<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Routing between two ASA's possible? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168961#M360059</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My name is Jay and I have a question on routing between two ASA'S....please allow me to explain the setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the office we have one ASA 5505 with a Base License connected to a Cisco 1800 ISP router and a 2960S Layer 2 Lan Switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My supervisor wanted me to create a replica lab from our other location.&amp;nbsp; It consists of the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An ASA 5510 with a Base License, a 2960s switch and a server.&amp;nbsp; There is no ISP connectivity on this ASA and there doesnt need to be any because its just a development replication setup from another site we have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My supervisor would like to be able to connect to this development 5510 and access this server from whatever vlan its on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I connect the 5510 to the 5505 and just give it a static route from both sides?&amp;nbsp; I know that these ASA's were never intended for routing per se.&amp;nbsp; But my supervisor now wants me to take down the 5505 and replace it with another 5510 in the hopes this will work.&amp;nbsp; I dont want him to waste resources if its not needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anybody tell me routing between these two is possible along with the users on the vlan hosted from the 5505 being able to access the server on the development/testing 5510/2960s/server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice on this be so much appreciated!&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:14:57 GMT</pubDate>
    <dc:creator>darthbishop79</dc:creator>
    <dc:date>2019-03-12T01:14:57Z</dc:date>
    <item>
      <title>Routing between two ASA's possible?</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168961#M360059</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My name is Jay and I have a question on routing between two ASA'S....please allow me to explain the setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the office we have one ASA 5505 with a Base License connected to a Cisco 1800 ISP router and a 2960S Layer 2 Lan Switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My supervisor wanted me to create a replica lab from our other location.&amp;nbsp; It consists of the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An ASA 5510 with a Base License, a 2960s switch and a server.&amp;nbsp; There is no ISP connectivity on this ASA and there doesnt need to be any because its just a development replication setup from another site we have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My supervisor would like to be able to connect to this development 5510 and access this server from whatever vlan its on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I connect the 5510 to the 5505 and just give it a static route from both sides?&amp;nbsp; I know that these ASA's were never intended for routing per se.&amp;nbsp; But my supervisor now wants me to take down the 5505 and replace it with another 5510 in the hopes this will work.&amp;nbsp; I dont want him to waste resources if its not needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anybody tell me routing between these two is possible along with the users on the vlan hosted from the 5505 being able to access the server on the development/testing 5510/2960s/server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice on this be so much appreciated!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168961#M360059</guid>
      <dc:creator>darthbishop79</dc:creator>
      <dc:date>2019-03-12T01:14:57Z</dc:date>
    </item>
    <item>
      <title>Routing between two ASA's possible?</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168962#M360060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hola Jesus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No problem at all man, the ASA's can route, they support EIGRP,OSPF,RIP and even OSPFv3 &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; so go ahead and give it a try..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now remember that you will need to play with the rules in order to allow traffic from a lower to a higher security layer just in case,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Mar 2013 05:08:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168962#M360060</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-17T05:08:34Z</dc:date>
    </item>
    <item>
      <title>Routing between two ASA's possible?</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168963#M360062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have included the config on the asa 5505.&amp;nbsp; So I just have to create another vlan on it with a security level nameif etc ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname bigred&lt;/P&gt;&lt;P&gt;enable password J52ZjGV907pWfK2E encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 108.x.x.x 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; name-server 4.2.2.2&lt;/P&gt;&lt;P&gt; name-server 167.206.112.138&lt;/P&gt;&lt;P&gt; name-server 167.206.7.4&lt;/P&gt;&lt;P&gt;object-group icmp-type ICMP-Types&lt;/P&gt;&lt;P&gt; description Allowed ICMP Types&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Derek from Inverse SSH to PF box for MEC&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq ssh&lt;/P&gt;&lt;P&gt;access-list BRPACL standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list BRPIPSECVPN_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list NAT-EXEMPT extended permit ip host 192.168.1.36 host 192.168.1.36&lt;/P&gt;&lt;P&gt;access-list BRPIPSEC5_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_nat0_outbound extended permit ip host 192.168.1.36 any&lt;/P&gt;&lt;P&gt;access-list Inbound extended permit icmp any any object-group ICMP-Types&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool client-pool 192.168.1.2-192.168.1.