<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Asymmetric NAT rules matched for forwarda and reverse flows in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001423#M401444</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6a67a17c64c04a5fd203b16373961691f78c48ab_Ramraj:0"&gt;Ramraj&lt;/SPAN&gt;,&lt;/P&gt;&lt;P&gt;Thanks much for the link.&amp;nbsp; My issue is with servers internal to my network, BOTH being on the inside network. The switch config is just fine, so I do not understand why the error message is showing up in the firewall.&amp;nbsp; This is the same config I have on many other switches and the internal systems are having no issues talking to each other.&amp;nbsp; Just not certain why these NAT errors are showing up on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for &lt;SPAN class="GRspelling"&gt;tcp&lt;/SPAN&gt; &lt;SPAN class="GRspelling"&gt;src&lt;/SPAN&gt;&lt;STRONG&gt; inside&lt;/STRONG&gt;:10.1.0.8/1798 &lt;SPAN class="GRspelling"&gt;dst&lt;/SPAN&gt; &lt;STRONG&gt;inside&lt;/STRONG&gt;:10.1.0.14/25 denied due to NAT reverse path failure&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 31 Jul 2012 14:11:48 GMT</pubDate>
    <dc:creator>kerryjcox</dc:creator>
    <dc:date>2012-07-31T14:11:48Z</dc:date>
    <item>
      <title>Asymmetric NAT rules matched for forwarda and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001417#M401438</link>
      <description>&lt;P&gt;I am seeing the following error on my Cisco ASA 5510 running 8.4&lt;SPAN class="GRcorrect" id="GRmark_18833c6e0a9bb77f78bc09cc75ddfcd5581b2ee1_(:0"&gt;(&lt;/SPAN&gt;4):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;SPAN class="GRcorrect" id="GRmark_4c3faf098ef362053ee069aa6151020d119b838e_Asymmetric:0"&gt;Asymmetric&lt;/SPAN&gt; NAT rules matched for forward and reverse flows; Connection for &lt;SPAN class="GRcorrect" id="GRmark_4c3faf098ef362053ee069aa6151020d119b838e_tcp:1"&gt;tcp&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_4c3faf098ef362053ee069aa6151020d119b838e_src:2"&gt;src&lt;/SPAN&gt; inside&lt;SPAN class="GRcorrect" id="GRmark_4c3faf098ef362053ee069aa6151020d119b838e_::3"&gt;:&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_4c3faf098ef362053ee069aa6151020d119b838e_10.1.0.8:4"&gt;10.1.0.8&lt;/SPAN&gt;/1798 &lt;SPAN class="GRcorrect" id="GRmark_4c3faf098ef362053ee069aa6151020d119b838e_dst:5"&gt;dst&lt;/SPAN&gt; inside&lt;SPAN class="GRcorrect" id="GRmark_4c3faf098ef362053ee069aa6151020d119b838e_::6"&gt;:&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_4c3faf098ef362053ee069aa6151020d119b838e_10.1.0.14:7"&gt;10.1.0.14&lt;/SPAN&gt;/25 denied due to NAT reverse path failure&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doing research I see there are plenty of &lt;SPAN class="GRcorrect" id="GRmark_e5b3d194eceb429f9098fd2524a6dc7e8a10d65d_nonat:0"&gt;nonat&lt;/SPAN&gt; statements regarding connecting from one interface to another, but why am I seeing this error on the same interface.&lt;/P&gt;&lt;P&gt;All our servers are connected via a Cisco 3750G switch with a very basic config.&amp;nbsp; Why is the firewall interjecting itself and causing these issues?&lt;/P&gt;&lt;P&gt;Any suggestions would be most appreciated.&lt;/P&gt;&lt;P&gt;Kerry&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001417#M401438</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2019-03-11T23:36:18Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forwarda and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001418#M401439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;subnet mask mismatch?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 22:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001418#M401439</guid>
      <dc:creator>Vincenzo Errante</dc:creator>
      <dc:date>2012-07-30T22:44:21Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forwarda and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001419#M401440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No subnet mask mismatch, as far as I can tell.&lt;/P&gt;&lt;P&gt;Here is the "&lt;SPAN class="GRcorrect" id="GRmark_4435515a04e7c73a5ae0882811385dc6ac3a0d34_sho:0"&gt;sho&lt;/SPAN&gt; run":&amp;nbsp; I have sanitized it as best I can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# &lt;SPAN class="GRcorrect" id="GRmark_5dd59ab06e71233e8d60e470cbdb5f041c764fad_sho:0"&gt;sho&lt;/SPAN&gt; run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4&lt;SPAN class="GRcorrect" id="GRmark_b11dc893c84c15e092e79c4a292a0b0d410f73bd_(:0"&gt;(&lt;/SPAN&gt;4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_97ea8e3fe3b0b8419a055b5430212b20f9b0fa09_hostname:0"&gt;hostname&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_97ea8e3fe3b0b8419a055b5430212b20f9b0fa09_ciscoasa:1"&gt;ciscoasa&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a10db3ebe9487e641d24cbc26a7baf5b31a35308_domain:0"&gt;domain&lt;/SPAN&gt;-name xxxxxx.com&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e6d622e045da477d06f3503811154dd81bd2dd8f_enable:0"&gt;enable&lt;/SPAN&gt; password Gy7ZIY.vaWRxxxxx encrypted&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_393c349b35a84bd54a43fc0f8942b540128eae01_passwd:0"&gt;passwd&lt;/SPAN&gt; 2KFQnbNIdI&lt;SPAN class="GRcorrect" id="GRmark_393c349b35a84bd54a43fc0f8942b540128eae01_.:1"&gt;.&lt;/SPAN&gt;xxxxxx encrypted&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_237a4713b1838c73332635ad4fccc63a5ef2a397_names:0"&gt;names&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_3ce5027a56f2396c18106c6c668adcb07da0975e_interface:0"&gt;interface&lt;/SPAN&gt; Ethernet0/0&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_c5262a68d699b6ac4451822d0d720a4d43d18e1c_description:0"&gt;description&lt;/SPAN&gt; === WAN Interface ===&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_76d9a1ba64d5fc77096ce00cb46dfab6d8987e5a_speed:0"&gt;speed&lt;/SPAN&gt; 100&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_83157e3d4c09a10dde0186552e674cef17032d88_duplex:0"&gt;duplex&lt;/SPAN&gt; full&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_257bc222874ae1089453964a06ddf36562a52fc0_nameif:0"&gt;nameif&lt;/SPAN&gt; outside&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_7b99d8794a9ac41b79c9710a62b2881e311058b5_security:0"&gt;security&lt;/SPAN&gt;-level 0&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_d70990fa4ca59ed2069b35351d43755eda14bf52_ip:0"&gt;ip&lt;/SPAN&gt; address 216.38&lt;SPAN class="GRcorrect" id="GRmark_d70990fa4ca59ed2069b35351d43755eda14bf52_.:1"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_d70990fa4ca59ed2069b35351d43755eda14bf52_.:2"&gt;.&lt;/SPAN&gt;xx 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_06119e7851846f862159f22b6a08d35cf4ede953_interface:0"&gt;interface&lt;/SPAN&gt; Ethernet0/1&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_b828eade1a020bf40793c2fb56fc3041dac7ee75_description:0"&gt;description&lt;/SPAN&gt; === LAN Interface ===&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_14d37f9312fcaebdfcde37f44a25bc2b2cf54d40_nameif:0"&gt;nameif&lt;/SPAN&gt; inside&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_3b30e64a7c2e30eedcd8e097bd0381b2a1606105_security:0"&gt;security&lt;/SPAN&gt;-level 100&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_41244f713036a30da44864561a20c8050553d807_ip:0"&gt;ip&lt;/SPAN&gt; address 10.1.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7e9c4dad560aa4edac00410b544edca932ba1e87_interface:0"&gt;interface&lt;/SPAN&gt; Ethernet0/2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_d0c9d278e00c705d13cd230deaf6e3620212f09d_description:0"&gt;description&lt;/SPAN&gt; === PNT to SLC ViaWest ===&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_27055a6c244c3ccb3b6d6ff51e40a03544afc65d_speed:0"&gt;speed&lt;/SPAN&gt; 10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_83157e3d4c09a10dde0186552e674cef17032d88_duplex:0"&gt;duplex&lt;/SPAN&gt; full&amp;nbsp; &lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_0ed96e8e8e3e3302941249ba9651fe3265522cda_nameif:0"&gt;nameif&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_0ed96e8e8e3e3302941249ba9651fe3265522cda_pnt:1"&gt;pnt&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_3b30e64a7c2e30eedcd8e097bd0381b2a1606105_security:0"&gt;security&lt;/SPAN&gt;-level 100&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_6736d22cf1725aecde79caae76a5b0c61ea3cbcc_ip:0"&gt;ip&lt;/SPAN&gt; address 10.169&lt;SPAN class="GRcorrect" id="GRmark_6736d22cf1725aecde79caae76a5b0c61ea3cbcc_.:1"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_6736d22cf1725aecde79caae76a5b0c61ea3cbcc_.:2"&gt;.&lt;/SPAN&gt;xx 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_8b9740a089e577913027f5c7b70a6ff30760f487_interface:0"&gt;interface&lt;/SPAN&gt; Ethernet0/3&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_53669f193b2174641c72654b5c3e5b67950334ae_shutdown:0"&gt;shutdown&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_6ee2372937a0b81048935105b15e2944c25f9939_no:0"&gt;no&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_6ee2372937a0b81048935105b15e2944c25f9939_nameif:1"&gt;nameif&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_047a722fd28275bf994266e41c79fda77114ceb0_no:0"&gt;no&lt;/SPAN&gt; security-level&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_bc3e616f8176b79d31e1868ff5f630908bd7ef3f_no:0"&gt;no&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_bc3e616f8176b79d31e1868ff5f630908bd7ef3f_ip:1"&gt;ip&lt;/SPAN&gt; address&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_188a6b27fec89a157c6f3dbf5ffbd3279faf5709_interface:0"&gt;interface&lt;/SPAN&gt; Management0/0&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_dc7e91bfbb607fc8bc321e77050899e2bcf993a7_description:0"&gt;description&lt;/SPAN&gt; === Management Interface ===&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_dd1a881db7e36233f76bfab6e5ca354764de3deb_nameif:0"&gt;nameif&lt;/SPAN&gt; management&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_3b30e64a7c2e30eedcd8e097bd0381b2a1606105_security:0"&gt;security&lt;/SPAN&gt;-level 100&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f569671ffc01c65b68cdfedec3d06516e202d40c_ip:0"&gt;ip&lt;/SPAN&gt; address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5b92c14c2051d44dd5f9ad45c0b4eb3230134f94_boot:0"&gt;boot&lt;/SPAN&gt; system disk0&lt;SPAN class="GRcorrect" id="GRmark_5b92c14c2051d44dd5f9ad45c0b4eb3230134f94_::1"&gt;:&lt;/SPAN&gt;/asa844-k8&lt;SPAN class="GRcorrect" id="GRmark_5b92c14c2051d44dd5f9ad45c0b4eb3230134f94_.:2"&gt;.&lt;/SPAN&gt;bin&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_77445ecb8e59eaa5f9c60cb9f49b2d34f46d6736_ftp:0"&gt;ftp&lt;/SPAN&gt; mode passive&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0e5d62fbf3b8072006ba3513c6108f9b45519abd_clock:0"&gt;clock&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_0e5d62fbf3b8072006ba3513c6108f9b45519abd_timezone:1"&gt;timezone&lt;/SPAN&gt; MST -7&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c0be4b088b790b6f33a57fa2c427172d705fb836_clock:0"&gt;clock&lt;/SPAN&gt; summer-time MDT &lt;SPAN class="GRcorrect" id="GRmark_c0be4b088b790b6f33a57fa2c427172d705fb836_recurring:1"&gt;recurring&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_92b6ac006685972463954ad21194f2acec57965e_dns:0"&gt;dns&lt;/SPAN&gt; domain-lookup outside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a80cf0fc5017d696d2cc7d50b44fe0e2b7b73f62_dns:0"&gt;dns&lt;/SPAN&gt; domain-lookup inside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_459264de40a9bbf6dc9226152f3e9c0e17c8f006_dns:0"&gt;dns&lt;/SPAN&gt; domain-lookup management&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_b01fbe2d106433b47417548ace0664fafe37864d_dns:0"&gt;dns&lt;/SPAN&gt; server-group DefaultDNS&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_d7877abed8c9d448a04044664b646e0587eef49c_name:0"&gt;name&lt;/SPAN&gt;-server 10.1.0.5&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_04da78fbfa6df0af860642cbf42dbb85493252e0_name:0"&gt;name&lt;/SPAN&gt;-server 10.1.1.16&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_68bf86cabee5078a033b957212346a7ea94a88c7_name:0"&gt;name&lt;/SPAN&gt;-server 8.8.8.8&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_6d8005c76b60231a94b16eb21f632c3699ef8081_domain:0"&gt;domain&lt;/SPAN&gt;-name xxxxxxxx.com&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_22360066e842ef47ba81a88f78023357c83fa090_same:0"&gt;same&lt;/SPAN&gt;-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a5b9d9debbac6ae4e75e6e00352be9513979ba7f_same:0"&gt;same&lt;/SPAN&gt;-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_9192321156a5bd768decf043f74dd881164ddedd_object:0"&gt;object&lt;/SPAN&gt; network 10.1.0.2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_b7d16578f005ff0f808ec7fc151d6058219d18fe_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.2&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_fa0159feb6c4a878df5ec57b17d18c634f398609_object:0"&gt;object&lt;/SPAN&gt; network 10.1.0.22&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_ecfb455a16b87a22b5ded0997e4e044b45a21522_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.22&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0cba15530fe357ec3a0c39fafe8b0fe0e2f3d0a9_object:0"&gt;object&lt;/SPAN&gt; network 10.1.0.41&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_7a0e65bdb344634f6b5eb862c20b163d8c5f8c50_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.41&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_3843b4f45cf92c046ac53c825e6a4bf0c8dc7e69_object:0"&gt;object&lt;/SPAN&gt; network 10.1.0.86&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_c51bb79776e6cc4e0f18c43e8c4c22886561e5f5_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.86&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_bb89580ed2e83bde780b5e1427396070d2052f82_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_bb89580ed2e83bde780b5e1427396070d2052f82_bonecrusher:1"&gt;bonecrusher&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_bb89580ed2e83bde780b5e1427396070d2052f82_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_bb89580ed2e83bde780b5e1427396070d2052f82_.:3"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f3d2983e8e49944f041d7b12913947f6439b0d21_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.12&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5b49cbea29087b2149cf461c976f6b77d7ef270f_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_5b49cbea29087b2149cf461c976f6b77d7ef270f_bonecrusher:1"&gt;bonecrusher&lt;/SPAN&gt; internal ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6f2a38546a20f5d71ad9a40b5584182ffddfb230_object:0"&gt;object&lt;/SPAN&gt; network ccpwjb4bak001&lt;SPAN class="GRcorrect" id="GRmark_6f2a38546a20f5d71ad9a40b5584182ffddfb230_.:1"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_6f2a38546a20f5d71ad9a40b5584182ffddfb230_.:2"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_40fa23d2316c67222d4b68eccbfd443e1962f02e_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.40&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_332c7b5bbd6d76477bbaa048642b6581db0554af_object:0"&gt;object&lt;/SPAN&gt; network ccpwjb4bi001&lt;SPAN class="GRcorrect" id="GRmark_332c7b5bbd6d76477bbaa048642b6581db0554af_.:1"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_332c7b5bbd6d76477bbaa048642b6581db0554af_.:2"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_1d42cd63c53499593de8b0311c9b1e9910f43b50_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.8&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_d00f3adee57c5f7f0a672310191badd36c74648e_description:0"&gt;description&lt;/SPAN&gt; == ccpwjb4bi001 internal ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_4e9f042f3d37401dbfc8335c0783617598f12139_object:0"&gt;object&lt;/SPAN&gt; network ccpwjb4db001&lt;SPAN class="GRcorrect" id="GRmark_4e9f042f3d37401dbfc8335c0783617598f12139_.:1"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_4e9f042f3d37401dbfc8335c0783617598f12139_.:2"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_b37597e28def313f0485b9146fcb4ce3571b72dc_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.10&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_063b264f8bfd11ee314f505aa3445f7e14cb1f32_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_063b264f8bfd11ee314f505aa3445f7e14cb1f32_bi:1"&gt;bi&lt;/SPAN&gt; database internal ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a2692badbe85ad3ec3d0d6dab9a8c5ada336662f_object:0"&gt;object&lt;/SPAN&gt; network ccpwjb4&lt;SPAN class="GRcorrect" id="GRmark_a2692badbe85ad3ec3d0d6dab9a8c5ada336662f_.:1"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_a2692badbe85ad3ec3d0d6dab9a8c5ada336662f_.:2"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_3e73cf1969f4d06ee0d735897ef872459c6b4993_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.11&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_8b8193286d2b5f12d9d0f95a353549a7c8a26a65_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_8b8193286d2b5f12d9d0f95a353549a7c8a26a65_bi:1"&gt;bi&lt;/SPAN&gt; jasper internal ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_831aee0658848782f87a2e6422298171eb96a019_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_831aee0658848782f87a2e6422298171eb96a019_denver:1"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_831aee0658848782f87a2e6422298171eb96a019_viawest:2"&gt;viawest&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_d4b26242a0ddca23b2ca5eadd233cbeffffe9b69_subnet:0"&gt;subnet&lt;/SPAN&gt; 10.1.