<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disconnected downloads through ASA5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114499#M395723</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So. Keep the external IP I used on the laptop. Connect it to the inside interface. Flush the DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would the one to one translation be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 1.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I were using 1.1.1.1 on that laptop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will also try the backup T1 by routing my traffic to that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Jay Wright&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Nov 2012 04:39:24 GMT</pubDate>
    <dc:creator>Cybervex3</dc:creator>
    <dc:date>2012-11-13T04:39:24Z</dc:date>
    <item>
      <title>Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114488#M395705</link>
      <description>&lt;P&gt;Running into a bit of a problem.&amp;nbsp; Anytime I try to download a large file through our 5510 the download fails at different points.&amp;nbsp; Cannot download via a download manger at all.&amp;nbsp; I see nothing in the logs which are set to infomational.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can connect my laptop to our internet connection outside the firewall and HTTP and download manager downloads connect and finish just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone point me in the right direction before I go through and scrub my config for posting?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114488#M395705</guid>
      <dc:creator>Cybervex3</dc:creator>
      <dc:date>2019-03-12T00:22:17Z</dc:date>
    </item>
    <item>
      <title>Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114489#M395706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you see any logs when the connection fails? &lt;/P&gt;&lt;P&gt;Does the large downloads only affect HTTP traffic?&lt;/P&gt;&lt;P&gt;Can you try FTP traffic? &lt;/P&gt;&lt;P&gt;Do you have any logs on the Service policy? &lt;/P&gt;&lt;P&gt;Do you have HTTP inspection turned on? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Rojas &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 03:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114489#M395706</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-11-13T03:11:40Z</dc:date>
    </item>
    <item>
      <title>Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114490#M395708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see no logs other than the normal build and teardowns.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to affect http and https. I have another user that complains of disconnects while connected to a client using an open source SSL VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try a large FTP shortly.&amp;nbsp; I have had no complaints of FTP disconnects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not added any logs since I inherited this device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not have inspection turned on for http or https.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 03:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114490#M395708</guid>
      <dc:creator>Cybervex3</dc:creator>
      <dc:date>2012-11-13T03:32:47Z</dc:date>
    </item>
    <item>
      <title>Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114491#M395711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well this is going to take a bit of deep troubleshooting then. We may need to check captures, MSS settings, MTU settings, try to bypassing TCP inspection and last but not least set the MSS allow just in case. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do they all stop at the same percentage? Are there any filtering services? WCCP, URL filter, Proxy and so on? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 03:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114491#M395711</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-11-13T03:41:32Z</dc:date>
    </item>
    <item>
      <title>Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114492#M395713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The disconnects are very random.&amp;nbsp; Happens mostly during the day.&amp;nbsp; I was trying to download from Symantec today and it stopped at 220mb, 146mb, 25mb, 300mb.&amp;nbsp; I just VPN'd in to work and RDP'd to my laptop and was able to download the same file.&amp;nbsp; It is not just Symantec. I have noticed with MS and external users sending large files to our HTTPS file transfer service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have no URL filters or proxies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which are the least disruptive things I can try first?&amp;nbsp; I will start cleaning up my config for posting.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 03:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114492#M395713</guid>
      <dc:creator>Cybervex3</dc:creator>
      <dc:date>2012-11-13T03:54:16Z</dc:date>
    </item>
    <item>
      <title>Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114493#M395714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nothing really, but we have issues with Microsoft downloads, can you try something like downloading an OS image (Ubuntu or something). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, do you have any servers on another interface that can host files on HTTP so you can upload them there and try to access is right from the next interface instead of going to the cloud (just to rule out ISP issues).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 04:07:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114493#M395714</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-11-13T04:07:44Z</dc:date>