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list outside_nat0_outbound&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ssh 192.168.1.32 ssh netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group Inbound in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 108.x.x.x&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server MyRadius protocol radius&lt;/P&gt;&lt;P&gt;aaa-server MyRadius (inside) host 192.168.0.254&lt;/P&gt;&lt;P&gt; key *****&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 1 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 1 set reverse-route&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;crypto map mymap 65535 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable inside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp ipsec-over-tcp port 10000&lt;/P&gt;&lt;P&gt;telnet 108.x.x.x 255.255.255.248 outside&lt;/P&gt;&lt;P&gt;telnet 108.x.x.x 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 167.206.112.138&lt;/P&gt;&lt;P&gt;dhcpd lease 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.20-192.168.1.100 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable inside&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 1&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy BRPACVPN7grp internal&lt;/P&gt;&lt;P&gt;group-policy BRPACVPN7grp attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc&lt;/P&gt;&lt;P&gt;group-policy BRPIPSEC5 internal&lt;/P&gt;&lt;P&gt;group-policy BRPIPSEC5 attributes&lt;/P&gt;&lt;P&gt; dns-server value 8.8.8.8 4.2.2.2&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value BRPIPSEC5_splitTunnelAcl&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup attributes&lt;/P&gt;&lt;P&gt; dns-server value 8.8.8.8 4.2.2.2&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec&lt;/P&gt;&lt;P&gt;username brpsupport password zI7LviwmgXkaZ/aa encrypted privilege 15&lt;/P&gt;&lt;P&gt;username dino password rMbZiny1o/BxpxEn encrypted&lt;/P&gt;&lt;P&gt;username nate password ASTjIxHZk2qtAyh4 encrypted&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool AnyPool&lt;/P&gt;&lt;P&gt; default-group-policy DefaultRAGroup&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group BRPACVPN7 type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group BRPACVPN7 general-attributes&lt;/P&gt;&lt;P&gt; address-pool AnyPool&lt;/P&gt;&lt;P&gt; default-group-policy BRPACVPN7grp&lt;/P&gt;&lt;P&gt;tunnel-group BRPIPSEC5 type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group BRPIPSEC5 general-attributes&lt;/P&gt;&lt;P&gt; address-pool AnyPool&lt;/P&gt;&lt;P&gt; default-group-policy BRPIPSEC5&lt;/P&gt;&lt;P&gt;tunnel-group BRPIPSEC5 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group client type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group client general-attributes&lt;/P&gt;&lt;P&gt; address-pool client-pool&lt;/P&gt;&lt;P&gt; authentication-server-group MyRadius&lt;/P&gt;&lt;P&gt;tunnel-group client ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:bde4c761e429c028f9a4902c211b7b16&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;bigred#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Mar 2013 17:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168963#M360062</guid>
      <dc:creator>darthbishop79</dc:creator>
      <dc:date>2013-03-17T17:13:09Z</dc:date>
    </item>
    <item>
      <title>Routing between two ASA's possible?</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168964#M360064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exactly, just another interface as regularly , make sure both boxes have connectivity to each other and then configure routing as required,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Mar 2013 18:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168964#M360064</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-17T18:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between two ASA's possible?</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168965#M360066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio, I can now ping the ASA's to each other.&amp;nbsp; But I can't ping my 192.168.1.x to the subnet of the other ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to configure an access list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the asa 5505 is 192.168.1.1 and I created an inside interface on the 5510 as 192.168.9.1.&amp;nbsp; I can ping across both.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 15:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168965#M360066</guid>
      <dc:creator>darthbishop79</dc:creator>
      <dc:date>2013-03-18T15:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between two ASA's possible?</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168966#M360068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jesus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you create a quick diagram of how the network is setup or share both ASAs configs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 16:44:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168966#M360068</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-18T16:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between two ASA's possible?</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168967#M360070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Production Lan office:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Developement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISP - Cisco 1800 modem&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Pingable&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;ASA 5505 -Base License E0/2 ------------------------E0/2 (Inside 192.168.9.1)&amp;nbsp; ASA 5510 - Base License&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2960S Switch&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2960S&amp;nbsp; Switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current config of 5505&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname bigred&lt;/P&gt;&lt;P&gt;enable password J52ZjGV907pWfK2E encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 108.x.x.x 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; name-server 4.2.2.2&lt;/P&gt;&lt;P&gt; name-server 167.206.112.138&lt;/P&gt;&lt;P&gt; name-server 167.206.7.4&lt;/P&gt;&lt;P&gt;object-group icmp-type ICMP-Types&lt;/P&gt;&lt;P&gt; description Allowed ICMP Types&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Derek from Inverse SSH to PF box for M&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq ssh&lt;/P&gt;&lt;P&gt;access-list BRPACL standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list BRPIPSECVPN_splitTunnelAcl standard permit 192.168.1.0 255.255.