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_307ef169f3986aa20f374984c5ce6d774bc3ec3c_description:0"&gt;description&lt;/SPAN&gt; == Denver ViaWest Internal Network ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c4a51302e3589435d8f122c076b72e2d81ffcfde_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_c4a51302e3589435d8f122c076b72e2d81ffcfde_cyberfrost:1"&gt;cyberfrost&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_c4a51302e3589435d8f122c076b72e2d81ffcfde_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_c4a51302e3589435d8f122c076b72e2d81ffcfde_.:3"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_59b8893a6624a008ea1ca1c575c859179aac4e4f_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.5&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_ac945cbaca5ba6040f8473504d895c40791833a5_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_ac945cbaca5ba6040f8473504d895c40791833a5_cyberfrost:1"&gt;cyberfrost&lt;/SPAN&gt; internal ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_df16c46e129794542d01dce68b7ef2f80c69b8b2_object:0"&gt;object&lt;/SPAN&gt; network vwpwjb1bak001&lt;SPAN class="GRcorrect" id="GRmark_df16c46e129794542d01dce68b7ef2f80c69b8b2_.:1"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_df16c46e129794542d01dce68b7ef2f80c69b8b2_.:2"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_6569d4970fc2326b9829c3cd3b88a7cbf049fbc3_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.9&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_23952a93962bff093b4141cce47d7fe7b3853a23_description:0"&gt;description&lt;/SPAN&gt; == vwpwjb1bak001 internal ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6125b8c00f907ced7542aefb338b92be1faaa744_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_6125b8c00f907ced7542aefb338b92be1faaa744_electrospark:1"&gt;electrospark&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_6125b8c00f907ced7542aefb338b92be1faaa744_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_6125b8c00f907ced7542aefb338b92be1faaa744_.:3"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_69fa952ab9536c3bbcd42e2a6c9376065e1eab2f_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.14&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_9ff20f066594e5d2874d35009650889aa0ab35d9_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_9ff20f066594e5d2874d35009650889aa0ab35d9_electrospark:1"&gt;electrospark&lt;/SPAN&gt; internal ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_09c43f8ba21a08cdc6768330b50dadb7cd8877d5_object:0"&gt;object&lt;/SPAN&gt; network NETWORK_OBJ_10.1.0.0_24&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_d4b26242a0ddca23b2ca5eadd233cbeffffe9b69_subnet:0"&gt;subnet&lt;/SPAN&gt; 10.1.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_41cf89e17648f24bab78084f81879f763f88781e_object:0"&gt;object&lt;/SPAN&gt; network NETWORK_OBJ_10.10.0.0_20&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_66c135f31552e9991366a5203df657cc859f4faf_subnet:0"&gt;subnet&lt;/SPAN&gt; 10.10.0.0 255.255.240.0&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_04f2cb51d30b8304e5afdb5cfad7c13e7c6fb220_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_04f2cb51d30b8304e5afdb5cfad7c13e7c6fb220_slc:1"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_04f2cb51d30b8304e5afdb5cfad7c13e7c6fb220_corp:2"&gt;corp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_66c135f31552e9991366a5203df657cc859f4faf_subnet:0"&gt;subnet&lt;/SPAN&gt; 10.10.0.0 255.255.240.0&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_c8a3e58eb6c6265d1d41b6df7529cf9e23e9481c_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_c8a3e58eb6c6265d1d41b6df7529cf9e23e9481c_slc:1"&gt;slc&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_c8a3e58eb6c6265d1d41b6df7529cf9e23e9481c_corp:2"&gt;corp&lt;/SPAN&gt; internal network ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a83d45d20dab51249cb12998ad47c048763773f9_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_a83d45d20dab51249cb12998ad47c048763773f9_slc:1"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_a83d45d20dab51249cb12998ad47c048763773f9_viawest:2"&gt;viawest&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_4c7a49803ed89b3cd6337a56325a6e0c6b0c5091_subnet:0"&gt;subnet&lt;/SPAN&gt; 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_13ea0cdd807ea430b31de29a6169e0367e0f066e_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_13ea0cdd807ea430b31de29a6169e0367e0f066e_slc:1"&gt;slc&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_13ea0cdd807ea430b31de29a6169e0367e0f066e_viawest:2"&gt;viawest&lt;/SPAN&gt; internal network ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2b790390424d270277a42f810cbe337fdf71edcb_object:0"&gt;object&lt;/SPAN&gt; network NETWORK_OBJ_10.3.0.0_22&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_072872cdf359cf78fafc7fee57427ec06db9f2c3_subnet:0"&gt;subnet&lt;/SPAN&gt; 10.3.0.0 255.255.252.0&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7962f2ac728c8f2de77ac8ac8c88d0776e35a4ce_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_7962f2ac728c8f2de77ac8ac8c88d0776e35a4ce_magnoquake:1"&gt;magnoquake&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_7962f2ac728c8f2de77ac8ac8c88d0776e35a4ce_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_7962f2ac728c8f2de77ac8ac8c88d0776e35a4ce_.:3"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_733e9d98e8ac1aaa9cb66de7bd9575b7d02fb3e3_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.13&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5065c204630419ca1b5e92cdfcbb00a96882fa01_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_5065c204630419ca1b5e92cdfcbb00a96882fa01_magnoquake:1"&gt;magnoquake&lt;/SPAN&gt; internal =&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6aad014a78c93fe62f601ae4be99a4cfcef361f7_object:0"&gt;object&lt;/SPAN&gt; network NETWORK_OBJ_192.168.100.0_24&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_9e3ed65d289143fd8d479a2d61a8c8718eac7582_subnet:0"&gt;subnet&lt;/SPAN&gt; 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2c0a2c63325848f2f3b41016f66619767dd1a95f_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_2c0a2c63325848f2f3b41016f66619767dd1a95f_denver:1"&gt;denver&lt;/SPAN&gt;-ops&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_072872cdf359cf78fafc7fee57427ec06db9f2c3_subnet:0"&gt;subnet&lt;/SPAN&gt; 10.3.0.0 255.255.252.0&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_43f0ec44925916e8c2a85146be39b80a8349ce61_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_43f0ec44925916e8c2a85146be39b80a8349ce61_denver:1"&gt;denver&lt;/SPAN&gt; ops internal network ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_3a6885d1a3fe479e037195f591f2b14682b2c128_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_3a6885d1a3fe479e037195f591f2b14682b2c128_denver:1"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_3a6885d1a3fe479e037195f591f2b14682b2c128_corp:2"&gt;corp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_9e3ed65d289143fd8d479a2d61a8c8718eac7582_subnet:0"&gt;subnet&lt;/SPAN&gt; 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_58cc9b8428f61edb4e84326e273950abe8aefa3f_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_58cc9b8428f61edb4e84326e273950abe8aefa3f_denver:1"&gt;denver&lt;/SPAN&gt; corporate ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_35bc00d306f4af0694ee70997e7415d19757370a_object:0"&gt;object&lt;/SPAN&gt; network brawl&lt;SPAN class="GRcorrect" id="GRmark_35bc00d306f4af0694ee70997e7415d19757370a_.:1"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_35bc00d306f4af0694ee70997e7415d19757370a_.:2"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_4a021e2c9536233c4a3820fd90d224a48b5e0c4a_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.6&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5172059a631686fa1c4dc11f55b4b65fab8ffa32_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_5172059a631686fa1c4dc11f55b4b65fab8ffa32_brawl:1"&gt;brawl&lt;/SPAN&gt; internal ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e0bcf64eb0fd597ac110e9b892cc30450ccbfdf9_object:0"&gt;object&lt;/SPAN&gt; network c3750-&lt;SPAN class="GRcorrect" id="GRmark_e0bcf64eb0fd597ac110e9b892cc30450ccbfdf9_vw:1"&gt;vw&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_c44d5c9f6c7aecd0345f15fa064c0dcac6885c26_host:0"&gt;host&lt;/SPAN&gt; 10.1.0.200&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_c431eac06f32ce05c8439334a76c2b7c0459c0a1_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_c431eac06f32ce05c8439334a76c2b7c0459c0a1_cisco:1"&gt;cisco&lt;/SPAN&gt; 3750 switch ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7bfcc6135e909dd9fa2fe406decbe65362567d89_object:0"&gt;object&lt;/SPAN&gt; network 98.116&lt;SPAN class="GRcorrect" id="GRmark_7bfcc6135e909dd9fa2fe406decbe65362567d89_.:1"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_7bfcc6135e909dd9fa2fe406decbe65362567d89_.:2"&gt;.&lt;/SPAN&gt;xx&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_6041009db6a999bc2533813aadb4dd961620baeb_host:0"&gt;host&lt;/SPAN&gt; 98.116&lt;SPAN class="GRcorrect" id="GRmark_6041009db6a999bc2533813aadb4dd961620baeb_.:1"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_6041009db6a999bc2533813aadb4dd961620baeb_.:2"&gt;.&lt;/SPAN&gt;xx&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_e57e66a7a84d8c58d605ddd0b9a0cf3f6504c574_description:0"&gt;description&lt;/SPAN&gt; FTP access&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_9ebd937ff408386400320332253336f631c8d5d4_object:0"&gt;object&lt;/SPAN&gt;-group service http-&lt;SPAN class="GRcorrect" id="GRmark_9ebd937ff408386400320332253336f631c8d5d4_https:1"&gt;https&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_9ebd937ff408386400320332253336f631c8d5d4_tcp:2"&gt;tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_ebdfa0ddbba455ad4e3d88ef3ea5607570145896_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_ebdfa0ddbba455ad4e3d88ef3ea5607570145896_tcp:1"&gt;tcp&lt;/SPAN&gt; ports 80 and 443 ==&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_eddceb04735f21d680bb165873b79272f078a077_port:0"&gt;port&lt;/SPAN&gt;-object &lt;SPAN class="GRcorrect" id="GRmark_eddceb04735f21d680bb165873b79272f078a077_eq:1"&gt;eq&lt;/SPAN&gt; www&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_1381c546809e778112b4c2eded2c26104260d689_port:0"&gt;port&lt;/SPAN&gt;-object &lt;SPAN class="GRcorrect" id="GRmark_1381c546809e778112b4c2eded2c26104260d689_eq:1"&gt;eq&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_1381c546809e778112b4c2eded2c26104260d689_https:2"&gt;https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_825162e63a716199e8dff0b2dee0013c9027a75e_object:0"&gt;object&lt;/SPAN&gt;-group service http-alternate &lt;SPAN class="GRcorrect" id="GRmark_825162e63a716199e8dff0b2dee0013c9027a75e_tcp:1"&gt;tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5fcf0f80d55b6d9545279892a85e5b4e7e71995e_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_5fcf0f80d55b6d9545279892a85e5b4e7e71995e_tcp:1"&gt;tcp&lt;/SPAN&gt; port 8080 ==&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f9e000a7d1fc50e53df2561f0905f8c387f5e390_port:0"&gt;port&lt;/SPAN&gt;-object &lt;SPAN class="GRcorrect" id="GRmark_f9e000a7d1fc50e53df2561f0905f8c387f5e390_eq:1"&gt;eq&lt;/SPAN&gt; 8080&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_542f04b2a9439a4c859592870439a28acb919d69_object:0"&gt;object&lt;/SPAN&gt;-group service DM_INLINE_TCP_1 &lt;SPAN class="GRcorrect" id="GRmark_542f04b2a9439a4c859592870439a28acb919d69_tcp:1"&gt;tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_ccfb645a4d70d1b1f88f985e00e2b47757d698fb_group:0"&gt;group&lt;/SPAN&gt;-object http-alternate&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_fa2e64112a9e2089efeb616334ab1ca8a6defb39_group:0"&gt;group&lt;/SPAN&gt;-object http-&lt;SPAN class="GRcorrect" id="GRmark_fa2e64112a9e2089efeb616334ab1ca8a6defb39_https:1"&gt;https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_70222f4d2745eac9a32f9e6f1e1a575ba818d108_object:0"&gt;object&lt;/SPAN&gt;-group service &lt;SPAN class="GRcorrect" id="GRmark_70222f4d2745eac9a32f9e6f1e1a575ba818d108_talend:1"&gt;talend&lt;/SPAN&gt;-ports &lt;SPAN class="GRcorrect" id="GRmark_70222f4d2745eac9a32f9e6f1e1a575ba818d108_tcp:2"&gt;tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_74ccd3af41d8933740d524e67eedccb9153da555_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_74ccd3af41d8933740d524e67eedccb9153da555_tcp:1"&gt;tcp&lt;/SPAN&gt; ports 8000, 8001 and 8888 ==&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_08e4e3a2dd964462993906c61a55be8a76fe244e_port:0"&gt;port&lt;/SPAN&gt;-object &lt;SPAN class="GRcorrect" id="GRmark_08e4e3a2dd964462993906c61a55be8a76fe244e_eq:1"&gt;eq&lt;/SPAN&gt; 8000&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_2ef8a726a32306f81c0210ec7c2aceb3300a6b86_port:0"&gt;port&lt;/SPAN&gt;-object &lt;SPAN class="GRcorrect" id="GRmark_2ef8a726a32306f81c0210ec7c2aceb3300a6b86_eq:1"&gt;eq&lt;/SPAN&gt; 8001&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_4f2254e932e304cbe011c36e0f558cc0425ffe62_port:0"&gt;port&lt;/SPAN&gt;-object &lt;SPAN class="GRcorrect" id="GRmark_4f2254e932e304cbe011c36e0f558cc0425ffe62_eq:1"&gt;eq&lt;/SPAN&gt; 8888&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_4556b7833a389f223138fac213f951b3fe19f813_object:0"&gt;object&lt;/SPAN&gt;-group service DM_INLINE_TCP_2 &lt;SPAN class="GRcorrect" id="GRmark_4556b7833a389f223138fac213f951b3fe19f813_tcp:1"&gt;tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_1154abd4cb62a5102bdf30afd3d15359769ae5c7_port:0"&gt;port&lt;/SPAN&gt;-object &lt;SPAN class="GRcorrect" id="GRmark_1154abd4cb62a5102bdf30afd3d15359769ae5c7_eq:1"&gt;eq&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_1154abd4cb62a5102bdf30afd3d15359769ae5c7_ftp:2"&gt;ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_3661663f74a9e2d28c0ada97d828f939cdebcee8_port:0"&gt;port&lt;/SPAN&gt;-object &lt;SPAN class="GRcorrect" id="GRmark_3661663f74a9e2d28c0ada97d828f939cdebcee8_eq:1"&gt;eq&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_3661663f74a9e2d28c0ada97d828f939cdebcee8_ftp:2"&gt;ftp&lt;/SPAN&gt;-data&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5ff18e504fe19cab78dccbf90275744d85604397_object:0"&gt;object&lt;/SPAN&gt;-group service passive-&lt;SPAN class="GRcorrect" id="GRmark_5ff18e504fe19cab78dccbf90275744d85604397_ftp:1"&gt;ftp&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_5ff18e504fe19cab78dccbf90275744d85604397_tcp:2"&gt;tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_60b342620604296bb477d9ae9c6c7c228fafc1b3_description:0"&gt;description&lt;/SPAN&gt; == &lt;SPAN class="GRcorrect" id="GRmark_60b342620604296bb477d9ae9c6c7c228fafc1b3_tcp:1"&gt;tcp&lt;/SPAN&gt; ports 55000 to 60000 for passive &lt;SPAN class="GRcorrect" id="GRmark_60b342620604296bb477d9ae9c6c7c228fafc1b3_ftp:2"&gt;ftp&lt;/SPAN&gt; ==&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_8b9a96fc3b50619c268a206856c101cf7516eaa4_port:0"&gt;port&lt;/SPAN&gt;-object range 1024 65535&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6b8c65fbe5e470278b199d02bb1821085af560c4_object:0"&gt;object&lt;/SPAN&gt;-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_c14b9efc608150eb3a27eb67edc2a4c687b0c504_service:0"&gt;service&lt;/SPAN&gt;-object &lt;SPAN class="GRcorrect" id="GRmark_c14b9efc608150eb3a27eb67edc2a4c687b0c504_gre:1"&gt;gre&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_2c689339aa003da312ef5ac4bfd42084c2db42d9_service:0"&gt;service&lt;/SPAN&gt;-object &lt;SPAN class="GRcorrect" id="GRmark_2c689339aa003da312ef5ac4bfd42084c2db42d9_tcp:1"&gt;tcp&lt;/SPAN&gt; destination &lt;SPAN class="GRcorrect" id="GRmark_2c689339aa003da312ef5ac4bfd42084c2db42d9_eq:2"&gt;eq&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_2c689339aa003da312ef5ac4bfd42084c2db42d9_pptp:3"&gt;pptp&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_9759d02e1c6889b1bc5e6a0bd20ceda1d4dcb230_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in remark == permit all http access to jasper server ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_52c5e99a634cb9920cc162549971f882c8ab259f_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended permit tcp any object ccpwjb4reports001&lt;SPAN class="GRcorrect" id="GRmark_52c5e99a634cb9920cc162549971f882c8ab259f_.:1"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_52c5e99a634cb9920cc162549971f882c8ab259f_.:2"&gt;.