    </item>
    <item>
      <title>Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114494#M395715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is my current config.&amp;nbsp; If you notice anything else while looking it over feel free to tell me we're doing it wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)11 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name company.local&lt;/P&gt;&lt;P&gt;enable password ***** encrypted&lt;/P&gt;&lt;P&gt;passwd **** encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 1.1.1.107 Sonoma description OLD MAIL SERVER&lt;/P&gt;&lt;P&gt;name 2.2.2.19 SonomaBullsEye description OLD MAIL SERVER&lt;/P&gt;&lt;P&gt;name 10.10.2.6 DAYTONA-INT&lt;/P&gt;&lt;P&gt;name 10.10.2.62 SEBRING-INT&lt;/P&gt;&lt;P&gt;name 10.10.2.4 AUTHENTICA-INT&lt;/P&gt;&lt;P&gt;name 10.10.2.11 MIDOHIO-INT&lt;/P&gt;&lt;P&gt;name 10.10.2.15 PMEUPDATE-INT&lt;/P&gt;&lt;P&gt;name 10.10.2.25 FILETRANSFER-INT&lt;/P&gt;&lt;P&gt;name 10.10.2.22 FTP-INT&lt;/P&gt;&lt;P&gt;name 10.10.2.1 HOMESTEAD-INT&lt;/P&gt;&lt;P&gt;name 1.1.1.102 DAYTONA-EXT-OUT description CAS Server&lt;/P&gt;&lt;P&gt;name 1.1.1.109 FILETRANSFER-EXT-OUT description Secure File Transfer&lt;/P&gt;&lt;P&gt;name 1.1.1.105 FTP-EXT-OUT description FTPS&lt;/P&gt;&lt;P&gt;name 1.1.1.103 AUTHENTICA-EXT-OUT description Secure PDF&lt;/P&gt;&lt;P&gt;name 1.1.1.106 OSCODA-EXT-OUT description SQL Testing&lt;/P&gt;&lt;P&gt;name 1.1.1.104 ALEXSYS123-EXT-OUT description MidOhio&lt;/P&gt;&lt;P&gt;name 1.1.1.108 PMEUPDATE-EXT-OUT description NC Update server&lt;/P&gt;&lt;P&gt;name 2.2.2.21 FILETRANSFER-EXT-BAK&lt;/P&gt;&lt;P&gt;name 2.2.2.133 DAYTONA-EXT-BAK&lt;/P&gt;&lt;P&gt;name 2.2.2.134 AUTHENTICA-EXT-BAK&lt;/P&gt;&lt;P&gt;name 2.2.2.18 ALEXSYS-EXT-BAK description MIS&lt;/P&gt;&lt;P&gt;name 1.1.1.110 CRASHPLAN-EXT-OUT description CrashPlan backup server&lt;/P&gt;&lt;P&gt;name 68.68.68.17 CORVID-WC&lt;/P&gt;&lt;P&gt;name 12.12.12.2 KINCEY-NC&lt;/P&gt;&lt;P&gt;name 10.10.2.34 CRASHPLAN-INT&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif backup&lt;/P&gt;&lt;P&gt; security-level 1&lt;/P&gt;&lt;P&gt; ip address 2.2.2.131 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.1.1 255.255.0.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif outside2&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.1.1.98 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.17.0.199 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner motd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; **************************** NOTICE ******************************&lt;/P&gt;&lt;P&gt;banner motd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp; Unauthorized access to this network device is FORBIDDEN!&amp;nbsp;&amp;nbsp;&amp;nbsp; *&lt;/P&gt;&lt;P&gt;banner motd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp; All connection attempts and sessions are logged and AUDITED!&amp;nbsp; *&lt;/P&gt;&lt;P&gt;banner motd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ******************************************************************&lt;/P&gt;&lt;P&gt;banner motd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; **************************** NOTICE ******************************&lt;/P&gt;&lt;P&gt;banner motd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp; Unauthorized access to this network device is FORBIDDEN!&amp;nbsp;&amp;nbsp;&amp;nbsp; *&lt;/P&gt;&lt;P&gt;banner motd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp; All connection attempts and sessions are logged and AUDITED!&amp;nbsp; *&lt;/P&gt;&lt;P&gt;banner motd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ******************************************************************&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-11-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup outside2&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns domain-lookup management&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server HOMESTEAD-INT&lt;/P&gt;&lt;P&gt; name-server SEBRING-INT&lt;/P&gt;&lt;P&gt; domain-name pme.local&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group service SQLTEST udp&lt;/P&gt;&lt;P&gt; description SQLTEST for VES&lt;/P&gt;&lt;P&gt; port-object eq 1434&lt;/P&gt;&lt;P&gt;object-group service SQLTEST_TCP tcp&lt;/P&gt;&lt;P&gt; description SQLTEST For VES&lt;/P&gt;&lt;P&gt; port-object eq 1433&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq ftp-data&lt;/P&gt;&lt;P&gt;object-group service crashplan-4282 tcp&lt;/P&gt;&lt;P&gt; port-object eq 4282&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 10.10.11.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.10.0.0 255.255.0.0 10.10.11.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.10.0.0 255.255.0.0 192.168.101.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.10.0.0 255.255.0.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.10.0.0 255.255.0.0 10.100.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.100.0.0 255.255.0.0 10.10.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 1.1.1.98 10.100.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.10.0.0 255.255.0.0 10.20.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.20.0.0 255.255.0.0 10.10.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 10.20.11.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.10.0.0 255.255.0.0 10.21.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.21.0.0 255.255.0.0 10.10.