&lt;/P&gt;&lt;P&gt;access-list split standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list BRPIPSEC5_splitTunnelAcl standard permit 192.168.1.0 255.255.25&lt;/P&gt;&lt;P&gt;access-list capin extended permit ip host 192.168.1.200 host 10.10.10.1&lt;/P&gt;&lt;P&gt;access-list capin extended permit ip host 10.10.10.1 host 192.168.1.200&lt;/P&gt;&lt;P&gt;access-list Inbound extended permit icmp any any object-group ICMP-Types&lt;/P&gt;&lt;P&gt;access-list Inbound extended permit ip 192.168.1.0 255.255.255.0 10.10.10.0255.255.0&lt;/P&gt;&lt;P&gt;access-list Inbound extended permit ip 10.10.10.0 255.255.255.0 192.168.1.0255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool client-pool 10.10.10.1-10.10.10.30 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group Inbound in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 108.58.169.9 1&lt;/P&gt;&lt;P&gt;route inside 192.168.9.0 255.255.255.0 192.168.9.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:0&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server MyRadius protocol radius&lt;/P&gt;&lt;P&gt;aaa-server MyRadius (inside) host 192.168.0.254&lt;/P&gt;&lt;P&gt; key *****&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AE-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 1 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map mymap 65535 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal 33&lt;/P&gt;&lt;P&gt;crypto isakmp ipsec-over-tcp port 10000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 108.x.x.x 255.255.255.248 outside&lt;/P&gt;&lt;P&gt;ssh 63.247.181.120 255.255.255.248 outside&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 167.206.112.138&lt;/P&gt;&lt;P&gt;dhcpd lease 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.20-192.168.1.100 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;tftp-server inside 192.168.1.45 C:\OpenTFTPServer&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable inside&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 1&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy BRPVPN79 internal&lt;/P&gt;&lt;P&gt;group-policy BRPVPN79 attributes&lt;/P&gt;&lt;P&gt; dns-server value 8.8.8.8 4.2.2.2&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec svc&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup attributes&lt;/P&gt;&lt;P&gt; dns-server value 8.8.8.8 4.2.2.2&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec&lt;/P&gt;&lt;P&gt;username brpsupport password zI7LviwmgXkaZ/aa encrypted privilege 15&lt;/P&gt;&lt;P&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted&lt;/P&gt;&lt;P&gt;username dino password rMbZiny1o/BxpxEn encrypted&lt;/P&gt;&lt;P&gt;username nate password ASTjIxHZk2qtAyh4 encrypted&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy DefaultRAGroup&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group BRPVPN79 type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group BRPVPN79 general-attributes&lt;/P&gt;&lt;P&gt; address-pool client-pool&lt;/P&gt;&lt;P&gt; default-group-policy BRPVPN79&lt;/P&gt;&lt;P&gt;tunnel-group BRPVPN79 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:c9cd3816db1bd739303764a863dc7d91&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config of 5510 -- its a big one since its from our Production in another site.&amp;nbsp; We are trying to replicate it with a test lab&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname NJExpoCenter-ASA&lt;/P&gt;&lt;P&gt;domain-name NJExpoCenter&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif Internet&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 63.x.x.x 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif packetfence-in&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.103&lt;/P&gt;&lt;P&gt; vlan 103&lt;/P&gt;&lt;P&gt; nameif packetfence-prod&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.3.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.105&lt;/P&gt;&lt;P&gt; vlan 105&lt;/P&gt;&lt;P&gt; nameif packetfence-tier2&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.5.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.106&lt;/P&gt;&lt;P&gt; vlan 106&lt;/P&gt;&lt;P&gt; nameif packetfence-tier3&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.6.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.107&lt;/P&gt;&lt;P&gt; vlan 107&lt;/P&gt;&lt;P&gt; nameif packetfence-tier4&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.7.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.120&lt;/P&gt;&lt;P&gt; vlan 120&lt;/P&gt;&lt;P&gt; nameif njexpo-retail&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.20.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.130&lt;/P&gt;&lt;P&gt; vlan 130&lt;/P&gt;&lt;P&gt; nameif noshaping&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.30.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.131&lt;/P&gt;&lt;P&gt; vlan 131&lt;/P&gt;&lt;P&gt; nameif libertySSID&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.31.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.132&lt;/P&gt;&lt;P&gt; vlan 132&lt;/P&gt;&lt;P&gt; nameif nyscc&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.32.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.133&lt;/P&gt;&lt;P&gt; vlan 133&lt;/P&gt;&lt;P&gt; nameif brpSSIDnoshaping&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.33.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.150&lt;/P&gt;&lt;P&gt; vlan 150&lt;/P&gt;&lt;P&gt; nameif 5M-PrivateVLAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.150.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.151&lt;/P&gt;&lt;P&gt; vlan 151&lt;/P&gt;&lt;P&gt; nameif 10M-PrivateVLAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.151.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.152&lt;/P&gt;&lt;P&gt; vlan 152&lt;/P&gt;&lt;P&gt; nameif 20M-PrivateVLAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.152.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.153&lt;/P&gt;&lt;P&gt; vlan 153&lt;/P&gt;&lt;P&gt; nameif 30M-PrivateVLAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.153.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.154&lt;/P&gt;&lt;P&gt; vlan 154&lt;/P&gt;&lt;P&gt; nameif 40M-PrivateVLAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.154.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.155&lt;/P&gt;&lt;P&gt; vlan 155&lt;/P&gt;&lt;P&gt; nameif 50M-PrivateVLAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.155.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.156&lt;/P&gt;&lt;P&gt; vlan 156&lt;/P&gt;&lt;P&gt; nameif 60M-PrivateVLAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.156.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.157&lt;/P&gt;&lt;P&gt; vlan 157&lt;/P&gt;&lt;P&gt; nameif 70M-PrivateVLAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.157.