<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: dns through asa returns inspect-dns-invalid-pak in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814766#M489877</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I might now what is the issue, you might be hitting bug ID: CSCsw80103.&lt;/P&gt;&lt;P&gt;By design, Domain Name System (DNS) inspection on Adaptive Security&amp;nbsp; Appliance (ASA) and PIX firewall blocks DNS responses with Truncated&amp;nbsp; flag set.&lt;/P&gt;&lt;P&gt;So you can add this following Policy map&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;policy-map type inspect dns limited-inspection&lt;BR /&gt; parameter&lt;BR /&gt; no nat-rewrite&lt;BR /&gt; no protocol-enforcement &lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;Then &lt;BR /&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# policy-map global_policy&lt;/P&gt;&lt;P&gt;ciscoasa(config-pmap)#&amp;nbsp; class inspection_default&lt;/P&gt;&lt;P&gt;ciscoasa(config-pmap-c)# inspect dns &lt;STRONG&gt;&lt;STRONG&gt;limited-inspection&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before doing that lets confirm if we see the truncated flag set!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to do that can you create a capture and upload the capture here.&lt;/P&gt;&lt;P&gt;access-list test permit udp host test_host host DNS_server&lt;/P&gt;&lt;P&gt;access-list test permit udp host DNS_server host test_host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list test interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capdmz access-list test interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then go to a host on the inside and on a browser:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://10.1.1.2/capture/capin/pcap"&gt;https://10.1.1.2/capture/capin/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://10.1.1.2/capture/capdmz/pcap"&gt;https://10.1.1.2/capture/capdmz/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please upload both files to this discussion!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do please rate helpful posts&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Dec 2011 22:14:19 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2011-12-28T22:14:19Z</dc:date>
    <item>
      <title>dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814759#M489866</link>
      <description>&lt;P&gt;ASA5510, ASA 8.0(4), ASDM 6.1(5), this is a productino ASA with plenty of lookups working through its 3 interfaces - outside, inside, dmz.&amp;nbsp; The problem is a new use.&amp;nbsp; I've segmented a switch on the inside network with a VLAN, and have a workstation routing through the switch to the default VLAN where all other hosts on the inside network reside so far.&amp;nbsp; The ASA inside interface is the default gateway for the inside network.&amp;nbsp; My test worksttion can PING inside hosts, so the static route is OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA 10.1.1.2/16&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DNS Server 10.1.5.1/16&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Switch 10.1.8.20/16&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN 10.7.1.1/16&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;--------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Test Wkst. 10.7.1.10/16&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; But lookups fail, Wireshark says the test workstation sends, the dns server receives and responds, but the test workstation never receives.&amp;nbsp; I used the Packet Tracer tool, it gets to the last step syayin OK then finally "inspect-dns-invalid-pak".&amp;nbsp; I can't find any more there to tell just what is invlid about it.&amp;nbsp; So I'm trying to figure out global inspection.&amp;nbsp; While I'm trying to learn I appreciate any help.&amp;nbsp; Here's an extract from the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns &lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814759#M489866</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2019-03-11T22:07:40Z</dc:date>
    </item>
    <item>
      <title>dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814760#M489867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems like the DNS packets are not being recevided as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inspect-dns-invalid-pak:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This counter will increment when the security&amp;nbsp; appliance detects an invalid DNS packet. For example, a DNS packet with&amp;nbsp; no DNS header, the number of DNS resource records not matching the&amp;nbsp; counter in the header, etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in this case the packets will always be dropped until the DNS packets respect the DNS standard. I think that if you do not inspect DNS you will be able to get the DNS reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you give it a try:&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; no&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Dec 2011 20:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814760#M489867</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-28T20:44:55Z</dc:date>
    </item>
    <item>