&lt;/SPAN&gt;local object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_d83c68c2f6ed81cc7ca37f6406eab0138fca934b_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in remark == permit all access to &lt;SPAN class="GRcorrect" id="GRmark_d83c68c2f6ed81cc7ca37f6406eab0138fca934b_cyberfrost:1"&gt;cyberfrost&lt;/SPAN&gt; on port 1723 and &lt;SPAN class="GRcorrect" id="GRmark_d83c68c2f6ed81cc7ca37f6406eab0138fca934b_gre:2"&gt;gre&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_d83c68c2f6ed81cc7ca37f6406eab0138fca934b_ip:3"&gt;ip&lt;/SPAN&gt; protocol 47 ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_808b61ab3b6339de1a997165d7ad3019d24efdae_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any object &lt;SPAN class="GRcorrect" id="GRmark_808b61ab3b6339de1a997165d7ad3019d24efdae_cyberfrost:1"&gt;cyberfrost&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_808b61ab3b6339de1a997165d7ad3019d24efdae_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_808b61ab3b6339de1a997165d7ad3019d24efdae_.:3"&gt;.&lt;/SPAN&gt;local &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f93787a299b6492ccb52681e5a9277bae09e2082_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in remark == permit all from &lt;SPAN class="GRcorrect" id="GRmark_f93787a299b6492ccb52681e5a9277bae09e2082_denver:1"&gt;denver&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_f93787a299b6492ccb52681e5a9277bae09e2082_corp:2"&gt;corp&lt;/SPAN&gt; full access to jasper server ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_9f4fb59915597e4a61ae5a0277dd2ccc9245e621_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended permit &lt;SPAN class="GRcorrect" id="GRmark_9f4fb59915597e4a61ae5a0277dd2ccc9245e621_ip:1"&gt;ip&lt;/SPAN&gt; host 209.118.90.227 object ccpwjb4reports001&lt;SPAN class="GRcorrect" id="GRmark_9f4fb59915597e4a61ae5a0277dd2ccc9245e621_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_9f4fb59915597e4a61ae5a0277dd2ccc9245e621_.:3"&gt;.&lt;/SPAN&gt;local &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_24b6d5bcf0236e216551c3099ced4fc548715643_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in remark == permit all http access to &lt;SPAN class="GRcorrect" id="GRmark_24b6d5bcf0236e216551c3099ced4fc548715643_magnoquake:1"&gt;magnoquake&lt;/SPAN&gt; ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7cf5255b319d04af83b1d162f5ddcefd77e34d8c_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended permit tcp any object &lt;SPAN class="GRcorrect" id="GRmark_7cf5255b319d04af83b1d162f5ddcefd77e34d8c_magnoquake:1"&gt;magnoquake&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_7cf5255b319d04af83b1d162f5ddcefd77e34d8c_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_7cf5255b319d04af83b1d162f5ddcefd77e34d8c_.:3"&gt;.&lt;/SPAN&gt;local object-group http-&lt;SPAN class="GRcorrect" id="GRmark_7cf5255b319d04af83b1d162f5ddcefd77e34d8c_https:4"&gt;https&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f406eba5c7bc266f6c9a0ad4eb454ce627632555_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in remark == permit all http access to &lt;SPAN class="GRcorrect" id="GRmark_f406eba5c7bc266f6c9a0ad4eb454ce627632555_main xxxxxx website:1"&gt;main xxxxxx website&lt;/SPAN&gt; ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5ea1cd4d1ca3a571a95dd91a28521c6a26dd21d6_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended permit tcp any object &lt;SPAN class="GRcorrect" id="GRmark_5ea1cd4d1ca3a571a95dd91a28521c6a26dd21d6_electrospark:1"&gt;electrospark&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_5ea1cd4d1ca3a571a95dd91a28521c6a26dd21d6_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_5ea1cd4d1ca3a571a95dd91a28521c6a26dd21d6_.:3"&gt;.&lt;/SPAN&gt;local object-group http-&lt;SPAN class="GRcorrect" id="GRmark_5ea1cd4d1ca3a571a95dd91a28521c6a26dd21d6_https:4"&gt;https&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f406eba5c7bc266f6c9a0ad4eb454ce627632555_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in remark == permit all http access to &lt;SPAN class="GRcorrect" id="GRmark_f406eba5c7bc266f6c9a0ad4eb454ce627632555_main xxxxxx website:1"&gt;main xxxxxx website&lt;/SPAN&gt; ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_b43b5c5a23d1e6dae52406ef22731ecf22a5083c_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended permit tcp any object &lt;SPAN class="GRcorrect" id="GRmark_b43b5c5a23d1e6dae52406ef22731ecf22a5083c_electrospark:1"&gt;electrospark&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_b43b5c5a23d1e6dae52406ef22731ecf22a5083c_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_b43b5c5a23d1e6dae52406ef22731ecf22a5083c_.:3"&gt;.&lt;/SPAN&gt;local object-group DM_INLINE_TCP_2 &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_fbd986abfcfd49d7bc0d58483675a11d586ce31d_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended permit &lt;SPAN class="GRcorrect" id="GRmark_fbd986abfcfd49d7bc0d58483675a11d586ce31d_ip:1"&gt;ip&lt;/SPAN&gt; object 98.116.172.191 object &lt;SPAN class="GRcorrect" id="GRmark_fbd986abfcfd49d7bc0d58483675a11d586ce31d_electrospark:2"&gt;electrospark&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_fbd986abfcfd49d7bc0d58483675a11d586ce31d_.:3"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_fbd986abfcfd49d7bc0d58483675a11d586ce31d_.:4"&gt;.&lt;/SPAN&gt;local &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a9741fbc28df21b001017f5a967a5fb167d0c95a_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in remark == permit all ssh access to &lt;SPAN class="GRcorrect" id="GRmark_a9741fbc28df21b001017f5a967a5fb167d0c95a_bi:1"&gt;bi&lt;/SPAN&gt; database ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_8b7979f6a551134e96c6a0b508acf8c8d19c3d43_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended permit tcp any object ccpwjb4db001&lt;SPAN class="GRcorrect" id="GRmark_8b7979f6a551134e96c6a0b508acf8c8d19c3d43_.:1"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_8b7979f6a551134e96c6a0b508acf8c8d19c3d43_.:2"&gt;.&lt;/SPAN&gt;local &lt;SPAN class="GRcorrect" id="GRmark_8b7979f6a551134e96c6a0b508acf8c8d19c3d43_eq:3"&gt;eq&lt;/SPAN&gt; ssh &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_ffc3e16e2be4864564ac2968212e389c4e2f582d_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in remark == permit all &lt;SPAN class="GRcorrect" id="GRmark_ffc3e16e2be4864564ac2968212e389c4e2f582d_from:1"&gt;from&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_ffc3e16e2be4864564ac2968212e389c4e2f582d_denver:2"&gt;denver&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_ffc3e16e2be4864564ac2968212e389c4e2f582d_corp:3"&gt;corp&lt;/SPAN&gt; to bi4 ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_12c65559e9a69b4ad61be857eae1819f14584bc7_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended permit &lt;SPAN class="GRcorrect" id="GRmark_12c65559e9a69b4ad61be857eae1819f14584bc7_ip:1"&gt;ip&lt;/SPAN&gt; host 209.118.90.227 object ccpwjb4bi001&lt;SPAN class="GRcorrect" id="GRmark_12c65559e9a69b4ad61be857eae1819f14584bc7_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_12c65559e9a69b4ad61be857eae1819f14584bc7_.:3"&gt;.&lt;/SPAN&gt;local &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_bcd76290e374db45bdf337e7db207bd9da88bb3b_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in remark == permit all &lt;SPAN class="GRcorrect" id="GRmark_bcd76290e374db45bdf337e7db207bd9da88bb3b_ftp:1"&gt;ftp&lt;/SPAN&gt; and &lt;SPAN class="GRcorrect" id="GRmark_bcd76290e374db45bdf337e7db207bd9da88bb3b_ftp:2"&gt;ftp&lt;/SPAN&gt;-data access to &lt;SPAN class="GRcorrect" id="GRmark_bcd76290e374db45bdf337e7db207bd9da88bb3b_main xxxxxx web site:3"&gt;main xxxxxx web site&lt;/SPAN&gt; ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_64d28b831d9d90d9584042c5c4ab218ce2d3eb73_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5fca1535a218454d23ce2847843b711d1cfb5f9f_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in remark == permit all ping packets ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_46c9a11929187aacebfb86c9bf314f12e23b8fe5_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_d03584d992d36d9714524f92a5da4f3101f0a51c_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in remark == catchall for logging ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_b19aada405c1e5beb4d8357898637ecf6282fe89_access:0"&gt;access&lt;/SPAN&gt;-list outside_access_in extended deny &lt;SPAN class="GRcorrect" id="GRmark_b19aada405c1e5beb4d8357898637ecf6282fe89_ip:1"&gt;ip&lt;/SPAN&gt; any any &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0b639cf6f78c7423b288d0fa8d71e0b0591880ce_access:0"&gt;access&lt;/SPAN&gt;-list outside_cryptomap extended permit &lt;SPAN class="GRcorrect" id="GRmark_0b639cf6f78c7423b288d0fa8d71e0b0591880ce_ip:1"&gt;ip&lt;/SPAN&gt; 10.1.0.0 255.255.255.0 object &lt;SPAN class="GRcorrect" id="GRmark_0b639cf6f78c7423b288d0fa8d71e0b0591880ce_slc:2"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_0b639cf6f78c7423b288d0fa8d71e0b0591880ce_corp:3"&gt;corp&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_1e0449ce83b620a4d3c7862381ec4c9c4e3fdc00_access:0"&gt;access&lt;/SPAN&gt;-list pnt_cryptomap extended permit &lt;SPAN class="GRcorrect" id="GRmark_1e0449ce83b620a4d3c7862381ec4c9c4e3fdc00_ip:1"&gt;ip&lt;/SPAN&gt; object &lt;SPAN class="GRcorrect" id="GRmark_1e0449ce83b620a4d3c7862381ec4c9c4e3fdc00_denver:2"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_1e0449ce83b620a4d3c7862381ec4c9c4e3fdc00_viawest:3"&gt;viawest&lt;/SPAN&gt; object &lt;SPAN class="GRcorrect" id="GRmark_1e0449ce83b620a4d3c7862381ec4c9c4e3fdc00_slc:4"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_1e0449ce83b620a4d3c7862381ec4c9c4e3fdc00_viawest:5"&gt;viawest&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6ec7301635675b53bfbde240c33dadb3fc47800e_access:0"&gt;access&lt;/SPAN&gt;-list outside_cryptomap_1 extended permit &lt;SPAN class="GRcorrect" id="GRmark_6ec7301635675b53bfbde240c33dadb3fc47800e_ip:1"&gt;ip&lt;/SPAN&gt; object &lt;SPAN class="GRcorrect" id="GRmark_6ec7301635675b53bfbde240c33dadb3fc47800e_denver:2"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_6ec7301635675b53bfbde240c33dadb3fc47800e_viawest:3"&gt;viawest&lt;/SPAN&gt; object &lt;SPAN class="GRcorrect" id="GRmark_6ec7301635675b53bfbde240c33dadb3fc47800e_denver:4"&gt;denver&lt;/SPAN&gt;-ops &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2d351d88ff0263e36101ae3db679984e8f924211_access:0"&gt;access&lt;/SPAN&gt;-list outside_cryptomap_2 extended permit &lt;SPAN class="GRcorrect" id="GRmark_2d351d88ff0263e36101ae3db679984e8f924211_ip:1"&gt;ip&lt;/SPAN&gt; 10.1.0.0 255.255.255.0 object &lt;SPAN class="GRcorrect" id="GRmark_2d351d88ff0263e36101ae3db679984e8f924211_denver:2"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_2d351d88ff0263e36101ae3db679984e8f924211_corp:3"&gt;corp&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_b0c97d737fe5deee7f65bf2f634b831a3db09f4d_pager:0"&gt;pager&lt;/SPAN&gt; lines 24&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0f430299409c8fda286cff82dafddd528da10019_logging:0"&gt;logging&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_0f430299409c8fda286cff82dafddd528da10019_enable:1"&gt;enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6a66e104be89dc566853561319ad76894173d631_logging:0"&gt;logging&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_6a66e104be89dc566853561319ad76894173d631_asdm:1"&gt;asdm&lt;/SPAN&gt; informational&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_fbfbd8a1754fbf3163bca0e350b537e11f9e9d4d_mtu:0"&gt;mtu&lt;/SPAN&gt; outside 1500&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_90dfa6c470b604e8703caca46839015a3040ac2a_mtu:0"&gt;mtu&lt;/SPAN&gt; inside 1500&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_baf5e386bbcf998b04ff0324c7c07c999a4be5b3_mtu:0"&gt;mtu&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_baf5e386bbcf998b04ff0324c7c07c999a4be5b3_pnt:1"&gt;pnt&lt;/SPAN&gt; 1500&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_8b7a2aac45d2c1be01058d6e7b0fff5e983ca437_mtu:0"&gt;mtu&lt;/SPAN&gt; management 1500&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c4bf00e686589ef3573bcf720c19c16f30d3eb8b_ip:0"&gt;ip&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_c4bf00e686589ef3573bcf720c19c16f30d3eb8b_verify:1"&gt;verify&lt;/SPAN&gt; reverse-path interface outside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_4b4929ddf552a98e90721628e9551ec669a6e0dd_no:0"&gt;no&lt;/SPAN&gt; failover&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_73ee6b9f21bbf6645be57952ccc267e4327b3320_icmp:0"&gt;icmp&lt;/SPAN&gt; unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2cacb865e4f370fc1774b898feb3a8dc45ff51fc_icmp:0"&gt;icmp&lt;/SPAN&gt; permit any outside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_cd6338ca8192177f4d973defc2ed17f335f607e5_icmp:0"&gt;icmp&lt;/SPAN&gt; permit any inside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_22d802969c2e5ef717774c377c6cdd7a30e5b2bb_asdm:0"&gt;asdm&lt;/SPAN&gt; image disk0&lt;SPAN class="GRcorrect" id="GRmark_22d802969c2e5ef717774c377c6cdd7a30e5b2bb_::1"&gt;:&lt;/SPAN&gt;/&lt;SPAN class="GRcorrect" id="GRmark_22d802969c2e5ef717774c377c6cdd7a30e5b2bb_asdm:2"&gt;asdm&lt;/SPAN&gt;-649&lt;SPAN class="GRcorrect" id="GRmark_22d802969c2e5ef717774c377c6cdd7a30e5b2bb_.:3"&gt;.&lt;/SPAN&gt;bin&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e7a1440b5919e5b37f1335d67bf0d88ad9279b12_no:0"&gt;no&lt;/SPAN&gt; asdm history enable&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_3226dc5cf0c68306363141699e483a79028bc059_arp:0"&gt;arp&lt;/SPAN&gt; timeout 14400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_,:1"&gt;,&lt;/SPAN&gt;any) source static &lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_denver:2"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_viawest:3"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_denver:4"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_viawest:5"&gt;viawest&lt;/SPAN&gt; destination static &lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_denver:6"&gt;denver&lt;/SPAN&gt;-ops &lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_denver:7"&gt;denver&lt;/SPAN&gt;-ops description == &lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_nat:8"&gt;nat&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_denver:9"&gt;denver&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_viawest:10"&gt;viawest&lt;/SPAN&gt; to &lt;SPAN class="GRcorrect" id="GRmark_0cc5c1ef6734490aa5cd9424d9760647ac14ba8c_denver:11"&gt;denver&lt;/SPAN&gt; ops ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_,:1"&gt;,&lt;/SPAN&gt;any) source static &lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_denver:2"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_viawest:3"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_denver:4"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_viawest:5"&gt;viawest&lt;/SPAN&gt; destination static &lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_slc:6"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_viawest:7"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_slc:8"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_viawest:9"&gt;viawest&lt;/SPAN&gt; description == &lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_nat:10"&gt;nat&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_denver:11"&gt;denver&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_viawest:12"&gt;viawest&lt;/SPAN&gt; to &lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_slc:13"&gt;slc&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_9fa18e605fd932c7cf36d7de154a9cf75d04e0ce_viawest:14"&gt;viawest&lt;/SPAN&gt; == (pending)&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_,:1"&gt;,&lt;/SPAN&gt;any) source static &lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_denver:2"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_viawest:3"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_denver:4"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_viawest:5"&gt;viawest&lt;/SPAN&gt; destination static &lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_denver:6"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_corp:7"&gt;corp&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_denver:8"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_corp:9"&gt;corp&lt;/SPAN&gt; description == &lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_nat:10"&gt;nat&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_denver:11"&gt;denver&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_viawest:12"&gt;viawest&lt;/SPAN&gt; to &lt;SPAN class="GRcorrect" id="GRmark_29e077ea6232cf7bc9677447ced7ea9dcc7221f4_denver:13"&gt;denver&lt;/SPAN&gt; corporate ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_,:1"&gt;,&lt;/SPAN&gt;any) source static &lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_denver:2"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_viawest:3"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_denver:4"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_viawest:5"&gt;viawest&lt;/SPAN&gt; destination static &lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_slc:6"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_corp:7"&gt;corp&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_slc:8"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_corp:9"&gt;corp&lt;/SPAN&gt; description == &lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_nat:10"&gt;nat&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_denver:11"&gt;denver&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_viawest:12"&gt;viawest&lt;/SPAN&gt; to &lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_slc:13"&gt;slc&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_97a71d06bb522eb438b19d62cc745bd99c63a679_corp:14"&gt;corp&lt;/SPAN&gt; ==&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_053c5389ff884d54f0daf8fa13e8a90bd381845a_nat:0"&gt;nat&lt;/SPAN&gt; (inside&lt;SPAN class="GRcorrect" id="GRmark_053c5389ff884d54f0daf8fa13e8a90bd381845a_,:1"&gt;,&lt;/SPAN&gt;outside) source static &lt;SPAN class="GRcorrect" id="GRmark_053c5389ff884d54f0daf8fa13e8a90bd381845a_denver:2"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_053c5389ff884d54f0daf8fa13e8a90bd381845a_viawest:3"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_053c5389ff884d54f0daf8fa13e8a90bd381845a_denver:4"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_053c5389ff884d54f0daf8fa13e8a90bd381845a_viawest:5"&gt;viawest&lt;/SPAN&gt; destination static &lt;SPAN class="GRcorrect" id="GRmark_053c5389ff884d54f0daf8fa13e8a90bd381845a_slc:6"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_053c5389ff884d54f0daf8fa13e8a90bd381845a_corp:7"&gt;corp&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_053c5389ff884d54f0daf8fa13e8a90bd381845a_slc:8"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_053c5389ff884d54f0daf8fa13e8a90bd381845a_corp:9"&gt;corp&lt;/SPAN&gt; no-proxy-&lt;SPAN class="GRcorrect" id="GRmark_053c5389ff884d54f0daf8fa13e8a90bd381845a_arp:10"&gt;arp&lt;/SPAN&gt; route-lookup&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_nat:0"&gt;nat&lt;/SPAN&gt; (inside&lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_,:1"&gt;,&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_pnt:2"&gt;pnt&lt;/SPAN&gt;) source static &lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_denver:3"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_viawest:4"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_denver:5"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_viawest:6"&gt;viawest&lt;/SPAN&gt; destination static &lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_slc:7"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_viawest:8"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_slc:9"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_viawest:10"&gt;viawest&lt;/SPAN&gt; no-proxy-&lt;SPAN class="GRcorrect" id="GRmark_53cb33e4191992ae7e150a17920551da26a863d5_arp:11"&gt;arp&lt;/SPAN&gt; route-lookup&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2b70c14bb02e9c6a726857f6da9f9552704430fa_nat:0"&gt;nat&lt;/SPAN&gt; (inside&lt;SPAN class="GRcorrect" id="GRmark_2b70c14bb02e9c6a726857f6da9f9552704430fa_,:1"&gt;,&lt;/SPAN&gt;outside) source static &lt;SPAN class="GRcorrect" id="GRmark_2b70c14bb02e9c6a726857f6da9f9552704430fa_denver:2"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_2b70c14bb02e9c6a726857f6da9f9552704430fa_viawest:3"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_2b70c14bb02e9c6a726857f6da9f9552704430fa_denver:4"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_2b70c14bb02e9c6a726857f6da9f9552704430fa_viawest:5"&gt;viawest&lt;/SPAN&gt; destination static &lt;SPAN class="GRcorrect" id="GRmark_2b70c14bb02e9c6a726857f6da9f9552704430fa_denver:6"&gt;denver&lt;/SPAN&gt;-ops &lt;SPAN class="GRcorrect" id="GRmark_2b70c14bb02e9c6a726857f6da9f9552704430fa_denver:7"&gt;denver&lt;/SPAN&gt;-ops no-proxy-&lt;SPAN class="GRcorrect" id="GRmark_2b70c14bb02e9c6a726857f6da9f9552704430fa_arp:8"&gt;arp&lt;/SPAN&gt; route-lookup&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_32723dcfb109d0b011b4b458d2a0ffa4a221b6a7_nat:0"&gt;nat&lt;/SPAN&gt; (inside&lt;SPAN class="GRcorrect" id="GRmark_32723dcfb109d0b011b4b458d2a0ffa4a221b6a7_,:1"&gt;,&lt;/SPAN&gt;outside) source static &lt;SPAN class="GRcorrect" id="GRmark_32723dcfb109d0b011b4b458d2a0ffa4a221b6a7_denver:2"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_32723dcfb109d0b011b4b458d2a0ffa4a221b6a7_viawest:3"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_32723dcfb109d0b011b4b458d2a0ffa4a221b6a7_denver:4"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_32723dcfb109d0b011b4b458d2a0ffa4a221b6a7_viawest:5"&gt;viawest&lt;/SPAN&gt; destination static &lt;SPAN class="GRcorrect" id="GRmark_32723dcfb109d0b011b4b458d2a0ffa4a221b6a7_denver:6"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_32723dcfb109d0b011b4b458d2a0ffa4a221b6a7_corp:7"&gt;corp&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_32723dcfb109d0b011b4b458d2a0ffa4a221b6a7_denver:8"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_32723dcfb109d0b011b4b458d2a0ffa4a221b6a7_corp:9"&gt;corp&lt;/SPAN&gt; no-proxy-&lt;SPAN class="GRcorrect" id="GRmark_32723dcfb109d0b011b4b458d2a0ffa4a221b6a7_arp:10"&gt;arp&lt;/SPAN&gt; route-lookup&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_84f4b937524b4c5bdcfc2e78343acdecadba9aed_nat:0"&gt;nat&lt;/SPAN&gt; (inside&lt;SPAN class="GRcorrect" id="GRmark_84f4b937524b4c5bdcfc2e78343acdecadba9aed_,:1"&gt;,&lt;/SPAN&gt;outside) source static &lt;SPAN class="GRcorrect" id="GRmark_84f4b937524b4c5bdcfc2e78343acdecadba9aed_slc:2"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_84f4b937524b4c5bdcfc2e78343acdecadba9aed_viawest:3"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_84f4b937524b4c5bdcfc2e78343acdecadba9aed_slc:4"&gt;slc&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_84f4b937524b4c5bdcfc2e78343acdecadba9aed_viawest:5"&gt;viawest&lt;/SPAN&gt; destination static &lt;SPAN class="GRcorrect" id="GRmark_84f4b937524b4c5bdcfc2e78343acdecadba9aed_denver:6"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_84f4b937524b4c5bdcfc2e78343acdecadba9aed_viawest:7"&gt;viawest&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_84f4b937524b4c5bdcfc2e78343acdecadba9aed_denver:8"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_84f4b937524b4c5bdcfc2e78343acdecadba9aed_viawest:9"&gt;viawest&lt;/SPAN&gt; no-proxy-&lt;SPAN class="GRcorrect" id="GRmark_84f4b937524b4c5bdcfc2e78343acdecadba9aed_arp:10"&gt;arp&lt;/SPAN&gt; route-lookup&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_85d78f90326d2daa92770bde08348a9a8f4701da_nat:0"&gt;nat&lt;/SPAN&gt; (inside&lt;SPAN class="GRcorrect" id="GRmark_85d78f90326d2daa92770bde08348a9a8f4701da_,:1"&gt;,&lt;/SPAN&gt;outside) source dynamic &lt;SPAN class="GRcorrect" id="GRmark_85d78f90326d2daa92770bde08348a9a8f4701da_denver:2"&gt;denver&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_85d78f90326d2daa92770bde08348a9a8f4701da_viawest:3"&gt;viawest&lt;/SPAN&gt; interface description === &lt;SPAN class="GRcorrect" id="GRmark_85d78f90326d2daa92770bde08348a9a8f4701da_nat:4"&gt;nat&lt;/SPAN&gt; internal network to outside gateway interface ===&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_bb89580ed2e83bde780b5e1427396070d2052f82_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_bb89580ed2e83bde780b5e1427396070d2052f82_bonecrusher:1"&gt;bonecrusher&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_bb89580ed2e83bde780b5e1427396070d2052f82_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_bb89580ed2e83bde780b5e1427396070d2052f82_.:3"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_,:1"&gt;,&lt;/SPAN&gt;any) static 216.38&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:2"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:3"&gt;.&lt;/SPAN&gt;xx&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_4e9f042f3d37401dbfc8335c0783617598f12139_object:0"&gt;object&lt;/SPAN&gt; network ccpwjb4db001&lt;SPAN class="GRcorrect" id="GRmark_4e9f042f3d37401dbfc8335c0783617598f12139_.:1"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_4e9f042f3d37401dbfc8335c0783617598f12139_.:2"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_,:1"&gt;,&lt;/SPAN&gt;any) static 216.38&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:2"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:3"&gt;.&lt;/SPAN&gt;xx&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_50c07dd826da6f0a69a665abb67c86aadabe4467_object:0"&gt;object&lt;/SPAN&gt; network ccpwjb4reports001&lt;SPAN class="GRcorrect" id="GRmark_50c07dd826da6f0a69a665abb67c86aadabe4467_.:1"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_50c07dd826da6f0a69a665abb67c86aadabe4467_.:2"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_,:1"&gt;,&lt;/SPAN&gt;any) static 216.38&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:2"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:3"&gt;.&lt;/SPAN&gt;xx&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c4a51302e3589435d8f122c076b72e2d81ffcfde_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_c4a51302e3589435d8f122c076b72e2d81ffcfde_cyberfrost:1"&gt;cyberfrost&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_c4a51302e3589435d8f122c076b72e2d81ffcfde_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_c4a51302e3589435d8f122c076b72e2d81ffcfde_.:3"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_,:1"&gt;,&lt;/SPAN&gt;any) static 216.38&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:2"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:3"&gt;.&lt;/SPAN&gt;xx&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_df16c46e129794542d01dce68b7ef2f80c69b8b2_object:0"&gt;object&lt;/SPAN&gt; network vwpwjb1bak001&lt;SPAN class="GRcorrect" id="GRmark_df16c46e129794542d01dce68b7ef2f80c69b8b2_.:1"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_df16c46e129794542d01dce68b7ef2f80c69b8b2_.:2"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_,:1"&gt;,&lt;/SPAN&gt;any) static 216.38&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:2"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:3"&gt;.&lt;/SPAN&gt;xx&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6125b8c00f907ced7542aefb338b92be1faaa744_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_6125b8c00f907ced7542aefb338b92be1faaa744_electrospark:1"&gt;electrospark&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_6125b8c00f907ced7542aefb338b92be1faaa744_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_6125b8c00f907ced7542aefb338b92be1faaa744_.:3"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_,:1"&gt;,&lt;/SPAN&gt;any) static 216.38&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:2"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:3"&gt;.&lt;/SPAN&gt;xx&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7962f2ac728c8f2de77ac8ac8c88d0776e35a4ce_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_7962f2ac728c8f2de77ac8ac8c88d0776e35a4ce_magnoquake:1"&gt;magnoquake&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_7962f2ac728c8f2de77ac8ac8c88d0776e35a4ce_.:2"&gt;.&lt;/SPAN&gt;xxxxxx&lt;SPAN class="GRcorrect" id="GRmark_7962f2ac728c8f2de77ac8ac8c88d0776e35a4ce_.:3"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_,:1"&gt;,&lt;/SPAN&gt;any) static 216.38&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:2"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_f752321a1e9533e57f09f265d78dce9f7c7ff307_.:3"&gt;.&lt;/SPAN&gt;xx&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6ff11aca656fb524fed2ed142424951371ca5fdd_access:0"&gt;access&lt;/SPAN&gt;-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5114ce3de1059687a419fb5f62b98c3d13271e6c_route:0"&gt;route&lt;/SPAN&gt; outside 0.0.0.0 0.0.0.0 216.38&lt;SPAN class="GRcorrect" id="GRmark_5114ce3de1059687a419fb5f62b98c3d13271e6c_.:1"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_5114ce3de1059687a419fb5f62b98c3d13271e6c_.:2"&gt;.&lt;/SPAN&gt;xx 1&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6c4f4544db4415f7d3ceebfc3d9aca1639770ec5_route:0"&gt;route&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_6c4f4544db4415f7d3ceebfc3d9aca1639770ec5_pnt:1"&gt;pnt&lt;/SPAN&gt; 10.1.1.0 255.255.255.0 10.169&lt;SPAN class="GRcorrect" id="GRmark_6c4f4544db4415f7d3ceebfc3d9aca1639770ec5_.:2"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_6c4f4544db4415f7d3ceebfc3d9aca1639770ec5_.:3"&gt;.&lt;/SPAN&gt;xx 1&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_68c2700aca9596f41a87b3ce005033bb03230e8f_route:0"&gt;route&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_68c2700aca9596f41a87b3ce005033bb03230e8f_pnt:1"&gt;pnt&lt;/SPAN&gt; 10.169.48.112 255.255.255.248 10.169&lt;SPAN class="GRcorrect" id="GRmark_68c2700aca9596f41a87b3ce005033bb03230e8f_.:2"&gt;.&lt;/SPAN&gt;xx&lt;SPAN class="GRcorrect" id="GRmark_68c2700aca9596f41a87b3ce005033bb03230e8f_.:3"&gt;.&lt;/SPAN&gt;xx 1&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_fcee399bdfc7ac11e3bae5f19413dbc1d7a9399d_timeout:0"&gt;timeout&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_fcee399bdfc7ac11e3bae5f19413dbc1d7a9399d_xlate:1"&gt;xlate&lt;/SPAN&gt; 3:00:00&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_1c6fdb5a2f25959d6b8bf1fbccbd84c708f755de_timeout:0"&gt;timeout&lt;/SPAN&gt; pat-&lt;SPAN class="GRcorrect" id="GRmark_1c6fdb5a2f25959d6b8bf1fbccbd84c708f755de_xlate:1"&gt;xlate&lt;/SPAN&gt; 0:00:30&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7629cf7b74d577d7149a08caecaa85ec16e25891_timeout:0"&gt;timeout&lt;/SPAN&gt; conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a55904c4d6c81e78a590837f72bc3a2a1cb5bb49_timeout:0"&gt;timeout&lt;/SPAN&gt; sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a9ff49d58d2d2b95c22fe2ee897f1fea4c0f4881_timeout:0"&gt;timeout&lt;/SPAN&gt; sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2fb07240d8fde081894505ac6fc8c9d77febd52b_timeout:0"&gt;timeout&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_2fb07240d8fde081894505ac6fc8c9d77febd52b_tcp:1"&gt;tcp&lt;/SPAN&gt;-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0b6e61668fabbc2117b24bd59dfef86834c7e237_timeout:0"&gt;timeout&lt;/SPAN&gt; floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_590347571dfb3c0efda8a996057074c99b85391d_dynamic:0"&gt;dynamic&lt;/SPAN&gt;-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_28c2e2841ffd03b312623606c1e86aa2324797f5_user:0"&gt;user&lt;/SPAN&gt;-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a3537390027256f0596870013d4c7753e510b40b_aaa:0"&gt;aaa&lt;/SPAN&gt; authentication enable console LOCAL &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6ef3dee920253596313820f7a4d68945030ed1e2_aaa:0"&gt;aaa&lt;/SPAN&gt; authentication http console LOCAL &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e5ca24ebefc7dd51056560ad42c390603ededa92_aaa:0"&gt;aaa&lt;/SPAN&gt; authentication serial console LOCAL &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_4eb148d5e0f112feec620db8eee325be687d69b0_aaa:0"&gt;aaa&lt;/SPAN&gt; authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e087bb23f2e0722605dd4f5e952793548fba0e9c_aaa:0"&gt;aaa&lt;/SPAN&gt; authorization command LOCAL &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_dcb955aa5e47f98dbfc48819de4824b1ddfb4cc6_http:0"&gt;http&lt;/SPAN&gt; server &lt;SPAN class="GRcorrect" id="GRmark_dcb955aa5e47f98dbfc48819de4824b1ddfb4cc6_enable:1"&gt;enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5704668af87e317151ced7ea3500b582b55957c4_http:0"&gt;http&lt;/SPAN&gt; 0.0.0.0 0.0.0.0 management&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_9c406a29a80d77ae8ec425f701e91e164a5d22d2_http:0"&gt;http&lt;/SPAN&gt; 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7e79249057196419bf371bfc48a1233c80783133_no:0"&gt;no&lt;/SPAN&gt; snmp-server location&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_ecd2e3325be3bd42d681c85cf1ba5c521c538ce9_no:0"&gt;no&lt;/SPAN&gt; snmp-server contact&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_61276d7a085cb088f3e98a9640ac1f6716b6495d_snmp:0"&gt;snmp&lt;/SPAN&gt;-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6fd2c50178deb6c26ba8a05dec999607de4259be_crypto:0"&gt;crypto&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_6fd2c50178deb6c26ba8a05dec999607de4259be_ipsec:1"&gt;ipsec&lt;/SPAN&gt; ikev1 transform-set ESP-AES-128-MD5 &lt;SPAN