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.158&lt;/P&gt;&lt;P&gt; vlan 158&lt;/P&gt;&lt;P&gt; nameif 80M-PrivateVLAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.158.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.159&lt;/P&gt;&lt;P&gt; vlan 159&lt;/P&gt;&lt;P&gt; nameif 90M-PrivateVLAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.159.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.9.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup Internet&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 167.x.x.x&lt;/P&gt;&lt;P&gt; name-server 167.x.x.x&lt;/P&gt;&lt;P&gt; domain-name NJExpoCenter&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object-group service mysql tcp&lt;/P&gt;&lt;P&gt; port-object eq 3306&lt;/P&gt;&lt;P&gt;object-group icmp-type ICMP-Types&lt;/P&gt;&lt;P&gt; description Allowed ICMP Types&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt;access-list Internet-in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list Internet-in extended permit tcp any any object-group mysql&lt;/P&gt;&lt;P&gt;access-list Internet-in extended permit udp any any eq snmp&lt;/P&gt;&lt;P&gt;access-list RemoteAccessVPN standard permit 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list packetfence-prod_nat0_outbound extended permit ip 10.3.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list packetfence-prod_nat0_outbound extended permit ip 10.3.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list packetfence-prod_access_in remark Deny everything to management&lt;/P&gt;&lt;P&gt;access-list packetfence-prod_access_in extended deny ip 10.3.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list packetfence-prod_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list njexpo-retail_access_in extended deny ip 10.20.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list njexpo-retail_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list njexpo-retail_nat0_outbound extended permit ip 10.20.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list njexpo-retail_nat0_outbound extended permit ip 10.20.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list njexpo-police extended permit ip 10.20.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list njexpo-police extended permit ip any 10.20.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list tier1-police extended permit ip 10.3.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list tier1-police extended permit ip any 10.3.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list tier2-police extended permit ip 10.5.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list tier2-police extended permit ip any 10.5.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list tier3-police extended permit ip 10.6.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list tier3-police extended permit ip any 10.6.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list tier4-police extended permit ip 10.7.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list tier4-police extended permit ip any 10.7.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list packetfence-tier3_nat0_outbound extended permit ip 10.6.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list packetfence-tier3_nat0_outbound extended permit ip 10.6.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list packetfence-tier2_nat0_outbound extended permit ip 10.5.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list packetfence-tier2_nat0_outbound extended permit ip 10.5.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list packetfence-tier4_nat0_outbound extended permit ip 10.7.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list packetfence-tier4_nat0_outbound extended permit ip 10.7.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list packetfence-tier4_access_in extended deny ip 10.7.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list packetfence-tier4_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list packetfence-tier3_access_in extended deny ip 10.6.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list packetfence-tier3_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list packetfence-tier2_access_in extended deny ip 10.5.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list packetfence-tier2_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list noshaping_access_in extended deny ip any 192.168.10.0 255.255.255.0 inactive&lt;/P&gt;&lt;P&gt;access-list noshaping_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list noshaping_nat0_outbound extended permit ip 10.30.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list noshaping_nat0_outbound extended permit ip 10.30.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list libertySSID_nat0_outbound extended permit ip 10.31.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list libertySSID_nat0_outbound extended permit ip 10.31.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list libertySSID_access_in extended deny ip 10.31.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list libertySSID_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list liberty-police extended permit ip 10.31.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list liberty-police extended permit ip any 10.31.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nyscc_nat0_outbound extended permit ip 10.32.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list nyscc_nat0_outbound extended permit ip 10.32.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nyscc_access_in extended deny ip 10.32.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nyscc_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list nyscc_mpc extended permit ip 10.32.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list nyscc_mpc extended permit ip any 10.32.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list brpSSIDnoshaping_access_in extended permit ip 10.33.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list brpSSIDnoshaping_access_in extended permit icmp 10.33.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list brpSSIDnoshaping_nat0_outbound extended permit ip 10.33.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list brpSSIDnoshaping_nat0_outbound extended permit ip 10.33.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list packetfence-in_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list packetfence-in_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 5M-policy extended permit ip 10.150.