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host DAYTONA-EXT-BAK eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host DAYTONA-EXT-BAK eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host DAYTONA-EXT-BAK eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host SonomaBullsEye eq https inactive &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host AUTHENTICA-EXT-BAK eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host AUTHENTICA-EXT-BAK eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any host 2.2.2.20 eq 1434 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 2.2.2.20 eq 1433 inactive &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host FILETRANSFER-EXT-BAK eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host FILETRANSFER-EXT-BAK eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark HTTP for TeamWeb&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host ALEXSYS-EXT-BAK eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark HTTPS for TeamWeb&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host ALEXSYS-EXT-BAK eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp host 10.100.0.1 any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny icmp any any &lt;/P&gt;&lt;P&gt;access-list Split_Tunnel_List standard permit 10.10.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list Split_Tunnel_List standard permit 192.168.101.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Split_Tunnel_List standard permit 10.20.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list Split_Tunnel_List standard permit 10.100.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host DAYTONA-EXT-OUT eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host DAYTONA-EXT-OUT eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host DAYTONA-EXT-OUT eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host Sonoma eq https inactive &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host PMEUPDATE-EXT-OUT eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host FILETRANSFER-EXT-OUT eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host FILETRANSFER-EXT-OUT eq ssh inactive &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host FILETRANSFER-EXT-OUT eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 remark FTPS&lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host FTP-EXT-OUT object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host FTP-EXT-OUT range 60200 60400 &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host AUTHENTICA-EXT-OUT eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host AUTHENTICA-EXT-OUT eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host OSCODA-EXT-OUT object-group SQLTEST_TCP inactive &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit udp any host OSCODA-EXT-OUT object-group SQLTEST inactive &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host ALEXSYS123-EXT-OUT eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host ALEXSYS123-EXT-OUT eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host CRASHPLAN-EXT-OUT object-group crashplan-4282 &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended deny icmp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any log &lt;/P&gt;&lt;P&gt;access-list CORVID-WC_CRYPTO extended permit ip 10.10.0.0 255.255.0.0 10.100.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list CORVID-WC_CRYPTO extended permit ip 10.100.0.0 255.255.0.0 10.10.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list KINCEY_CRYPTO extended permit ip 10.10.0.0 255.255.0.0 10.20.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list KINCEY_CRYPTO extended permit ip 10.20.0.0 255.255.0.0 10.10.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list KINCEY_CRYPTO extended permit ip 10.10.0.0 255.255.0.0 10.21.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list KINCEY_CRYPTO extended permit ip 10.21.0.0 255.255.0.0 10.10.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging asdm-buffer-size 512&lt;/P&gt;&lt;P&gt;logging trap informational&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging from-address asa@**COMPANY**.com&lt;/P&gt;&lt;P&gt;logging recipient-address jwright@**COMPANY**.com level errors&lt;/P&gt;&lt;P&gt;logging host inside 10.10.2.12&lt;/P&gt;&lt;P&gt;logging permit-hostdown&lt;/P&gt;&lt;P&gt;no logging message 302015&lt;/P&gt;&lt;P&gt;no logging message 302014&lt;/P&gt;&lt;P&gt;no logging message 302013&lt;/P&gt;&lt;P&gt;no logging message 302012&lt;/P&gt;&lt;P&gt;no logging message 302017&lt;/P&gt;&lt;P&gt;no logging message 302016&lt;/P&gt;&lt;P&gt;mtu backup 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside2 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool IPSECVPN2 10.10.11.76-10.10.11.100&lt;/P&gt;&lt;P&gt;ip local pool SSLVPN 10.10.11.101-10.10.11.200 mask 255.255.0.0&lt;/P&gt;&lt;P&gt;ip local pool IPSECVPN 10.10.11.25-10.10.11.75&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-623.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (backup) 1 2.2.2.132&lt;/P&gt;&lt;P&gt;global (outside) 1 1.1.1.99 netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.10.