class="GRcorrect" id="GRmark_6fd2c50178deb6c26ba8a05dec999607de4259be_esp:2"&gt;esp&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_6fd2c50178deb6c26ba8a05dec999607de4259be_aes:3"&gt;aes&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_6fd2c50178deb6c26ba8a05dec999607de4259be_esp:4"&gt;esp&lt;/SPAN&gt;-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6916b2e878322eabb566a0420c20b6820f8ec89f_crypto:0"&gt;crypto&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_6916b2e878322eabb566a0420c20b6820f8ec89f_ipsec:1"&gt;ipsec&lt;/SPAN&gt; ikev1 transform-set ESP-AES-192-MD5 &lt;SPAN class="GRcorrect" id="GRmark_6916b2e878322eabb566a0420c20b6820f8ec89f_esp:2"&gt;esp&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_6916b2e878322eabb566a0420c20b6820f8ec89f_aes:3"&gt;aes&lt;/SPAN&gt;-192 &lt;SPAN class="GRcorrect" id="GRmark_6916b2e878322eabb566a0420c20b6820f8ec89f_esp:4"&gt;esp&lt;/SPAN&gt;-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_819b3b816ecf1fcadf0a2be8f8721c19e9796917_crypto:0"&gt;crypto&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_819b3b816ecf1fcadf0a2be8f8721c19e9796917_ipsec:1"&gt;ipsec&lt;/SPAN&gt; ikev1 transform-set ESP-AES-256-MD5 &lt;SPAN class="GRcorrect" id="GRmark_819b3b816ecf1fcadf0a2be8f8721c19e9796917_esp:2"&gt;esp&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_819b3b816ecf1fcadf0a2be8f8721c19e9796917_aes:3"&gt;aes&lt;/SPAN&gt;-256 &lt;SPAN class="GRcorrect" id="GRmark_819b3b816ecf1fcadf0a2be8f8721c19e9796917_esp:4"&gt;esp&lt;/SPAN&gt;-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_40d9fb3f074d2d1e8920300716e38f7f3bb9e169_crypto:0"&gt;crypto&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_40d9fb3f074d2d1e8920300716e38f7f3bb9e169_ipsec:1"&gt;ipsec&lt;/SPAN&gt; ikev2 &lt;SPAN class="GRcorrect" id="GRmark_40d9fb3f074d2d1e8920300716e38f7f3bb9e169_ipsec:2"&gt;ipsec&lt;/SPAN&gt;-proposal AES256&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_896207dffd66a6877736b96527afd0c6108cf685_protocol:0"&gt;protocol&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_896207dffd66a6877736b96527afd0c6108cf685_esp:1"&gt;esp&lt;/SPAN&gt; encryption &lt;SPAN class="GRcorrect" id="GRmark_896207dffd66a6877736b96527afd0c6108cf685_aes:2"&gt;aes&lt;/SPAN&gt;-256&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_protocol:0"&gt;protocol&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_esp:1"&gt;esp&lt;/SPAN&gt; integrity &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_sha:2"&gt;sha&lt;/SPAN&gt;-1 md5&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c0645a0563fc3978a1f4cf87924cedcbfce69982_crypto:0"&gt;crypto&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_c0645a0563fc3978a1f4cf87924cedcbfce69982_ipsec:1"&gt;ipsec&lt;/SPAN&gt; ikev2 &lt;SPAN class="GRcorrect" id="GRmark_c0645a0563fc3978a1f4cf87924cedcbfce69982_ipsec:2"&gt;ipsec&lt;/SPAN&gt;-proposal AES192&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_e675f923f12cf77819fc985a19c6d23ffbeccb5a_protocol:0"&gt;protocol&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_e675f923f12cf77819fc985a19c6d23ffbeccb5a_esp:1"&gt;esp&lt;/SPAN&gt; encryption &lt;SPAN class="GRcorrect" id="GRmark_e675f923f12cf77819fc985a19c6d23ffbeccb5a_aes:2"&gt;aes&lt;/SPAN&gt;-192&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_protocol:0"&gt;protocol&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_esp:1"&gt;esp&lt;/SPAN&gt; integrity &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_sha:2"&gt;sha&lt;/SPAN&gt;-1 md5&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c9ae8c1810850817eb542bf60fedd1f38373a8e5_crypto:0"&gt;crypto&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_c9ae8c1810850817eb542bf60fedd1f38373a8e5_ipsec:1"&gt;ipsec&lt;/SPAN&gt; ikev2 &lt;SPAN class="GRcorrect" id="GRmark_c9ae8c1810850817eb542bf60fedd1f38373a8e5_ipsec:2"&gt;ipsec&lt;/SPAN&gt;-proposal AES&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_cba272bc7b44aee30403299828aec66c60c45b56_protocol:0"&gt;protocol&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_cba272bc7b44aee30403299828aec66c60c45b56_esp:1"&gt;esp&lt;/SPAN&gt; encryption &lt;SPAN class="GRcorrect" id="GRmark_cba272bc7b44aee30403299828aec66c60c45b56_aes:2"&gt;aes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_protocol:0"&gt;protocol&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_esp:1"&gt;esp&lt;/SPAN&gt; integrity &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_sha:2"&gt;sha&lt;/SPAN&gt;-1 md5&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_88cd572a9ba346ab8d99ff7c28543882ea3ed2c1_crypto:0"&gt;crypto&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88cd572a9ba346ab8d99ff7c28543882ea3ed2c1_ipsec:1"&gt;ipsec&lt;/SPAN&gt; ikev2 &lt;SPAN class="GRcorrect" id="GRmark_88cd572a9ba346ab8d99ff7c28543882ea3ed2c1_ipsec:2"&gt;ipsec&lt;/SPAN&gt;-proposal 3DES&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_ee48a2518add1994b877db75839ef7e1bc8cacd0_protocol:0"&gt;protocol&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_ee48a2518add1994b877db75839ef7e1bc8cacd0_esp:1"&gt;esp&lt;/SPAN&gt; encryption 3des&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_protocol:0"&gt;protocol&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_esp:1"&gt;esp&lt;/SPAN&gt; integrity &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_sha:2"&gt;sha&lt;/SPAN&gt;-1 md5&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6acc15b8e148c8d9e528c4b6a20e48144cba9990_crypto:0"&gt;crypto&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_6acc15b8e148c8d9e528c4b6a20e48144cba9990_ipsec:1"&gt;ipsec&lt;/SPAN&gt; ikev2 &lt;SPAN class="GRcorrect" id="GRmark_6acc15b8e148c8d9e528c4b6a20e48144cba9990_ipsec:2"&gt;ipsec&lt;/SPAN&gt;-proposal DES&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_2c4721cb18199b986b3340d93d265b0c44a6e9bb_protocol:0"&gt;protocol&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_2c4721cb18199b986b3340d93d265b0c44a6e9bb_esp:1"&gt;esp&lt;/SPAN&gt; encryption des&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_protocol:0"&gt;protocol&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_esp:1"&gt;esp&lt;/SPAN&gt; integrity &lt;SPAN class="GRcorrect" id="GRmark_858462968660d23c7f6c82a5312fcc4714482dfe_sha:2"&gt;sha&lt;/SPAN&gt;-1 md5&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7dcad2c005de177a60e416940f83afb000a6cef1_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 1 match address outside_cryptomap&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c809896bab1efb834f8c2a54287af7a00d8cd2d7_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 1 set &lt;SPAN class="GRcorrect" id="GRmark_c809896bab1efb834f8c2a54287af7a00d8cd2d7_pfs:1"&gt;pfs&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_79f36eec2331717e7f0f790cd7d0e16001c40b2c_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 1 set peer xxxxxx.com &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7dbc59de859ed812695f5e65dbd1115d2cf15a47_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_380580ef97fd26ff1aaa13e3ec642a0a896d8c7b_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 1 set ikev2 &lt;SPAN class="GRcorrect" id="GRmark_380580ef97fd26ff1aaa13e3ec642a0a896d8c7b_ipsec:1"&gt;ipsec&lt;/SPAN&gt;-proposal AES256 AES192 AES 3DES DES&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_d00e9498945c81b19fb3121904ef46a22821adfc_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 2 match address outside_cryptomap_1&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_bdb56f85785a13eced092d0bf002cde1742a3116_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 2 set &lt;SPAN class="GRcorrect" id="GRmark_bdb56f85785a13eced092d0bf002cde1742a3116_pfs:1"&gt;pfs&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_473385f9d6d2bc19c05bce01e2e83bcef72a6d12_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 2 set peer xxxxxx.com &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2c4c40d05e3656262377e7cff7579acf20f940fa_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_de5da4b736c675b114f6655a544706bbb70b3daf_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 2 set ikev2 &lt;SPAN class="GRcorrect" id="GRmark_de5da4b736c675b114f6655a544706bbb70b3daf_ipsec:1"&gt;ipsec&lt;/SPAN&gt;-proposal AES256 AES192 AES 3DES DES&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2e04962df3412247083b468bc8ab885219165484_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 3 match address outside_cryptomap_2&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_90f295fc9008a745096a33cc8b05078173dd271b_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 3 set peer xxxxxx.com &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7f80148631e6e17ff17c66743ed712f9fdbf62f9_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 3 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_4c9cd08d6a928314c92f4520e4640eef97edd227_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 3 set ikev2 &lt;SPAN class="GRcorrect" id="GRmark_4c9cd08d6a928314c92f4520e4640eef97edd227_ipsec:1"&gt;ipsec&lt;/SPAN&gt;-proposal DES 3DES AES AES192 AES256&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_abe4bb433077e029788e525fabcee521f9fc6fad_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map 3 set ikev2 pre-shared-key *****&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f05b34d259116b028024ad9ae4fa824b740005e5_crypto:0"&gt;crypto&lt;/SPAN&gt; map outside_map interface outside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7d51a58aa420482f9f0895ca55370711be08b696_crypto:0"&gt;crypto&lt;/SPAN&gt; map pnt_map 1 match address pnt_cryptomap&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_dff8575d326ae3564b4b276dd659b79a06913350_crypto:0"&gt;crypto&lt;/SPAN&gt; map pnt_map 1 set peer xxxxxx.com &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_8e97dcfc69146f10545d8995cd31b1cc226b536f_crypto:0"&gt;crypto&lt;/SPAN&gt; map pnt_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a14e7c646fde3bb360f77bbfcffcdc7717805e1a_crypto:0"&gt;crypto&lt;/SPAN&gt; map pnt_map 1 set ikev2 &lt;SPAN class="GRcorrect" id="GRmark_a14e7c646fde3bb360f77bbfcffcdc7717805e1a_ipsec:1"&gt;ipsec&lt;/SPAN&gt;-proposal AES256 AES192 AES 3DES DES&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_1d2bad9437b6a668e81bb2416d49e715d4789e9f_crypto:0"&gt;crypto&lt;/SPAN&gt; map pnt_map interface &lt;SPAN class="GRcorrect" id="GRmark_1d2bad9437b6a668e81bb2416d49e715d4789e9f_pnt:1"&gt;pnt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c55e2361215cd126331963a23626d548f97641d2_crypto:0"&gt;crypto&lt;/SPAN&gt; isakmp identity hostname &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_fc2b74e30e3cf87f498668476ac3d638b9a71f13_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev2 policy 1&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_7860c2b737227ba6716f1f4a9272c3dc0defea18_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_7860c2b737227ba6716f1f4a9272c3dc0defea18_aes:1"&gt;aes&lt;/SPAN&gt;-256&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_397975d945acb370302871d2108dcea2f20fd584_integrity:0"&gt;integrity&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_397975d945acb370302871d2108dcea2f20fd584_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_43216545e8f8c60bca48e6c4c1b5112da8c70b45_group:0"&gt;group&lt;/SPAN&gt; 5 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f489085dc3bdbd870b31c147341f458624e983fb_prf:0"&gt;prf&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_f489085dc3bdbd870b31c147341f458624e983fb_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_4ef6c13302a4ee1de0288c03bc7201bd81a6f9ce_lifetime:0"&gt;lifetime&lt;/SPAN&gt; seconds 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_bbacafb2637a16dabf6c5ccc9a268906f70204b7_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev2 policy 10&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_2564862e63dd5b6a072a6d710db07ea741c73aa6_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_2564862e63dd5b6a072a6d710db07ea741c73aa6_aes:1"&gt;aes&lt;/SPAN&gt;-192&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_397975d945acb370302871d2108dcea2f20fd584_integrity:0"&gt;integrity&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_397975d945acb370302871d2108dcea2f20fd584_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_43216545e8f8c60bca48e6c4c1b5112da8c70b45_group:0"&gt;group&lt;/SPAN&gt; 5 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f489085dc3bdbd870b31c147341f458624e983fb_prf:0"&gt;prf&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_f489085dc3bdbd870b31c147341f458624e983fb_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_4ef6c13302a4ee1de0288c03bc7201bd81a6f9ce_lifetime:0"&gt;lifetime&lt;/SPAN&gt; seconds 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_9a2e23c1d73a5e8be3e94eaf39eaa15f995f3a13_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev2 policy 20&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_b7884d8eae311fadc989c68bc877be6104af248e_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_b7884d8eae311fadc989c68bc877be6104af248e_aes:1"&gt;aes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_397975d945acb370302871d2108dcea2f20fd584_integrity:0"&gt;integrity&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_397975d945acb370302871d2108dcea2f20fd584_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_43216545e8f8c60bca48e6c4c1b5112da8c70b45_group:0"&gt;group&lt;/SPAN&gt; 5 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f489085dc3bdbd870b31c147341f458624e983fb_prf:0"&gt;prf&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_f489085dc3bdbd870b31c147341f458624e983fb_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_4ef6c13302a4ee1de0288c03bc7201bd81a6f9ce_lifetime:0"&gt;lifetime&lt;/SPAN&gt; seconds 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_37d46b30b00069f8a7bad54bb37868898982ede4_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev2 policy 30&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_8e3f5158820a8b59e800f0fa22372157ce455a0f_encryption:0"&gt;encryption&lt;/SPAN&gt; 3des&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_397975d945acb370302871d2108dcea2f20fd584_integrity:0"&gt;integrity&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_397975d945acb370302871d2108dcea2f20fd584_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_43216545e8f8c60bca48e6c4c1b5112da8c70b45_group:0"&gt;group&lt;/SPAN&gt; 5 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f489085dc3bdbd870b31c147341f458624e983fb_prf:0"&gt;prf&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_f489085dc3bdbd870b31c147341f458624e983fb_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_4ef6c13302a4ee1de0288c03bc7201bd81a6f9ce_lifetime:0"&gt;lifetime&lt;/SPAN&gt; seconds 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5a50cc05c75126bc839608513cc07e0b27831e90_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev2 policy 40&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_d10f3d2650139d03b2e236b058ae11767ee83908_encryption:0"&gt;encryption&lt;/SPAN&gt; des&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_397975d945acb370302871d2108dcea2f20fd584_integrity:0"&gt;integrity&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_397975d945acb370302871d2108dcea2f20fd584_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_43216545e8f8c60bca48e6c4c1b5112da8c70b45_group:0"&gt;group&lt;/SPAN&gt; 5 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_f489085dc3bdbd870b31c147341f458624e983fb_prf:0"&gt;prf&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_f489085dc3bdbd870b31c147341f458624e983fb_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_4ef6c13302a4ee1de0288c03bc7201bd81a6f9ce_lifetime:0"&gt;lifetime&lt;/SPAN&gt; seconds 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e1540cbe29f31e76b987d28aad80371f8ba008eb_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev2 enable outside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e8f65ab74ac40c959a81e195cd5846c58afd97f7_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev2 enable &lt;SPAN class="GRcorrect" id="GRmark_e8f65ab74ac40c959a81e195cd5846c58afd97f7_pnt:1"&gt;pnt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_99b629615f799ead9f7a371332b0028687afbaad_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 enable outside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_4b91f7161c4d70d51b73ece2a4bd897ad90cc7db_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 enable &lt;SPAN class="GRcorrect" id="GRmark_4b91f7161c4d70d51b73ece2a4bd897ad90cc7db_pnt:1"&gt;pnt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2ab8247865c968c2a4c5941e04cb9078a61e4056_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 