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list 5M-policy extended permit ip any 10.150.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 10M-policy extended permit ip 10.151.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list 10M-policy extended permit ip any 10.151.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 20M-policy extended permit ip 10.152.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list 20M-policy extended permit ip any 10.152.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 30M-policy extended permit ip 10.153.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list 30M-policy extended permit ip any 10.153.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 40M-policy extended permit ip 10.154.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list 40M-policy extended permit ip any 10.154.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 50M-policy extended permit ip 10.155.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list 50M-policy extended permit ip any 10.155.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 60M-policy extended permit ip 10.156.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list 60M-policy extended permit ip any 10.156.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 70M-policy extended permit ip 10.157.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list 70M-policy extended permit ip any 10.157.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 80M-policy extended permit ip 10.158.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list 80M-policy extended permit ip any 10.158.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 90M-policy extended permit ip 10.159.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list 90M-policy extended permit ip any 10.159.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 5M-PrivateVLAN_nat0_outbound extended permit ip 10.150.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 5M-PrivateVLAN_nat0_outbound extended permit ip 10.150.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 10M-PrivateVLAN_nat0_outbound extended permit ip 10.151.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 10M-PrivateVLAN_nat0_outbound extended permit ip 10.151.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 20M-PrivateVLAN_nat0_outbound extended permit ip 10.152.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 20M-PrivateVLAN_nat0_outbound extended permit ip 10.152.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 30M-PrivateVLAN_nat0_outbound extended permit ip 10.153.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 30M-PrivateVLAN_nat0_outbound extended permit ip 10.153.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 40M-PrivateVLAN_nat0_outbound extended permit ip 10.154.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 40M-PrivateVLAN_nat0_outbound extended permit ip 10.154.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 50M-PrivateVLAN_nat0_outbound extended permit ip 10.155.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 50M-PrivateVLAN_nat0_outbound extended permit ip 10.155.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 60M-PrivateVLAN_nat0_outbound extended permit ip 10.156.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 60M-PrivateVLAN_nat0_outbound extended permit ip 10.156.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 70M-PrivateVLAN_nat0_outbound extended permit ip 10.157.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 70M-PrivateVLAN_nat0_outbound extended permit ip 10.157.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 80M-PrivateVLAN_nat0_outbound extended permit ip 10.158.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 80M-PrivateVLAN_nat0_outbound extended permit ip 10.158.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 90M-PrivateVLAN_nat0_outbound extended permit ip 10.159.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 90M-PrivateVLAN_nat0_outbound extended permit ip 10.159.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 5M-PrivateVLAN_access_in extended deny ip 10.150.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 5M-PrivateVLAN_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 10M-PrivateVLAN_access_in extended deny ip 10.151.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 10M-PrivateVLAN_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 20M-PrivateVLAN_access_in extended deny ip 10.152.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 20M-PrivateVLAN_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 30M-PrivateVLAN_access_in extended deny ip 10.153.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 30M-PrivateVLAN_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 40M-PrivateVLAN_access_in extended deny ip 10.154.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 40M-PrivateVLAN_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 50M-PrivateVLAN_access_in extended deny ip 10.155.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 50M-PrivateVLAN_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 60M-PrivateVLAN_access_in extended deny ip 10.156.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 60M-PrivateVLAN_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 70M-PrivateVLAN_access_in extended deny ip 10.157.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 70M-PrivateVLAN_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 80M-PrivateVLAN_access_in extended deny ip 10.158.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 80M-PrivateVLAN_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 90M-PrivateVLAN_access_in extended deny ip 10.159.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 90M-PrivateVLAN_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffer-size 1024000&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu Internet 1500&lt;/P&gt;&lt;P&gt;mtu packetfence-in 1500&lt;/P&gt;&lt;P&gt;mtu packetfence-prod 1500&lt;/P&gt;&lt;P&gt;mtu packetfence-tier2 1500&lt;/P&gt;&lt;P&gt;mtu packetfence-tier3 1500&lt;/P&gt;&lt;P&gt;mtu packetfence-tier4 1500&lt;/P&gt;&lt;P&gt;mtu njexpo-retail 1500&lt;/P&gt;&lt;P&gt;mtu noshaping 1500&lt;/P&gt;&lt;P&gt;mtu libertySSID 1500&lt;/P&gt;&lt;P&gt;mtu nyscc 1500&lt;/P&gt;&lt;P&gt;mtu brpSSIDnoshaping 1500&lt;/P&gt;&lt;P&gt;mtu 5M-PrivateVLAN 1500&lt;/P&gt;&lt;P&gt;mtu 10M-PrivateVLAN 1500&lt;/P&gt;&lt;P&gt;mtu 20M-PrivateVLAN 1500&lt;/P&gt;&lt;P&gt;mtu 30M-PrivateVLAN 1500&lt;/P&gt;&lt;P&gt;mtu 40M-PrivateVLAN 1500&lt;/P&gt;&lt;P&gt;mtu 50M-PrivateVLAN 1500&lt;/P&gt;&lt;P&gt;mtu 60M-PrivateVLAN 1500&lt;/P&gt;&lt;P&gt;mtu 70M-PrivateVLAN 1500&lt;/P&gt;&lt;P&gt;mtu 80M-PrivateVLAN 1500&lt;/P&gt;&lt;P&gt;mtu 90M-PrivateVLAN 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip local pool remoteaccess 192.168.10.250-192.168.10.