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) DAYTONA-EXT-OUT DAYTONA-INT netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) AUTHENTICA-EXT-OUT AUTHENTICA-INT netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) ALEXSYS123-EXT-OUT MIDOHIO-INT netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) PMEUPDATE-EXT-OUT PMEUPDATE-INT netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) FILETRANSFER-EXT-OUT FILETRANSFER-INT netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) FTP-EXT-OUT FTP-INT netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,backup) FILETRANSFER-EXT-BAK FILETRANSFER-INT netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,backup) DAYTONA-EXT-BAK DAYTONA-INT netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,backup) AUTHENTICA-EXT-BAK AUTHENTICA-INT netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,backup) ALEXSYS-EXT-BAK MIDOHIO-INT netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) CRASHPLAN-EXT-OUT CRASHPLAN-INT netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface backup&lt;/P&gt;&lt;P&gt;access-group inside_access_out in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in_1 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.97 1 track 1&lt;/P&gt;&lt;P&gt;route backup 0.0.0.0 0.0.0.0 2.2.2.129 254&lt;/P&gt;&lt;P&gt;route backup 62.109.192.0 255.255.240.0 2.2.2.129 1&lt;/P&gt;&lt;P&gt;route backup 64.68.96.0 255.255.224.0 2.2.2.129 1&lt;/P&gt;&lt;P&gt;route backup 66.114.160.0 255.255.240.0 2.2.2.129 1&lt;/P&gt;&lt;P&gt;route backup 66.163.32.0 255.255.240.0 2.2.2.129 1&lt;/P&gt;&lt;P&gt;route backup 209.197.192.0 255.255.224.0 2.2.2.129 1&lt;/P&gt;&lt;P&gt;route backup 210.4.192.0 255.255.240.0 2.2.2.129 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 24:00:00 half-closed 0:05:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; http-proxy enable&lt;/P&gt;&lt;P&gt;aaa-server PMERADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server PMERADIUS (inside) host HOMESTEAD-INT&lt;/P&gt;&lt;P&gt; key ******&lt;/P&gt;&lt;P&gt; radius-common-pw ******&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.10.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;http 172.17.0.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http redirect backup 80&lt;/P&gt;&lt;P&gt;http redirect outside 80&lt;/P&gt;&lt;P&gt;snmp-server location Server Room&lt;/P&gt;&lt;P&gt;snmp-server contact Jay Wright&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sla monitor 100&lt;/P&gt;&lt;P&gt; type echo protocol ipIcmpEcho 216.216.216.216 interface outside&lt;/P&gt;&lt;P&gt; timeout 3000&lt;/P&gt;&lt;P&gt; frequency 10&lt;/P&gt;&lt;P&gt;sla monitor schedule 100 life forever start-time now&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set PM1 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set 50 esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto ipsec df-bit clear-df outside&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn1 1 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn1 1 set transform-set PM1&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn1 1 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn1 1 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn1 1 set reverse-route&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map cryptomap1 1 ipsec-isakmp dynamic dyn1&lt;/P&gt;&lt;P&gt;crypto map cryptomap1 interface backup&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 match address KINCEY_CRYPTO&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set peer KINCEY-NC &lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set transform-set PM1&lt;/P&gt;&lt;P&gt;crypto map outside_map 30 match address CORVID-WC_CRYPTO&lt;/P&gt;&lt;P&gt;crypto map outside_map 30 set peer CORVID-WC &lt;/P&gt;&lt;P&gt;crypto map outside_map 30 set transform-set PM1&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ca trustpoint vpn.**COMPANY**.com&lt;/P&gt;&lt;P&gt; enrollment terminal&lt;/P&gt;&lt;P&gt; fqdn vpn.**COMPANY**.com&lt;/P&gt;&lt;P&gt; subject-name CN=vpn.**COMPANY**.com, O=Pratt &amp;amp; Miller Engineering, C=US, St=MI, L=New Hudson&lt;/P&gt;&lt;P&gt; keypair vpn.**COMPANY**.com&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca certificate chain vpn.**COMPANY**.com&lt;/P&gt;&lt;P&gt; certificate ca 0301&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308204de 308203c6 a0030201 02020203 01300d06 092a8648 86f70d01 01050500 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; *********** &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 776eebf2 8550985e ab0353ad 9123631f 169ccdb9 b205633a e1f4681b 17053595 53ee&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt; certificate 041200616c79f4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30820577 3082045f a0030201 02020704 1200616c 79f4300d 06092a86 4886f70d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; *********** &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5c940b2a 0083979e aad3794a 040d54bc ef874aa1 9a12944f b4aeef&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable backup&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal 33&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 1 rtr 100 reachability&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 64.22.86.210 source backup prefer&lt;/P&gt;&lt;P&gt;ssl trust-point vpn.**COMPANY**.com outside2&lt;/P&gt;&lt;P&gt;ssl trust-point vpn.**COMPANY**.com backup&lt;/P&gt;&lt;P&gt;ssl trust-point vpn.**COMPANY**.com outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable backup&lt;/P&gt;&lt;P&gt; enable outside2&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-win-2.5.3055-k9.pkg 2&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-win-2.5.2014-k9.pkg 3&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-macosx-i386-2.5.6005-k9.pkg 4&lt;/P&gt;&lt;P&gt; svc profiles AllowRemoteUsers disk0:/AnyConnectProfile20121003.xml&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; internal-password enable&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup attributes&lt;/P&gt;&lt;P&gt; dns-server value 10.10.2.1&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;/P&gt;&lt;P&gt; default-domain none&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; dns-server value 10.10.2.1 10.10.2.62&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 600&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Split_Tunnel_List&lt;/P&gt;&lt;P&gt; default-domain value pme.local&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-list value Book1&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc profiles value