      <title>dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814761#M489869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&amp;nbsp; I'm using ASDM.&amp;nbsp; I went to Global Policy \ Inspectin Default \ rule Actions and unchecked DNS, which I thought should prevent inspection.&amp;nbsp; But my packet tool and test-sniffer results did not improve, and running config shows:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So perhaps the next policy map statement after the rules list is still acting on the packets?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Dec 2011 21:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814761#M489869</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2011-12-28T21:13:09Z</dc:date>
    </item>
    <item>
      <title>dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814762#M489871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, it is not acting because we dont have the policy-map type inspect (Deep packet inspection) applied to any policy map of layer 3 and 4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you save the changes over ASDM and run the packet tracer again?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Dec 2011 21:19:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814762#M489871</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-28T21:19:31Z</dc:date>
    </item>
    <item>
      <title>dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814763#M489872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I had applied in the ASDM, but not saved.&amp;nbsp; But now I have also saved running config to flash, and run the packet tracer.&amp;nbsp; The final message is still: (inspect-dns-invalid-pak) DNS inspect invalid packet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Dec 2011 21:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814763#M489872</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2011-12-28T21:24:21Z</dc:date>
    </item>
    <item>
      <title>dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814764#M489874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mcmurphy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do a clear local-host xxxx ( Ip address of the host sending the DNS request)&lt;/P&gt;&lt;P&gt;And give it a try one more time,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Dec 2011 21:32:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814764#M489874</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-28T21:32:41Z</dc:date>
    </item>
    <item>
      <title>dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814765#M489876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I tried it a couple times, using the command-line tool in the asdm; still get the Packet Tracer inspect-dns error.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Dec 2011 21:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814765#M489876</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2011-12-28T21:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814766#M489877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I might now what is the issue, you might be hitting bug ID: CSCsw80103.&lt;/P&gt;&lt;P&gt;By design, Domain Name System (DNS) inspection on Adaptive Security&amp;nbsp; Appliance (ASA) and PIX firewall blocks DNS responses with Truncated&amp;nbsp; flag set.&lt;/P&gt;&lt;P&gt;So you can add this following Policy map&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;policy-map type inspect dns limited-inspection&lt;BR /&gt; parameter&lt;BR /&gt; no nat-rewrite&lt;BR /&gt; no protocol-enforcement &lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;Then &lt;BR /&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# policy-map global_policy&lt;/P&gt;&lt;P&gt;ciscoasa(config-pmap)#&amp;nbsp; class inspection_default&lt;/P&gt;&lt;P&gt;ciscoasa(config-pmap-c)# inspect dns &lt;STRONG&gt;&lt;STRONG&gt;limited-inspection&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before doing that lets confirm if we see the truncated flag set!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to do that can you create a capture and upload the capture here.&lt;/P&gt;&lt;P&gt;access-list test permit udp host test_host host DNS_server&lt;/P&gt;&lt;P&gt;access-list test permit udp host DNS_server host test_host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list test interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capdmz access-list test interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then go to a host on the inside and on a browser:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://10.1.1.2/capture/capin/pcap"&gt;https://10.1.1.2/capture/capin/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://10.1.1.2/capture/capdmz/pcap"&gt;https://10.1.1.2/capture/capdmz/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please upload both files to this discussion!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do please rate helpful posts&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Dec 2011 22:14:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814766#M489877</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-28T22:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814767#M489879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks, I'm working on this this morning.&amp;nbsp; I'll upload with another reply when I have them ready.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 14:00:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814767#M489879</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2011-12-29T14:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814768#M489881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I"m trying the ASDM Packet Capture Wizard.&amp;nbsp; It does not allow for the Ingress and Egress on the same interface.&amp;nbsp; I selected Inside interface for Ingress, when the wizard came to Egress it allowed only the other interfaces - DMZ, outside, management - as choices.