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (Internet) 1 interface&lt;/P&gt;&lt;P&gt;nat (packetfence-in) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (packetfence-in) 1 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (packetfence-prod) 0 access-list packetfence-prod_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (packetfence-prod) 1 10.3.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (packetfence-tier2) 0 access-list packetfence-tier2_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (packetfence-tier2) 1 10.5.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (packetfence-tier3) 0 access-list packetfence-tier3_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (packetfence-tier3) 1 10.6.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (packetfence-tier4) 0 access-list packetfence-tier4_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (packetfence-tier4) 1 10.7.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (njexpo-retail) 0 access-list njexpo-retail_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (njexpo-retail) 1 10.20.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (noshaping) 0 access-list noshaping_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (noshaping) 1 10.30.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (libertySSID) 0 access-list libertySSID_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (libertySSID) 1 10.31.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (nyscc) 0 access-list nyscc_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (nyscc) 1 10.32.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (brpSSIDnoshaping) 0 access-list brpSSIDnoshaping_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (brpSSIDnoshaping) 1 10.33.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (5M-PrivateVLAN) 0 access-list 5M-PrivateVLAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (5M-PrivateVLAN) 1 10.150.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (10M-PrivateVLAN) 0 access-list 10M-PrivateVLAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (10M-PrivateVLAN) 1 10.151.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (20M-PrivateVLAN) 0 access-list 20M-PrivateVLAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (20M-PrivateVLAN) 1 10.152.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (30M-PrivateVLAN) 0 access-list 30M-PrivateVLAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (30M-PrivateVLAN) 1 10.153.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (40M-PrivateVLAN) 0 access-list 40M-PrivateVLAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (40M-PrivateVLAN) 1 10.154.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (50M-PrivateVLAN) 0 access-list 50M-PrivateVLAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (50M-PrivateVLAN) 1 10.155.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (60M-PrivateVLAN) 0 access-list 60M-PrivateVLAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (60M-PrivateVLAN) 1 10.156.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (70M-PrivateVLAN) 0 access-list 70M-PrivateVLAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (70M-PrivateVLAN) 1 10.157.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (80M-PrivateVLAN) 0 access-list 80M-PrivateVLAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (80M-PrivateVLAN) 1 10.158.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (90M-PrivateVLAN) 0 access-list 90M-PrivateVLAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (90M-PrivateVLAN) 1 10.159.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;static (packetfence-in,Internet) tcp interface 3306 192.168.10.3 3306 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (packetfence-in,Internet) udp interface snmp 192.168.10.4 snmp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group Internet-in in interface Internet&lt;/P&gt;&lt;P&gt;access-group packetfence-in_access_in in interface packetfence-in&lt;/P&gt;&lt;P&gt;access-group packetfence-prod_access_in in interface packetfence-prod&lt;/P&gt;&lt;P&gt;access-group packetfence-tier2_access_in in interface packetfence-tier2&lt;/P&gt;&lt;P&gt;access-group packetfence-tier3_access_in in interface packetfence-tier3&lt;/P&gt;&lt;P&gt;access-group packetfence-tier4_access_in in interface packetfence-tier4&lt;/P&gt;&lt;P&gt;access-group njexpo-retail_access_in in interface njexpo-retail&lt;/P&gt;&lt;P&gt;access-group noshaping_access_in in interface noshaping&lt;/P&gt;&lt;P&gt;access-group libertySSID_access_in in interface libertySSID&lt;/P&gt;&lt;P&gt;access-group nyscc_access_in in interface nyscc&lt;/P&gt;&lt;P&gt;access-group brpSSIDnoshaping_access_in in interface brpSSIDnoshaping&lt;/P&gt;&lt;P&gt;access-group 5M-PrivateVLAN_access_in in interface 5M-PrivateVLAN&lt;/P&gt;&lt;P&gt;access-group 10M-PrivateVLAN_access_in in interface 10M-PrivateVLAN&lt;/P&gt;&lt;P&gt;access-group 20M-PrivateVLAN_access_in in interface 20M-PrivateVLAN&lt;/P&gt;&lt;P&gt;access-group 30M-PrivateVLAN_access_in in interface 30M-PrivateVLAN&lt;/P&gt;&lt;P&gt;access-group 40M-PrivateVLAN_access_in in interface 40M-PrivateVLAN&lt;/P&gt;&lt;P&gt;access-group 50M-PrivateVLAN_access_in in interface 50M-PrivateVLAN&lt;/P&gt;&lt;P&gt;access-group 60M-PrivateVLAN_access_in in interface 60M-PrivateVLAN&lt;/P&gt;&lt;P&gt;access-group 70M-PrivateVLAN_access_in in interface 70M-PrivateVLAN&lt;/P&gt;&lt;P&gt;access-group 80M-PrivateVLAN_access_in in interface 80M-PrivateVLAN&lt;/P&gt;&lt;P&gt;access-group 90M-PrivateVLAN_access_in in interface 90M-PrivateVLAN&lt;/P&gt;&lt;P&gt;route Internet 0.0.0.0 0.0.0.0 63.x.x.x 1&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.10.0 255.255.255.0 packetfence-in&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 Internet&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynamic_outside_map 65535 set pfs&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynamic_outside_map 65535 set transform-set ESP-AES-128-SHA ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic dynamic_outside_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface Internet&lt;/P&gt;&lt;P&gt;crypto isakmp identity address&lt;/P&gt;&lt;P&gt;crypto isakmp enable Internet&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 20&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 