10&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_443971d36d956257161db350f1f1fd3b7d1bf223_authentication:0"&gt;authentication&lt;/SPAN&gt; crack&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_7860c2b737227ba6716f1f4a9272c3dc0defea18_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_7860c2b737227ba6716f1f4a9272c3dc0defea18_aes:1"&gt;aes&lt;/SPAN&gt;-256&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f258f19d3ab24333ddcc0bf53afe3c696c3cda68_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 20&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_authentication:0"&gt;authentication&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_rsa:1"&gt;rsa&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_sig:2"&gt;sig&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_7860c2b737227ba6716f1f4a9272c3dc0defea18_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_7860c2b737227ba6716f1f4a9272c3dc0defea18_aes:1"&gt;aes&lt;/SPAN&gt;-256&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5149dd230ee511f1c6e77d9c55fb4ed165af1ba0_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 30&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_authentication:0"&gt;authentication&lt;/SPAN&gt; pre-&lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_share:1"&gt;share&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_7860c2b737227ba6716f1f4a9272c3dc0defea18_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_7860c2b737227ba6716f1f4a9272c3dc0defea18_aes:1"&gt;aes&lt;/SPAN&gt;-256&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_11d2ab3fdd2688cb7c140b9421bbbb1e315bac1f_group:0"&gt;group&lt;/SPAN&gt; 5&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0e3c3cbcbacac411fa19dba43b9c5a8daf5244f9_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 40&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_443971d36d956257161db350f1f1fd3b7d1bf223_authentication:0"&gt;authentication&lt;/SPAN&gt; crack&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_2564862e63dd5b6a072a6d710db07ea741c73aa6_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_2564862e63dd5b6a072a6d710db07ea741c73aa6_aes:1"&gt;aes&lt;/SPAN&gt;-192&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e13811b3f6285203d571fdc479d31d86785cec51_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 50&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_authentication:0"&gt;authentication&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_rsa:1"&gt;rsa&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_sig:2"&gt;sig&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_2564862e63dd5b6a072a6d710db07ea741c73aa6_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_2564862e63dd5b6a072a6d710db07ea741c73aa6_aes:1"&gt;aes&lt;/SPAN&gt;-192&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c4e276e6d439ffa12f2226ded1e17a78f42dea31_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 60&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_authentication:0"&gt;authentication&lt;/SPAN&gt; pre-&lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_share:1"&gt;share&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_2564862e63dd5b6a072a6d710db07ea741c73aa6_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_2564862e63dd5b6a072a6d710db07ea741c73aa6_aes:1"&gt;aes&lt;/SPAN&gt;-192&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_3e5d462fe650afe4b57790d4b8ef7041d3a377e9_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 70&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_443971d36d956257161db350f1f1fd3b7d1bf223_authentication:0"&gt;authentication&lt;/SPAN&gt; crack&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_b7884d8eae311fadc989c68bc877be6104af248e_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_b7884d8eae311fadc989c68bc877be6104af248e_aes:1"&gt;aes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_bcec86008431676ebc36f19e89c5bf9a4d07a69c_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 80&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_authentication:0"&gt;authentication&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_rsa:1"&gt;rsa&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_sig:2"&gt;sig&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_b7884d8eae311fadc989c68bc877be6104af248e_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_b7884d8eae311fadc989c68bc877be6104af248e_aes:1"&gt;aes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c6cf171dea2bf9cf4156a40ff2856dca85a32649_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 90&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_authentication:0"&gt;authentication&lt;/SPAN&gt; pre-&lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_share:1"&gt;share&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_b7884d8eae311fadc989c68bc877be6104af248e_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_b7884d8eae311fadc989c68bc877be6104af248e_aes:1"&gt;aes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7102ddc7ddd4cd3854f785528ceab3ae270cf588_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 100&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_443971d36d956257161db350f1f1fd3b7d1bf223_authentication:0"&gt;authentication&lt;/SPAN&gt; crack&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_8e3f5158820a8b59e800f0fa22372157ce455a0f_encryption:0"&gt;encryption&lt;/SPAN&gt; 3des&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_beede40309cb75ca3f8a5b96af0cb9adc0ed0ed8_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 110&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_authentication:0"&gt;authentication&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_rsa:1"&gt;rsa&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_sig:2"&gt;sig&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_8e3f5158820a8b59e800f0fa22372157ce455a0f_encryption:0"&gt;encryption&lt;/SPAN&gt; 3des&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_60dce2b75d9d92abb9734f8ba2001da8dee2c01e_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 120&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_authentication:0"&gt;authentication&lt;/SPAN&gt; pre-&lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_share:1"&gt;share&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_8e3f5158820a8b59e800f0fa22372157ce455a0f_encryption:0"&gt;encryption&lt;/SPAN&gt; 3des&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_1ee06e554b3b850f94c25ccec7ef4c834898ee6f_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 130&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_443971d36d956257161db350f1f1fd3b7d1bf223_authentication:0"&gt;authentication&lt;/SPAN&gt; crack&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_d10f3d2650139d03b2e236b058ae11767ee83908_encryption:0"&gt;encryption&lt;/SPAN&gt; des&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_1f3a227ec5be7a3c6a718e815e3588081c8cfb2a_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 140&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_authentication:0"&gt;authentication&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_rsa:1"&gt;rsa&lt;/SPAN&gt;-&lt;SPAN class="GRcorrect" id="GRmark_15e56e93d76824533d96b2b39febc86e67f7b803_sig:2"&gt;sig&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_d10f3d2650139d03b2e236b058ae11767ee83908_encryption:0"&gt;encryption&lt;/SPAN&gt; des&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7014126426b6c9ee044ef346cd30ec631d6b30d4_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 150&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_authentication:0"&gt;authentication&lt;/SPAN&gt; pre-&lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_share:1"&gt;share&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_d10f3d2650139d03b2e236b058ae11767ee83908_encryption:0"&gt;encryption&lt;/SPAN&gt; des&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_hash:0"&gt;hash&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_88358648156ffd5987f1df5e5493f03959f0fe53_sha:1"&gt;sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a88f2648bfe2e92846c84228daf7650c32d72520_group:0"&gt;group&lt;/SPAN&gt; 2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7a21a6afa59b7d628863f76aaea21000d32a4638_crypto:0"&gt;crypto&lt;/SPAN&gt; ikev1 policy 160&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_authentication:0"&gt;authentication&lt;/SPAN&gt; pre-&lt;SPAN class="GRcorrect" id="GRmark_1eda859c19e6dd5c1c1c458e19c1d752ed3d3a88_share:1"&gt;share&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_b7884d8eae311fadc989c68bc877be6104af248e_encryption:0"&gt;encryption&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_b7884d8eae311fadc989c68bc877be6104af248e_aes:1"&gt;aes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_419560b444a700dc6f9beda41b8b8b56a7ecc87f_hash:0"&gt;hash&lt;/SPAN&gt; md5&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_11d2ab3fdd2688cb7c140b9421bbbb1e315bac1f_group:0"&gt;group&lt;/SPAN&gt; 5&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_5dbee8c73da974697c9bb06f19966984dc45db35_lifetime:0"&gt;lifetime&lt;/SPAN&gt; 86400&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c02308bb2f75a28c4e68425d2fb3693954acd505_telnet:0"&gt;telnet&lt;/SPAN&gt; timeout 5&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_88b99f156d2effcfe1942b762c8b1ae7e65e9db9_ssh:0"&gt;ssh&lt;/SPAN&gt; 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_723ad9e53b18719db934b7eacf5a4a08558f8fe0_ssh:0"&gt;ssh&lt;/SPAN&gt; 0.0.0.0 0.0.0.0 management&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_8afc736a5822763cae3d74006079115f49722fe2_ssh:0"&gt;ssh&lt;/SPAN&gt; timeout 30&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_00407ffe07161ef646caef1dd9dabedf588615fc_ssh:0"&gt;ssh&lt;/SPAN&gt; version 2&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5e7ffa07169a60bf45c06e7b08a3360bdae21bf6_ssh:0"&gt;ssh&lt;/SPAN&gt; key-exchange group &lt;SPAN class="GRcorrect" id="GRmark_5e7ffa07169a60bf45c06e7b08a3360bdae21bf6_dh:1"&gt;dh&lt;/SPAN&gt;-group1-sha1&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f6689242d09a7420d283342f77d1a8dcf71b20af_console:0"&gt;console&lt;/SPAN&gt; timeout 0&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e7618cc033fb2c55bb672e599df6ce0613cc3a90_threat:0"&gt;threat&lt;/SPAN&gt;-detection basic-threat&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f9f0dd54020aa48f1217d73914c757be92edf0d6_threat:0"&gt;threat&lt;/SPAN&gt;-detection scanning-threat&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_15c6de48503fbed5a64415d4879bbe164a2ff0eb_threat:0"&gt;threat&lt;/SPAN&gt;-detection statistics access-list&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_3c28b14ce322d49b6c386e500fdac7a94688a53a_no:0"&gt;no&lt;/SPAN&gt; threat-detection statistics &lt;SPAN class="GRcorrect" id="GRmark_3c28b14ce322d49b6c386e500fdac7a94688a53a_tcp:1"&gt;tcp&lt;/SPAN&gt;-intercept&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_886297b6887ad1afe7510670b3157c5d5190a5d2_ntp:0"&gt;ntp&lt;/SPAN&gt; authenticate&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6eb469ce4e0a1997fb1b0bb1eb1c941e7d1fb6c0_ntp:0"&gt;ntp&lt;/SPAN&gt; server 198.60.22.240 source outside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_1b368919a6d0c7984717e86643e4efe1035c45ff_ntp:0"&gt;ntp&lt;/SPAN&gt; server 24.56.178.140 source outside &lt;SPAN class="GRcorrect" id="GRmark_1b368919a6d0c7984717e86643e4efe1035c45ff_prefer:1"&gt;prefer&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0b8750ba2f080deb24f1353dc30d6a71c1f36e68_webvpn:0"&gt;webvpn&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_b474b1e5c4f0a0e49d3a219c2751972e80395557_class:0"&gt;class&lt;/SPAN&gt;-map inspection_default&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_124860e8eed97b56ee05e700ea752d505585d9e7_match:0"&gt;match&lt;/SPAN&gt; default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_766900f3bcac2b4ba798a6faba896bfe4b3a0ddf_policy:0"&gt;policy&lt;/SPAN&gt;-map global_policy&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_8d68b899657866cc84cd43c48337605f46c7abd9_class:0"&gt;class&lt;/SPAN&gt; inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_da93a71f4900a2865de9bf126c156bc3069010ab_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_da93a71f4900a2865de9bf126c156bc3069010ab_ftp:1"&gt;ftp&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_f06d9c458a99f2841530ea142cfc7b075f567474_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_f06d9c458a99f2841530ea142cfc7b075f567474_pptp:1"&gt;pptp&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_db9f3f205dcc25036e7a1fd31f2f5e2c0d232081_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_db9f3f205dcc25036e7a1fd31f2f5e2c0d232081_dns:1"&gt;dns&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_7a792c754bbfe8392767a7b20a07573bf2f46eff_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_7a792c754bbfe8392767a7b20a07573bf2f46eff_esmtp:1"&gt;esmtp&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_16fda92547a52ea8b7ccfdc837aa1bffc71f9283_inspect:0"&gt;inspect&lt;/SPAN&gt; h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_145c8ec90596ea9a2f384af84ac1f1a6203af70c_inspect:0"&gt;inspect&lt;/SPAN&gt; h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_75b86840280553108d2fd327d6e508d1c26b508f_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_75b86840280553108d2fd327d6e508d1c26b508f_icmp:1"&gt;icmp&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_3805be307387a9379b456838ed02e8d7d3ce78ce_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_3805be307387a9379b456838ed02e8d7d3ce78ce_ip:1"&gt;ip&lt;/SPAN&gt;-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_0d6a6f771e043ef6b99663e8680f12b303e59517_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_0d6a6f771e043ef6b99663e8680f12b303e59517_netbios:1"&gt;netbios&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_35476f3747482fa963bb0cca579251433ec0aa7e_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_35476f3747482fa963bb0cca579251433ec0aa7e_rsh:1"&gt;rsh&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_19d373729d690f7c2f87461362889381a8030b37_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_19d373729d690f7c2f87461362889381a8030b37_rtsp:1"&gt;rtsp&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_2e73f1ab351ad9ec5deb6294cb01dd7e602b5b9e_inspect:0"&gt;inspect&lt;/SPAN&gt; sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_c3d63b73cad953169a0e92c93c29fef877f6e985_inspect:0"&gt;inspect&lt;/SPAN&gt; skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_475d0f5cb00894f2021fe9d41d8ecc712a0275be_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_475d0f5cb00894f2021fe9d41d8ecc712a0275be_sqlnet:1"&gt;sqlnet&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_005dd0dac1d59c9a199f9bc485cfb099b80c43c4_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_005dd0dac1d59c9a199f9bc485cfb099b80c43c4_tftp:1"&gt;tftp&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_42838d12d6ea7043e03b8c260aa8e3f6fee178d9_inspect:0"&gt;inspect&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_42838d12d6ea7043e03b8c260aa8e3f6fee178d9_xdmcp:1"&gt;xdmcp&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_de5aa291d73fdc829ff2be796010de06e9e5ac8a_service:0"&gt;service&lt;/SPAN&gt;-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_10a72206c9cdc538e3115a87b330f0f91e2f8343_prompt:0"&gt;prompt&lt;/SPAN&gt; hostname context &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_8b90ebeef2e9b31ed8c9e251ca83d8556aed8dea_no:0"&gt;no&lt;/SPAN&gt; call-home reporting anonymous&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a4d63a469e9af61c8f95278682a8cbaf38bdd3e7_call:0"&gt;call&lt;/SPAN&gt;-home&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_e7c693298f76cf330c2b051d51a929f3b7762685_profile:0"&gt;profile&lt;/SPAN&gt; CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_f36a5320887a339fc41e42a931adb9d5b93c0a67_no:0"&gt;no&lt;/SPAN&gt; active&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_c1775592761e1cd309d7d9830e00e357776a7062_destination:0"&gt;destination&lt;/SPAN&gt;&lt;SPAN&gt; address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_9037ad409da1f797fa551b0bc7ba8e4e38caf100_destination:0"&gt;destination&lt;/SPAN&gt;&lt;SPAN&gt; address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_5251a334da7a4ecb8208d6245904d3302e618843_destination:0"&gt;destination&lt;/SPAN&gt; transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_2618945cf91e5686c734dd61ca64f572c910c2bf_subscribe:0"&gt;subscribe&lt;/SPAN&gt;-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_9a01c67c150d537fc7d0f5d02bcc094b18d8d9aa_subscribe:0"&gt;subscribe&lt;/SPAN&gt;-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_976733c102c99f8df8c2264f4d6b1fe336d56185_subscribe:0"&gt;subscribe&lt;/SPAN&gt;-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_0ace2d6d62c0f99c8452bf126cfe4d69e456cf97_subscribe:0"&gt;subscribe&lt;/SPAN&gt;-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_a335937ae3dd25537f4f235817fbf6654b5b195f_subscribe:0"&gt;subscribe&lt;/SPAN&gt;-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:f342f2f5eb01030afdae7406e6db54ad&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;denvwasa# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 23:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001419#M401440</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2012-07-30T23:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forwarda and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001420#M401441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;past config of the 3750&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;show ip route&lt;/P&gt;&lt;P&gt;show cdp nei &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 00:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001420#M401441</guid>
