BR /&gt;route inside 192.168.200.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.201.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.202.0 255.255.255.0 TFIJI-CORE-INT-ROUTER 1&lt;BR /&gt;route inside 192.168.210.0 255.255.255.0 Cisco7200 1&lt;BR /&gt;route inside 192.168.213.0 255.255.255.0 Cisco7200 1&lt;BR /&gt;route inside 192.168.254.0 255.255.255.0 fw1.outside.irc.com 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map flow_export_class&lt;BR /&gt;&amp;nbsp;match access-list global_mpc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;&amp;nbsp; inspect ipsec-pass-thru&lt;BR /&gt;&amp;nbsp; inspect mgcp&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect snmp&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ftp strict&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp;class flow_export_class&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination solarwinds-server&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 172.16.86.16&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:24270eebd6c941fb7b302b034e32bba1&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:21:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-firewall-ports-despite-deny-all-access-rule/m-p/2527165#M237306</guid>
      <dc:creator>Pius Nolih</dc:creator>
      <dc:date>2019-03-12T04:21:39Z</dc:date>
    </item>
    <item>
      <title>Hi, NMAP gives the report for</title>
      <link>https://community.cisco.com/t5/network-security/open-firewall-ports-despite-deny-all-access-rule/m-p/2527166#M237307</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NMAP gives the report for the first firewall interface it hits. In your case you have allowed tcp any any where it allows all the ports. I have mentioned only one example.... There are many in your case....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also NMAP results will be effective once when you directly connect to outside interface or directly on to the outside LAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Jun 2014 05:45:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-firewall-ports-despite-deny-all-access-rule/m-p/2527166#M237307</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-06-22T05:45:50Z</dc:date>
    </item>
  </channel>
</rss>