1&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 40&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 1&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp ipsec-over-tcp port 10000&lt;/P&gt;&lt;P&gt;crypto isakmp disconnect-notify&lt;/P&gt;&lt;P&gt;no vpn-addr-assign aaa&lt;/P&gt;&lt;P&gt;no vpn-addr-assign dhcp&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 Internet&lt;/P&gt;&lt;P&gt;ssh 192.168.10.0 255.255.255.0 packetfence-in&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;console timeout 30&lt;/P&gt;&lt;P&gt;management-access packetfence-in&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.10.100-192.168.10.254 packetfence-in&lt;/P&gt;&lt;P&gt;dhcpd dns 167.x.x.x 167.x.x.x interface packetfence-in&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcprelay server 192.168.10.3 packetfence-in&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 128.x.x.x source Internet&lt;/P&gt;&lt;P&gt;ntp server 209.x.x.x source Internet prefer&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable Internet&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy remoteaccess internal&lt;/P&gt;&lt;P&gt;group-policy remoteaccess attributes&lt;/P&gt;&lt;P&gt; banner value NOTICE TO USERS&lt;/P&gt;&lt;P&gt; banner value This system is for authorized use only! Users have no explicit or implicit expectation of privacy. All uses of this system may be monitored, recorded, and may be disclosed to law enforcement for purposes of legal prosecution. By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning.&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 60&lt;/P&gt;&lt;P&gt; vpn-session-timeout 720&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt; pfs enable&lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value RemoteAccessVPN&lt;/P&gt;&lt;P&gt;group-policy InversePolicy internal&lt;/P&gt;&lt;P&gt;group-policy InversePolicy attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 5&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol svc&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value RemoteAccessVPN&lt;/P&gt;&lt;P&gt;username admin password IDQpHFcEl9mYQs8n encrypted privilege 15&lt;/P&gt;&lt;P&gt;username inverse password PQoI60tNhS.EVEoN encrypted privilege 0&lt;/P&gt;&lt;P&gt;username inverse attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy InversePolicy&lt;/P&gt;&lt;P&gt;username dino password 34BFk9MUmep0ekhh encrypted&lt;/P&gt;&lt;P&gt;username dino attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy InversePolicy&lt;/P&gt;&lt;P&gt; service-type remote-access&lt;/P&gt;&lt;P&gt;username extricom password 2HJKDN.zrbPFB.GR encrypted&lt;/P&gt;&lt;P&gt;username extricom attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy InversePolicy&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; group-lock value Inverse&lt;/P&gt;&lt;P&gt; service-type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group remoteaccess type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group remoteaccess general-attributes&lt;/P&gt;&lt;P&gt; address-pool remoteaccess&lt;/P&gt;&lt;P&gt; default-group-policy remoteaccess&lt;/P&gt;&lt;P&gt;tunnel-group remoteaccess ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group Inverse type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group Inverse general-attributes&lt;/P&gt;&lt;P&gt; address-pool remoteaccess&lt;/P&gt;&lt;P&gt; default-group-policy InversePolicy&lt;/P&gt;&lt;P&gt;tunnel-group Inverse webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias Inverse enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map tier3-police&lt;/P&gt;&lt;P&gt; match access-list tier3-police&lt;/P&gt;&lt;P&gt;class-map tier2-police&lt;/P&gt;&lt;P&gt; match access-list tier2-police&lt;/P&gt;&lt;P&gt;class-map tier1-police&lt;/P&gt;&lt;P&gt; match access-list tier1-police&lt;/P&gt;&lt;P&gt;class-map liberty-police&lt;/P&gt;&lt;P&gt; match access-list liberty-police&lt;/P&gt;&lt;P&gt;class-map tier4-police&lt;/P&gt;&lt;P&gt; match access-list tier4-police&lt;/P&gt;&lt;P&gt;class-map nyscc-police&lt;/P&gt;&lt;P&gt; match access-list nyscc_mpc&lt;/P&gt;&lt;P&gt;class-map 5M-policy&lt;/P&gt;&lt;P&gt; match access-list 5M-policy&lt;/P&gt;&lt;P&gt;class-map 10M-policy&lt;/P&gt;&lt;P&gt; match access-list 10M-policy&lt;/P&gt;&lt;P&gt;class-map 20M-policy&lt;/P&gt;&lt;P&gt; match access-list 20M-policy&lt;/P&gt;&lt;P&gt;class-map 30M-policy&lt;/P&gt;&lt;P&gt; match access-list 30M-policy&lt;/P&gt;&lt;P&gt;class-map 40M-policy&lt;/P&gt;&lt;P&gt; match access-list 40M-policy&lt;/P&gt;&lt;P&gt;class-map 50M-policy&lt;/P&gt;&lt;P&gt; match access-list 50M-policy&lt;/P&gt;&lt;P&gt;class-map 60M-policy&lt;/P&gt;&lt;P&gt; match access-list 60M-policy&lt;/P&gt;&lt;P&gt;class-map 70M-policy&lt;/P&gt;&lt;P&gt; match access-list 70M-policy&lt;/P&gt;&lt;P&gt;class-map 80M-policy&lt;/P&gt;&lt;P&gt; match access-list 80M-policy&lt;/P&gt;&lt;P&gt;class-map 90M-policy&lt;/P&gt;&lt;P&gt; match access-list 90M-policy&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map njexpo-police&lt;/P&gt;&lt;P&gt; match access-list njexpo-police&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map nyscc-policy&lt;/P&gt;&lt;P&gt; class nyscc-police&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 20000000 10000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 20000000 10000&lt;/P&gt;&lt;P&gt;policy-map liberty-police&lt;/P&gt;&lt;P&gt; class liberty-police&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 25000000 12500&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 25000000 12500&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;policy-map 5M-policy&lt;/P&gt;&lt;P&gt; class 5M-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 41943000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 41943000&lt;/P&gt;&lt;P&gt;policy-map 10M-policy&lt;/P&gt;&lt;P&gt; class 10M-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 83886000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 83886000&lt;/P&gt;&lt;P&gt;policy-map 20M-policy&lt;/P&gt;&lt;P&gt; class 20M-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 20000000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 20000000&lt;/P&gt;&lt;P&gt;policy-map 30M-policy&lt;/P&gt;&lt;P&gt; class 30M-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 30000000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 30000000&lt;/P&gt;&lt;P&gt;policy-map 40M-policy&lt;/P&gt;&lt;P&gt; class 40M-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 40000000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 