      <dc:creator>Vincenzo Errante</dc:creator>
      <dc:date>2012-07-31T00:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forwarda and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001421#M401442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config for C3750G:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C3750-DENVW-01#sho run&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 4264 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;! Last configuration change at 16:30:09 UTC Mon Jul 30 2012 by &lt;SPAN class="GRcorrect" id="GRmark_1158b3e85ecedefb774e6537b4b9b25ba72ff210_kcox:0"&gt;kcox&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;! NVRAM config last updated at 16:01:59 UTC Mon Jul 30 2012 by &lt;SPAN class="GRcorrect" id="GRmark_c292727be206b397f56ba4425a9b97dbcb99b23e_kcox:0"&gt;kcox&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_b9b9aa5b0be0cde5ab1a2e7f8fa467cd35512868_version:0"&gt;version&lt;/SPAN&gt; 12.2&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_efb27ed9a70c3980f4e1bc2ceb0d76bf4d2915e4_no:0"&gt;no&lt;/SPAN&gt; service pad&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f9ff3e058aaf85a0b0f7aeef5a33d5d3b855365c_service:0"&gt;service&lt;/SPAN&gt; timestamps debug uptime&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_331e86db78603073b32c0bc29e543be96cf5bd47_service:0"&gt;service&lt;/SPAN&gt; timestamps log uptime&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6ffe5e388f143faeac142114d4f65c55edc01323_service:0"&gt;service&lt;/SPAN&gt; password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e3eead04bd14314afc8f5497c8e065c8169e4959_hostname:0"&gt;hostname&lt;/SPAN&gt; C3750-DENVW-01&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_165826b92ebdb5dd457835f65d9e96d83b12ffae_boot:0"&gt;boot&lt;/SPAN&gt;-start-marker&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_062af18071b880929567ac54bd27919d86e7a785_boot:0"&gt;boot&lt;/SPAN&gt;-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a5b888e8d5e2829c1566557512b9883d52f7e4d9_enable:0"&gt;enable&lt;/SPAN&gt; secret 5 $1$UAhv$cX6ByriVR0ngZmxxxxxxxxx&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0e7c712b41cd4b392ef68fcd225263ebd455fc38_enable:0"&gt;enable&lt;/SPAN&gt; password 7 122E0F15002B0808793236786321xxxxxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7edd619caf899c60eb368a469bb6ab2b935a350c_username:0"&gt;username&lt;/SPAN&gt; xxxxxx privilege 15 secret 5 $1$HMwG$X2o2pt0Y9EB8&lt;SPAN class="GRcorrect" id="GRmark_7edd619caf899c60eb368a469bb6ab2b935a350c_.:1"&gt;.&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_7edd619caf899c60eb368a469bb6ab2b935a350c_qxxxxxxxxxx:2"&gt;qxxxxxxxxxx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_14bd2c67c00d74dd483518ff858b64c3df340fa7_aaa:0"&gt;aaa&lt;/SPAN&gt; new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_493f56bb14e81d160ec57089ac833ca71dcd9723_aaa:0"&gt;aaa&lt;/SPAN&gt; session-id common&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0865ebf0174beea5e1d4a90f0c8612a192688d8a_switch:0"&gt;switch&lt;/SPAN&gt; 1 provision &lt;SPAN class="GRcorrect" id="GRmark_0865ebf0174beea5e1d4a90f0c8612a192688d8a_ws:1"&gt;ws&lt;/SPAN&gt;-c3750g-48ts&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_9afef3037ec82eafbbda25ed1be8bc08ac2eef2c_system:0"&gt;system&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_9afef3037ec82eafbbda25ed1be8bc08ac2eef2c_mtu:1"&gt;mtu&lt;/SPAN&gt; routing 1500&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f7b89c1f99d6497f4b7a2406321ab7230a7d921a_ip:0"&gt;ip&lt;/SPAN&gt; domain-name wjbradley.com&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_abdefad3f50e800d6836278022f734d6e4c177b8_spanning:0"&gt;spanning&lt;/SPAN&gt;-tree mode pvst&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c78c88ccc28e39798dfaab1b86cf37c1bcfcf25d_spanning:0"&gt;spanning&lt;/SPAN&gt;-tree extend system-id&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_72ef636552fa71f1a699f5f8ce06e918a33baf83_vlan:0"&gt;vlan&lt;/SPAN&gt; internal allocation policy ascending&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_ccac8d6e403f7fe41b5953ecde53375ac9dfc070_ip:0"&gt;ip&lt;/SPAN&gt; ssh time-out 60&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2b557c37b7e7f4e2835e1d8d82c5b7558ceb73da_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/1&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_7efbaa40a93690d47f570181bec2bd7d71f6cb18_switchport:0"&gt;switchport&lt;/SPAN&gt; trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_51f9dc1cd4ede9d47f6ae1bf77dd2ffc88a04e6a_switchport:0"&gt;switchport&lt;/SPAN&gt; mode trunk&lt;/P&gt;&lt;P&gt;## connects to Cisco ASA 5510&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a53a31b30ded9f38f77007cb1789ea6d08891fb8_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/2&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_94cc9892461998f820523652f817eb52f64b5e37_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/3&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_fd896981e5a258ae6ea2059c9ed4eb87b836f36c_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/4&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_11028e046b2bc4fb508f27ea70b9dfcc169b36e2_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/5&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_8baffa506e75adbcddc9bce556292ed5f7e30acf_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/6&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c6ecfd492d4c17a3422289ab05f7fb6570421ec9_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/7&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_76d9a1ba64d5fc77096ce00cb46dfab6d8987e5a_speed:0"&gt;speed&lt;/SPAN&gt; 100&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_83157e3d4c09a10dde0186552e674cef17032d88_duplex:0"&gt;duplex&lt;/SPAN&gt; full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_9687679f1ef009018616d8471b2b4d2f91e37715_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/8&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7668b86fc4ded6d05ceac28d14ad7963697b9f52_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/9&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5478c8309702baededd9b2f47e73bece49032a7d_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/10&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e3a5088ca453399ef9208caae9a473658c1d061a_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/11&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f8144d9dce817ed58f4c82bec9896c2aecbb97c5_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/12&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a04d4de2b10ed60cc3852d226ed0dbba8f44a524_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/13&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7afef52b63bbf9ff8e27f07e0178948145ab62de_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/14&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_65d47a6a3154e867a2e21ff29b85bbecd0688b1e_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/15&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_29d0a82631f016a037cb567c7e0451492c0a0ebe_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/16&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f370d63bbb98595bc7621c99c85ec6e23763271c_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/17&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0a9037c7440fdef3231df7d8a514b2f93a83f3d5_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/18&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_65661df77d46b62d260654fb3d856d2b6e9d8ff4_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/19&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_cfee68fe857a6fab09bb5fd6854f0222c452119e_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/20&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_20288fbb89e2d8d10d4adf3eaa2bfb429842282b_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/21&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_8dbf2ff713c2325eff0132f78b78887a6fa440ff_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/22&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_ccad4447977d97612a0cdc956c9b68186600fb8e_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/23&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c8b32d99e59648cda30e2712ac8f3a09f2ef3f25_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/24&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_93a0876489f2fde6c9265008540c9bd28bd27e07_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/25&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_317b222fb3a32e7c1d50fddbd7ca8c7e652e9640_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/26&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_31e6f050ec8ba5389ed7111ef1aafa2f0192da6e_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/27&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_3c94aeb855c79cdf531964182c2a8400cb84f684_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/28&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_684bdf96d4017d1dbfa13389c2191b58bc6719f0_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/29&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_596360d7388c0780e2f3f69a941aca5d8448e064_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/30&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_0fac042dd78bc1fa895b0cf4e175609980cc80c3_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/31&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c1a864a436911c2b96ef9077323195895897436f_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/32&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_41ec66cad93a8707a37f696e07bd27d45f3c9973_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/33&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_89157aab4c1abd1973ca80f7f2668e22affcb315_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/34&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_3502dc1bb0d0279413787bbaf5c1d34b2a599e26_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/35&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_fb76ee4ac91284abf6096723327be2779cae9a39_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/36&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_c8a6fd026b9cd0eec9c59c8d25d85a43e4c2f4ca_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/37&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6efc7aaf98e016c732c48b895dc5042a4a10fee7_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/38&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a7fa812379d3747031a8c26130d17ef976c653c1_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/39&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_3cbab362de82f3cf66909b51a11a045aa712e10a_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/40&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_83458e14387cc87b548ee43353fc8d4241177879_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/41&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_e237669055bec74ec45e356328090963baa7fffc_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/42&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_eac530ad8f7b760bce4a1edc50e51b3b900ca9d8_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/43&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_912f74f859212d27c38a0bbafa61f9df643ac8bc_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/44&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_a79d853044f1e4041ece740cb30455b90d3db460_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/45&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_defef59db5b5ae21104d4d406f0bedeb7de4c093_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/46&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7ee051ccbda2da8523c8d37b7d7d5eec1cb55d8f_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/47&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_ab76c05145a17233ad34b58296cffe99945760b8_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/48&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_18aecef8d7f128e662fc590f119b8c45ad8f123b_switchport:0"&gt;switchport&lt;/SPAN&gt; mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_30e2f59095f64709d2838c945e48d83dfbea3fb6_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/49&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_3f73f6f72b07bb14c4a0ec46e43c983d6381ec79_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_8e79580b0f6f77f569514420f7d2a2d70ae611b7_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/51&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_13c47bc64b50f2f04332a2c85768078db89ee66b_interface:0"&gt;interface&lt;/SPAN&gt; GigabitEthernet1/0/52&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_d4ce85f7c66bd8a07d02ccb992b7d1e28d130847_interface:0"&gt;interface&lt;/SPAN&gt; Vlan1&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_8192f3238580d661810043f3c471f75c3c7c0cef_ip:0"&gt;ip&lt;/SPAN&gt; address 10.1.0.200 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7bd18e2799cf4ede90dc6238f13acb940b37e1f2_ip:0"&gt;ip&lt;/SPAN&gt; default-gateway 10.1.0.1&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_71d9b689fd2be2bb982016a46ff030bcb0af3f6b_no:0"&gt;no&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_71d9b689fd2be2bb982016a46ff030bcb0af3f6b_ip:1"&gt;ip&lt;/SPAN&gt; classless&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_bd0c039fdd033dcdcf08962fb98c9e1eeab93be0_ip:0"&gt;ip&lt;/SPAN&gt; http server&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_f21bd752066848ce0395466e71f0cda67390f7e1_ip:0"&gt;ip&lt;/SPAN&gt; http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_85a4255a9ce56f9547bb1a853cc77a8ec8434be7_ip:0"&gt;ip&lt;/SPAN&gt; route 0.0.0.0 0.0.0.0 10.1.0.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_ea36062b42f711e100170de323d88804b3174215_logging:0"&gt;logging&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_ea36062b42f711e100170de323d88804b3174215_esm:1"&gt;esm&lt;/SPAN&gt; config&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_506496baed4d545ff468f5aee408cda3b19c2325_line:0"&gt;line&lt;/SPAN&gt; con 0&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2b0d37c069e768e227d470a54a0c240512db32a8_line:0"&gt;line&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_2b0d37c069e768e227d470a54a0c240512db32a8_vty:1"&gt;vty&lt;/SPAN&gt; 0 4&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_6e3bfef409204f8a5761f6ffdfb634f08e15597b_password:0"&gt;password&lt;/SPAN&gt; 7 0961411C175447xxxxxx&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_3e1f0111bf53727d1ef8f083001a131ffb7a2bb3_transport:0"&gt;transport&lt;/SPAN&gt; input &lt;SPAN class="GRcorrect" id="GRmark_3e1f0111bf53727d1ef8f083001a131ffb7a2bb3_telnet:1"&gt;telnet&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_38b085d3479778c7fcfafd6738f70d97214432c9_line:0"&gt;line&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_38b085d3479778c7fcfafd6738f70d97214432c9_vty:1"&gt;vty&lt;/SPAN&gt; 5 15&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_b5a5632556759d03940ab8a3c7b96fb972d9ee70_password:0"&gt;password&lt;/SPAN&gt; 7 0961411C1754470xxxxx&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_3e1f0111bf53727d1ef8f083001a131ffb7a2bb3_transport:0"&gt;transport&lt;/SPAN&gt; input &lt;SPAN class="GRcorrect" id="GRmark_3e1f0111bf53727d1ef8f083001a131ffb7a2bb3_telnet:1"&gt;telnet&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_1796dd4d9b2abe8c307bc5494b7d562f3fe1ab23_ntp:0"&gt;ntp&lt;/SPAN&gt; server 198.60.22.240&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7a92f3d26362d6557d5701de77a63a01df61e57f_end:0"&gt;end&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C3750-DENVW-01# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C3750-DENVW-01# &lt;SPAN class="GRcorrect" id="GRmark_b252f15d77c32a03f22aa897668dcc3b1fb06867_sho:0"&gt;sho&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_b252f15d77c32a03f22aa897668dcc3b1fb06867_ip:1"&gt;ip&lt;/SPAN&gt; route&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_9bd1ce90d7ef76473bd3b1b23748b4cffe07c469_Default gateway:0"&gt;Default gateway&lt;/SPAN&gt; is 10.1.