&amp;nbsp; I see in your instructions for the capture, using the command-line, the pair of capture commands specify different interfaces.&amp;nbsp; So - can this capture be run specifying Ingress and Egress on the same interface?&amp;nbsp; Alternatively, I can run the test twice using DMZ as the alternate interface and presumably will get no input on the DMZ side of each capture; but between the two tests will get usable results.&lt;/P&gt;&lt;P&gt;A larger question is, should this ASA be serving as default gateway for my inside network?&amp;nbsp; Its default behavior is to not allow intra-interface traffic, I changed that, but still seem to hist these issues where it is assuming there will be onlly inter-interface traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 15:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814768#M489881</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2011-12-29T15:18:20Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814769#M489882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mcmurphy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the ASA can work as a default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now one question:&lt;/P&gt;&lt;P&gt;Are the packets exchange on this communication on the same interface, &lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA 10.1.1.2/16&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DNS Server 10.1.5.1/16&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;------------------------------------------------------------------&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Switch 10.1.8.20/16&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN 10.7.1.1/16&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;--------------------------------------------&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Test Wkst. 10.7.1.10/16&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;On this diagram seems like the DNS server its on another interface, Is not this true?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;To allow traffic in the same interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;Do rate helpful posts!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 16:12:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814769#M489882</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-29T16:12:07Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814770#M489883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I'll work on my graphics.&lt;/P&gt;&lt;P&gt; -----------------------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |outside&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63.171.86.xxx&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DNS Server&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.1.2/16&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.5.54/16&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |inside&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt; -----------------------------------------------------------&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |inside&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.8.20/16&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Switch/VLAN&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.7.1.1/16&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |remote&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;--------------------------------------------&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.7.1.10/16&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Test Workstation &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; list-style-type: none; border-collapse: collapse; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;The ASA also has a DMZ interface, but all the communication in this issue is on the ASA's inside interface.&amp;nbsp; The test workstation is on a remote network.&amp;nbsp; The Switch/VLAN routes Test Workstation traffic from remote interface through inside interface, to the ASA inside interface.&amp;nbsp; The ASA routes it back out through the inside interface to the DNS Server's inside interface.&amp;nbsp; Return traffic out the DNS Server inside interface in through the ASA inside interface, exiting its inside interface to the Switch/VLAN inside interface.&amp;nbsp; The switch/VLAN routes the traffic to the Test Workstation on the remote interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 16:36:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814770#M489883</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2011-12-29T16:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814771#M489884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you add the command &lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And give it a try, also what happens if you use an external dns like 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 17:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814771#M489884</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-29T17:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814772#M489887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's a long thing, but I think I can paste in the whole config.&amp;nbsp; I added the&amp;nbsp; &lt;/P&gt;&lt;P&gt;"same-security-traffic permit intra-interface" when I faced this question a couple years ago, and at that time added the:&lt;/P&gt;&lt;P&gt;"sysopt noproxyarp inside".