40000000&lt;/P&gt;&lt;P&gt;policy-map 50M-policy&lt;/P&gt;&lt;P&gt; class 50M-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 50000000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 50000000&lt;/P&gt;&lt;P&gt;policy-map 60M-policy&lt;/P&gt;&lt;P&gt; class 60M-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 503312000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 503312000&lt;/P&gt;&lt;P&gt;policy-map 70M-policy&lt;/P&gt;&lt;P&gt; class 70M-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 587200000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 587200000&lt;/P&gt;&lt;P&gt;policy-map 80M-policy&lt;/P&gt;&lt;P&gt; class 80M-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 671088000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 671088000&lt;/P&gt;&lt;P&gt;policy-map 90M-policy&lt;/P&gt;&lt;P&gt; class 90M-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 754968000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 754968000&lt;/P&gt;&lt;P&gt;policy-map shaping-njexpo-retail&lt;/P&gt;&lt;P&gt; class njexpo-police&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 2000000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 2000000&lt;/P&gt;&lt;P&gt;policy-map shaping-tier4&lt;/P&gt;&lt;P&gt; class tier4-police&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 5000000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 5000000&lt;/P&gt;&lt;P&gt;policy-map shaping-tier1&lt;/P&gt;&lt;P&gt; class tier1-police&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 256000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 256000&lt;/P&gt;&lt;P&gt;policy-map shaping-tier3&lt;/P&gt;&lt;P&gt; class tier3-police&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 3250000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 3250000&lt;/P&gt;&lt;P&gt;policy-map shaping-tier2&lt;/P&gt;&lt;P&gt; class tier2-police&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 1500000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 1500000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;service-policy shaping-tier1 interface packetfence-prod&lt;/P&gt;&lt;P&gt;service-policy shaping-tier2 interface packetfence-tier2&lt;/P&gt;&lt;P&gt;service-policy shaping-tier3 interface packetfence-tier3&lt;/P&gt;&lt;P&gt;service-policy shaping-tier4 interface packetfence-tier4&lt;/P&gt;&lt;P&gt;service-policy shaping-njexpo-retail interface njexpo-retail&lt;/P&gt;&lt;P&gt;service-policy liberty-police interface libertySSID&lt;/P&gt;&lt;P&gt;service-policy nyscc-policy interface nyscc&lt;/P&gt;&lt;P&gt;service-policy 5M-policy interface 5M-PrivateVLAN&lt;/P&gt;&lt;P&gt;service-policy 10M-policy interface 10M-PrivateVLAN&lt;/P&gt;&lt;P&gt;service-policy 20M-policy interface 20M-PrivateVLAN&lt;/P&gt;&lt;P&gt;service-policy 30M-policy interface 30M-PrivateVLAN&lt;/P&gt;&lt;P&gt;service-policy 40M-policy interface 40M-PrivateVLAN&lt;/P&gt;&lt;P&gt;service-policy 50M-policy interface 50M-PrivateVLAN&lt;/P&gt;&lt;P&gt;service-policy 60M-policy interface 60M-PrivateVLAN&lt;/P&gt;&lt;P&gt;service-policy 70M-policy interface 70M-PrivateVLAN&lt;/P&gt;&lt;P&gt;service-policy 80M-policy interface 80M-PrivateVLAN&lt;/P&gt;&lt;P&gt;service-policy 90M-policy interface 90M-PrivateVLAN&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:5fac371d1f4b2087e9d51f5334c87dec&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 17:12:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168967#M360070</guid>
      <dc:creator>darthbishop79</dc:creator>
      <dc:date>2013-03-18T17:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between two ASA's possible?</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168968#M360072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just ran this Packet Tracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bigred(config)# packet-tracer input inside tcp 192.168.1.1 echo 192.168.9.1 ec$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.9.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 17:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168968#M360072</guid>
      <dc:creator>darthbishop79</dc:creator>
      <dc:date>2013-03-18T17:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between two ASA's possible?</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168969#M360073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the subnet that they have in common for reachability, I do not see that,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean I see them on completelety different brodcast domains,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you follow me?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 19:17:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168969#M360073</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-18T19:17:20Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between two ASA's possible?</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168970#M360074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bingo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio you are right.&amp;nbsp; I am having such an amatuer moment here, thank you for pointing this out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have now made the e0/2 interface on the 5510 192.168.1.10 and I can ping it from my laptop that is connected through the 5505.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have only one problem left and I believe its route issue.&amp;nbsp; I cannot ping the 192.168.10.x network on the 5510.&amp;nbsp; how do I advertise that subnet to the 5505 so the users can access the server on that subnet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, thank you so much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 20:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168970#M360074</guid>
      <dc:creator>darthbishop79</dc:creator>
      <dc:date>2013-03-18T20:18:20Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between two ASA's possible?</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168971#M360075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jesus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great to hear that,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why dont you create a static route there as well pointing to the 5510,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 21:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-two-asa-s-possible/m-p/2168971#M360075</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-18T21:08:17Z</dc:date>
    </item>
  </channel>
</rss>