AllowRemoteUsers&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc ask enable default webvpn timeout 10&lt;/P&gt;&lt;P&gt;group-policy AnyConnect internal&lt;/P&gt;&lt;P&gt;group-policy AnyConnect attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol webvpn&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc ask enable default webvpn timeout 15&lt;/P&gt;&lt;P&gt;username **** password **** encrypted privilege 15&lt;/P&gt;&lt;P&gt;username **** password **** encrypted privilege 15&lt;/P&gt;&lt;P&gt;username **** password **** encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy DefaultRAGroup&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;/P&gt;&lt;P&gt; authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool (backup) IPSECVPN2&lt;/P&gt;&lt;P&gt; address-pool (outside2) IPSECVPN2&lt;/P&gt;&lt;P&gt; address-pool (outside) SSLVPN&lt;/P&gt;&lt;P&gt; address-pool SSLVPN&lt;/P&gt;&lt;P&gt; authentication-server-group PMERADIUS&lt;/P&gt;&lt;P&gt;tunnel-group pm_ipsec type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group pm_ipsec general-attributes&lt;/P&gt;&lt;P&gt; address-pool IPSECVPN2&lt;/P&gt;&lt;P&gt;tunnel-group pm_ipsec ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group **COMPANY** type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group **COMPANY** general-attributes&lt;/P&gt;&lt;P&gt; address-pool IPSECVPN&lt;/P&gt;&lt;P&gt;tunnel-group **COMPANY** ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 2.2.2.20 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 2.2.2.20 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 68.68.68.68 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 68.68.68.68 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 12.12.12.12 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 12.12.12.12 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 1024&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;smtp-server 10.10.2.6&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:07619858a9af4b27c5f4104bc3c95018&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 04:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114494#M395715</guid>
      <dc:creator>Cybervex3</dc:creator>
      <dc:date>2012-11-13T04:08:04Z</dc:date>
    </item>
    <item>
      <title>Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114495#M395717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have Backup ISP, have you tried to rollover to the Other one and see if the issue persist? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Rojas &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 04:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114495#M395717</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-11-13T04:12:27Z</dc:date>
    </item>
    <item>
      <title>Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114496#M395718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am able to give my laptop an external IP and connect between the ISP and the ASA and download without interuption.&amp;nbsp; Our connection is WiMax so that was my first thought.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 04:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114496#M395718</guid>
      <dc:creator>Cybervex3</dc:creator>
      <dc:date>2012-11-13T04:12:42Z</dc:date>
    </item>
    <item>
      <title>Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114497#M395720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have not only because I can connect outside our firewall and download without issue.&amp;nbsp; Also because it is only a T1 and most of our services do not fail over.&amp;nbsp; It just allows for email/webmail and internet access.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 04:18:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114497#M395720</guid>
      <dc:creator>Cybervex3</dc:creator>
      <dc:date>2012-11-13T04:18:10Z</dc:date>
    </item>
    <item>
      <title>Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114498#M395722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To make that a valid test, grab that IP and the laptop, connect it on the inside, set a one to one translation and do the same download and see if it fails. (Make sure to clear the local host of the laptop)&amp;nbsp; &lt;/P&gt;&lt;P&gt;Let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 04:19:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114498#M395722</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-11-13T04:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114499#M395723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So. Keep the external IP I used on the laptop. Connect it to the inside interface. Flush the DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would the one to one translation be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 1.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I were using 1.1.1.1 on that laptop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will also try the backup T1 by routing my traffic to that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Jay Wright&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 04:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114499#M395723</guid>
      <dc:creator>Cybervex3</dc:creator>
      <dc:date>2012-11-13T04:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: Disconnected downloads through ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114500#M395724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 13:50:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disconnected-downloads-through-asa5510/m-p/2114500#M395724</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-11-13T13:50:03Z</dc:date>
    </item>
  </channel>
</rss>