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Host&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Last Use&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Uses&amp;nbsp; Interface&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_2050cdaff16d0cfac82f0ec04ebdafe0db0679f7_ICMP redirect cache:0"&gt;ICMP redirect cache&lt;/SPAN&gt; is empty&lt;/P&gt;&lt;P&gt;C3750-DENVW-01#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C3750-DENVW-01#sho cdp nei&lt;/P&gt;&lt;P&gt;Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone, &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - Remote, C - CVTA, M - Two-port Mac Relay &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local Intrfce&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Holdtme&amp;nbsp;&amp;nbsp;&amp;nbsp; Capability&amp;nbsp; Platform&amp;nbsp; Port ID&lt;/P&gt;&lt;P&gt;C3750-DENVW-01#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, I don't think this is a switch issue. I am still seeing the asymmetric NAT issue &lt;SPAN class="GRcorrect" id="GRmark_654ddb1ea067a23b042e7e64ee0cf96cdeca996b_on:0"&gt;on&lt;/SPAN&gt; the firewall itself.&amp;nbsp; Two internal devices on the same switch are showing up in the &lt;SPAN class="GRcorrect" id="GRmark_d93bf58e4f2dd5a747cc2f6c2d2c00dca633f26a_syslog:0"&gt;syslog&lt;/SPAN&gt; of the firewall itself;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_55af188720586d3ffd0549f3f2b8899f05414217_Asymmetric:0"&gt;Asymmetric&lt;/SPAN&gt; NAT rules matched for forward and reverse flows; Connection for &lt;SPAN class="GRcorrect" id="GRmark_55af188720586d3ffd0549f3f2b8899f05414217_tcp:1"&gt;tcp&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_55af188720586d3ffd0549f3f2b8899f05414217_src:2"&gt;src&lt;/SPAN&gt; inside&lt;SPAN class="GRcorrect" id="GRmark_55af188720586d3ffd0549f3f2b8899f05414217_::3"&gt;:&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_55af188720586d3ffd0549f3f2b8899f05414217_10.1.0.8:4"&gt;10.1.0.8&lt;/SPAN&gt;/1798 &lt;SPAN class="GRcorrect" id="GRmark_55af188720586d3ffd0549f3f2b8899f05414217_dstinside:5"&gt;dstinside&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_55af188720586d3ffd0549f3f2b8899f05414217_::6"&gt;:&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_55af188720586d3ffd0549f3f2b8899f05414217_10.1.0.14:7"&gt;10.1.0.14&lt;/SPAN&gt;/25 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Kerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 13:23:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001421#M401442</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2012-07-31T13:23:48Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forwarda and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001422#M401443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;RPF errors are typically NAT related. This type of RPF check must be configured on a per interface basis, which will cause the firewall to examine the source IP of each packet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could refer to this URL for further reference &lt;A _jive_internal="true" href="https://community.cisco.com/thread/2051315"&gt;https://supportforums.cisco.com/thread/2051315&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 13:50:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001422#M401443</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-31T13:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forwarda and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001423#M401444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_6a67a17c64c04a5fd203b16373961691f78c48ab_Ramraj:0"&gt;Ramraj&lt;/SPAN&gt;,&lt;/P&gt;&lt;P&gt;Thanks much for the link.&amp;nbsp; My issue is with servers internal to my network, BOTH being on the inside network. The switch config is just fine, so I do not understand why the error message is showing up in the firewall.&amp;nbsp; This is the same config I have on many other switches and the internal systems are having no issues talking to each other.&amp;nbsp; Just not certain why these NAT errors are showing up on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for &lt;SPAN class="GRspelling"&gt;tcp&lt;/SPAN&gt; &lt;SPAN class="GRspelling"&gt;src&lt;/SPAN&gt;&lt;STRONG&gt; inside&lt;/STRONG&gt;:10.1.0.8/1798 &lt;SPAN class="GRspelling"&gt;dst&lt;/SPAN&gt; &lt;STRONG&gt;inside&lt;/STRONG&gt;:10.1.0.14/25 denied due to NAT reverse path failure&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 14:11:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001423#M401444</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2012-07-31T14:11:48Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forwarda and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001424#M401446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on the syslog the comunication goes from inside to inside (same-subnet) this traffic shouldn't be getting to the ASA since those to host are on the same subnet. The only reason this could be happening is due to proxy-arp, so you can disable proxy-arp on the NAT configuration (add the no-proxy-arp keyword) or disable proxy arp on the inside interface of the ASA (sysopt no-proxy-arp inside)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Luis Silva&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 14:27:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001424#M401446</guid>
      <dc:creator>Luis Silva Benavides</dc:creator>
      <dc:date>2012-07-31T14:27:35Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forwarda and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001425#M401447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Solved.&amp;nbsp; &lt;/P&gt;&lt;P&gt;Turns out that when you first set up NAT statements, i.e. &lt;SPAN class="GRcorrect" id="GRmark_7d1427f9ce528ed1ec23c8824854dec989f3c26a_inside:0"&gt;inside&lt;/SPAN&gt; IP is &lt;SPAN class="GRcorrect" id="GRmark_7d1427f9ce528ed1ec23c8824854dec989f3c26a_NAT'ed:1"&gt;NAT'ed&lt;/SPAN&gt; to an outside IP, the ASDM configures the NAT to be any&lt;SPAN class="GRcorrect" id="GRmark_7d1427f9ce528ed1ec23c8824854dec989f3c26a_,:2"&gt;,&lt;/SPAN&gt;any.&amp;nbsp; This is not recommended with 8.4&lt;SPAN class="GRcorrect" id="GRmark_b354dced0e6486a8136b9c7ac89492d5a5086d38_(:0"&gt;(&lt;/SPAN&gt;4).&lt;/P&gt;&lt;P&gt;Here is a sample packet-tracer output showing this error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;denvwasa# packet-tracer input inside &lt;SPAN class="GRcorrect" id="GRmark_77fd305f2d43ffaa999e000e1ee75baef4417a75_tcp:0"&gt;tcp&lt;/SPAN&gt; 10.1.0.5 80 10.1.0.13 80 detailed &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_8d99f2fe642ee13793409ab1bc71b2920327e8bd_in:0"&gt;in&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp; 10.1.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_8d99f2fe642ee13793409ab1bc71b2920327e8bd_inside:1"&gt;inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_7ed9f28653cec65d65218283b6eda71ea5406e45_in:0"&gt;in&lt;/SPAN&gt;&amp;nbsp; id=0xad86ba78, priority=3, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=23793, user_data=0x0, cs_id=0x0, flags=0x4000, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_src:0"&gt;src&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_dst:0"&gt;dst&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a55e4a136eae4bcf4e237113654acfb4c937a22f_in:0"&gt;in&lt;/SPAN&gt;&amp;nbsp; id=0xad11e1a0, priority=0, domain=inspect-&lt;SPAN class="GRcorrect" id="GRmark_a55e4a136eae4bcf4e237113654acfb4c937a22f_ip:1"&gt;ip&lt;/SPAN&gt;-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3730693, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_src:0"&gt;src&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_dst:0"&gt;dst&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_95b333a12ddf89f795958ccfb69173fa468135de_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_95b333a12ddf89f795958ccfb69173fa468135de_cyberfrost:1"&gt;cyberfrost&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_95b333a12ddf89f795958ccfb69173fa468135de_.:2"&gt;.&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_95b333a12ddf89f795958ccfb69173fa468135de_wjbradley:3"&gt;wjbradley&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_95b333a12ddf89f795958ccfb69173fa468135de_.:4"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;&lt;SPAN class="GRcorrect" id="GRmark_1a8121c596b15ce0bb11322446a30feb69fa4f08_nat:0"&gt;nat&lt;/SPAN&gt; (any&lt;SPAN class="GRcorrect" id="GRmark_1a8121c596b15ce0bb11322446a30feb69fa4f08_,:1"&gt;,&lt;/SPAN&gt;any) static 216.38.206.53&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate &lt;SPAN class="GRcorrect" id="GRmark_1c3bbc43e8202b9069f6164c78a46108c4d6a4aa_10.1.0.5:0"&gt;10.1.0.5&lt;/SPAN&gt;/80 to 216.38.206.53/80&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_c98e3bd71ee0eefad399d74e028f445e0f6ce1d3_in:0"&gt;in&lt;/SPAN&gt;&amp;nbsp; id=0xad1b00a0, priority=6, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=18771, user_data=0xad1af770, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_fec4315c983598e7ddd8de01fd37e6ce626e68ab_src:0"&gt;src&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_fec4315c983598e7ddd8de01fd37e6ce626e68ab_ip:1"&gt;ip&lt;/SPAN&gt;/id=10&lt;SPAN class="GRcorrect" id="GRmark_fec4315c983598e7ddd8de01fd37e6ce626e68ab_.:2"&gt;.&lt;/SPAN&gt;1.0.5, mask=255&lt;SPAN class="GRcorrect" id="GRmark_fec4315c983598e7ddd8de01fd37e6ce626e68ab_.:3"&gt;.&lt;/SPAN&gt;255.255.255, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_dst:0"&gt;dst&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;SPAN class="GRcorrect" id="GRmark_00ec96fdc47eff817793d2eec391aaf3925bb703_rpf:0"&gt;rpf&lt;/SPAN&gt;-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_80ef55bc771c8b4625907602ff69cc11f4c386d2_object:0"&gt;object&lt;/SPAN&gt; network &lt;SPAN class="GRcorrect" id="GRmark_80ef55bc771c8b4625907602ff69cc11f4c386d2_magnoquake:1"&gt;magnoquake&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_80ef55bc771c8b4625907602ff69cc11f4c386d2_.:2"&gt;.&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_80ef55bc771c8b4625907602ff69cc11f4c386d2_wjbradley:3"&gt;wjbradley&lt;/SPAN&gt;&lt;SPAN class="GRcorrect" id="GRmark_80ef55bc771c8b4625907602ff69cc11f4c386d2_.:4"&gt;.&lt;/SPAN&gt;local&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_e2ff9c7c3b5bda644e47580d1e97f3544cadfdc2_nat:0"&gt;nat&lt;/SPAN&gt; (inside&lt;SPAN class="GRcorrect" id="GRmark_e2ff9c7c3b5bda644e47580d1e97f3544cadfdc2_,:1"&gt;,&lt;/SPAN&gt;outside) static 216.38.206.57&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_d6c536e575ace10af35983b6310d31489f836176_out:0"&gt;out&lt;/SPAN&gt; id=0xac8e31c0, priority=6, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=10820, user_data=0xad1b8158, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_src:0"&gt;src&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_e56a98c8b87820fb74ccd203d3a9b4927534e1e9_dst:0"&gt;dst&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_e56a98c8b87820fb74ccd203d3a9b4927534e1e9_ip:1"&gt;ip&lt;/SPAN&gt;/id=10&lt;SPAN class="GRcorrect" id="GRmark_e56a98c8b87820fb74ccd203d3a9b4927534e1e9_.:2"&gt;.&lt;/SPAN&gt;1.0.13, mask=255&lt;SPAN class="GRcorrect" id="GRmark_e56a98c8b87820fb74ccd203d3a9b4927534e1e9_.:3"&gt;.&lt;/SPAN&gt;255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_060083d18c7448d826abe4005632a867d914ab1b_input:0"&gt;input&lt;/SPAN&gt;-interface: inside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_791fab1f6df87d0e75ec1e658a6932e6b8a96b59_input:0"&gt;input&lt;/SPAN&gt;-status: up&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7059d1d4f4d0b4a77684eda05f0ea67ccf309f84_input:0"&gt;input&lt;/SPAN&gt;-line-status: up&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_009d9b14bede8fb485168f4073cf3dfc6ebf1e62_output:0"&gt;output&lt;/SPAN&gt;-interface: inside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_01a054b63684829ef9a74c286e427e1cda2ef043_output:0"&gt;output&lt;/SPAN&gt;-status: up&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5515c04bd674df14fe75bfe5a04dbd6bbf8aafb1_output:0"&gt;output&lt;/SPAN&gt;-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (&lt;SPAN class="GRcorrect" id="GRmark_ef861f3b1bb39aa7dc83d35bf8b4bb1c4e7de6af_acl:0"&gt;acl&lt;/SPAN&gt;-drop) Flow is denied by &lt;SPAN class="GRcorrect" id="GRmark_ef861f3b1bb39aa7dc83d35bf8b4bb1c4e7de6af_configured:1"&gt;configured&lt;/SPAN&gt; rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, after going into the ASDM and configuring each NAT statement to be inside&lt;SPAN class="GRcorrect" id="GRmark_8b302fb58418ca8f3b41b1a9a0a89abe944ea21e_,:0"&gt;,&lt;/SPAN&gt;outside under the NAT, Advanced tabs, then everything &lt;SPAN class="GRcorrect" id="GRmark_8b302fb58418ca8f3b41b1a9a0a89abe944ea21e_works:1"&gt;works&lt;/SPAN&gt; fine and I no longer see the Asymmetric NAT or RPF error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet tracer outside after changing the rule to inside&lt;SPAN class="GRcorrect" id="GRmark_9088998456dc0a1af7ed44f400fa61b187d8f453_,:0"&gt;,&lt;/SPAN&gt;outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;denvwasa# packet-tracer input inside &lt;SPAN class="GRcorrect" id="GRmark_77fd305f2d43ffaa999e000e1ee75baef4417a75_tcp:0"&gt;tcp&lt;/SPAN&gt; 10.1.0.5 80 10.1.0.13 80 detailed &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_8d99f2fe642ee13793409ab1bc71b2920327e8bd_in:0"&gt;in&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp; 10.1.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_8d99f2fe642ee13793409ab1bc71b2920327e8bd_inside:1"&gt;inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_7ed9f28653cec65d65218283b6eda71ea5406e45_in:0"&gt;in&lt;/SPAN&gt;&amp;nbsp; id=0xad86ba78, priority=3, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=23913, user_data=0x0, cs_id=0x0, flags=0x4000, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_src:0"&gt;src&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_dst:0"&gt;dst&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a55e4a136eae4bcf4e237113654acfb4c937a22f_in:0"&gt;in&lt;/SPAN&gt;&amp;nbsp; id=0xad11e1a0, priority=0, domain=inspect-&lt;SPAN class="GRcorrect" id="GRmark_a55e4a136eae4bcf4e237113654acfb4c937a22f_ip:1"&gt;ip&lt;/SPAN&gt;-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3733735, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_src:0"&gt;src&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_dst:0"&gt;dst&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; &lt;SPAN class="GRcorrect" id="GRmark_a55e4a136eae4bcf4e237113654acfb4c937a22f_in:0"&gt;in&lt;/SPAN&gt;&amp;nbsp; id=0xad11e1a0, priority=0, domain=inspect-&lt;SPAN class="GRcorrect" id="GRmark_a55e4a136eae4bcf4e237113654acfb4c937a22f_ip:1"&gt;ip&lt;/SPAN&gt;-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3733737, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_src:0"&gt;src&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_10acafa9df24c86bf301feac726cefecce9fc8e2_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_dst:0"&gt;dst&lt;/SPAN&gt; &lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_ip:1"&gt;ip&lt;/SPAN&gt;/id=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:2"&gt;.&lt;/SPAN&gt;0.0.0, mask=0&lt;SPAN class="GRcorrect" id="GRmark_74b7cb97a58bf6861ff19afd3aa79117fc9b1916_.:3"&gt;.&lt;/SPAN&gt;0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 4326030, packet dispatched to &lt;SPAN class="GRcorrect" id="GRmark_a87e2b5fbde2988ab8a251f9c584b21c9a35bdda_next module:0"&gt;next module&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Module information for forward flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_060083d18c7448d826abe4005632a867d914ab1b_input:0"&gt;input&lt;/SPAN&gt;-interface: inside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_791fab1f6df87d0e75ec1e658a6932e6b8a96b59_input:0"&gt;input&lt;/SPAN&gt;-status: up&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_7059d1d4f4d0b4a77684eda05f0ea67ccf309f84_input:0"&gt;input&lt;/SPAN&gt;-line-status: up&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_009d9b14bede8fb485168f4073cf3dfc6ebf1e62_output:0"&gt;output&lt;/SPAN&gt;-interface: inside&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_01a054b63684829ef9a74c286e427e1cda2ef043_output:0"&gt;output&lt;/SPAN&gt;-status: up&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GRcorrect" id="GRmark_5515c04bd674df14fe75bfe5a04dbd6bbf8aafb1_output:0"&gt;output&lt;/SPAN&gt;-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 14:47:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forwarda-and-reverse-flows/m-p/2001425#M401447</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2012-07-31T14:47:10Z</dc:date>
    </item>
  </channel>
</rss>