&amp;nbsp; I have my ISP's published DNS servers, but my test workstation does not get to the internet yet, this dns issue I may be just the start of getting this routing through the switch working.&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(4) &lt;BR /&gt;!: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(4) &lt;BR /&gt;!&lt;BR /&gt;hostname CDCFCUASA&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password ufxaWULkRjFVEUDK encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;no names&lt;BR /&gt;name 10.1.10.0 inside-clients description clients&lt;BR /&gt;name 170.135.216.250 ElanP1 description Elan Production 1&lt;BR /&gt;name 170.135.72.77 ElanP2 description Elan Production 2&lt;BR /&gt;name 170.135.128.149 ElanT1 description Elan Test 1&lt;BR /&gt;name 170.135.72.80 ElanT2 description Elan Test 2&lt;BR /&gt;name 10.1.5.58 CDC-IT&lt;BR /&gt;name 10.1.5.0 inside-servers&lt;BR /&gt;name 10.1.1.0 inside-routers&lt;BR /&gt;name 10.3.0.0 chamblee-network&lt;BR /&gt;name 10.1.32.0 OLD-CL&lt;BR /&gt;name 10.1.128.0 OLD-EP&lt;BR /&gt;name 10.1.192.0 OLD-CH&lt;BR /&gt;name 10.1.5.27 VelocityApp&lt;BR /&gt;name 63.171.86.196 Velocity-Netlend&lt;BR /&gt;name 10.1.5.52 HPSIM&lt;BR /&gt;name 10.1.5.50 SW-UDT description User Device Tracker&lt;BR /&gt;name 10.1.5.36 CDC-Calyx description Calyx Server&lt;BR /&gt;name 63.171.86.149 ExtCalyx&lt;BR /&gt;name 10.2.0.0 clifton-network&lt;BR /&gt;name 10.7.0.0 execpark-network description Executive Park network&lt;BR /&gt;name 10.1.5.54 CDC-Northlake&lt;BR /&gt;name 10.1.10.127 Test4DNSPC&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.1.2 255.255.0.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 63.171.86.133 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 63.171.86.193 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa804-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service non-well-known_tcp tcp&lt;BR /&gt; port-object range 1024 65535&lt;BR /&gt;object-group service Above_well-known_UDP udp&lt;BR /&gt; port-object range 1024 65535&lt;BR /&gt;object-group service sftp tcp&lt;BR /&gt; description Secure ftp&lt;BR /&gt; port-object range ssh ssh&lt;BR /&gt;object-group service StandardDNS udp&lt;BR /&gt; port-object range domain domain&lt;BR /&gt;object-group service Elan_multi-port_allow-mcm tcp&lt;BR /&gt; port-object range 21000 21400&lt;BR /&gt;object-group service Elan_ATM_auth tcp&lt;BR /&gt; port-object range 9999 9999&lt;BR /&gt;object-group service realplayer-st tcp&lt;BR /&gt; port-object range 50505 50505&lt;BR /&gt;object-group service TCP-UDP_DNS tcp-udp&lt;BR /&gt; port-object range domain domain&lt;BR /&gt;object-group service Port_1505-Proxy udp&lt;BR /&gt; port-object range 1505 1505&lt;BR /&gt;object-group service Port_1505-Proxy-TCP tcp&lt;BR /&gt; port-object range 1505 1505&lt;BR /&gt;object-group service Port_4242 tcp&lt;BR /&gt; port-object range 4242 4242&lt;BR /&gt;object-group service Port_4026 tcp&lt;BR /&gt; port-object range 4026 4026&lt;BR /&gt;object-group service Elan_High_Sftp tcp&lt;BR /&gt; port-object range 20021 20021&lt;BR /&gt;object-group service Port_1052 tcp&lt;BR /&gt; port-object range 1052 1052&lt;BR /&gt;object-group service Port_5013 tcp&lt;BR /&gt; port-object range 5013 5013&lt;BR /&gt;object-group service ntp_port tcp&lt;BR /&gt; port-object range 123 123&lt;BR /&gt;object-group service RIM_P3101 tcp&lt;BR /&gt; description for Blackberry&lt;BR /&gt; port-object range 3101 3101&lt;BR /&gt;object-group service ATM_Prod_Auth tcp&lt;BR /&gt; port-object range 5013 5013&lt;BR /&gt;object-group service ATM_Test_Auth tcp&lt;BR /&gt; port-object range 9999 9999&lt;BR /&gt;object-group service TCP8000 tcp&lt;BR /&gt; description Barracuda User Access Port&lt;BR /&gt; port-object range 8000 8000&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; group-object non-well-known_tcp&lt;BR /&gt; port-object eq smtp&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; group-object non-well-known_tcp&lt;BR /&gt; port-object eq smtp&lt;BR /&gt;object-group service ndmp tcp&lt;BR /&gt; description Backup Exec&lt;BR /&gt; port-object eq 10000&lt;BR /&gt;object-group service s-POP3 tcp&lt;BR /&gt; description Secure POP3&lt;BR /&gt; port-object range 995 995&lt;BR /&gt;object-group service Port_5106 tcp&lt;BR /&gt; description FDR Terminal Emulation&lt;BR /&gt; port-object range 5106 5106&lt;BR /&gt;object-group network INSIDE_NETWORKS&lt;BR /&gt; network-object 10.1.0.0 255.255.0.0&lt;BR /&gt; network-object 10.3.0.0 255.255.0.0&lt;BR /&gt; network-object 10.2.0.0 255.255.0.0&lt;BR /&gt; network-object 10.7.0.0 255.255.0.0&lt;BR /&gt;object-group service ssh-sftp tcp&lt;BR /&gt; description for Elan file xfrs&lt;BR /&gt; port-object range ftp ftp&lt;BR /&gt;object-group service ssh-sftp-dst tcp&lt;BR /&gt; description Elan xfr dst port&lt;BR /&gt; port-object range 55129 55129&lt;BR /&gt;object-group network ElanSftp&lt;BR /&gt; description Elan Sftp Servers&lt;BR /&gt; network-object host 170.135.128.149&lt;BR /&gt; network-object host 170.135.216.250&lt;BR /&gt; network-object host 170.135.72.77&lt;BR /&gt; network-object host 170.135.72.80&lt;BR /&gt;object-group service Elansftp tcp&lt;BR /&gt; description Elan's ssh-sftp&lt;BR /&gt; port-object eq 20022&lt;BR /&gt;object-group service vseaup tcp&lt;BR /&gt; description Mcafee VirusScan Enterprise Autoupdate&lt;BR /&gt; port-object eq 81&lt;BR /&gt;object-group network All-inside-networks&lt;BR /&gt; network-object 10.3.0.0 255.255.0.0&lt;BR /&gt; network-object 10.1.1.0 255.255.255.0&lt;BR /&gt; network-object 10.1.10.0 255.255.255.0&lt;BR /&gt; network-object 10.1.5.0 255.255.255.0&lt;BR /&gt; network-object 10.2.0.0 255.255.0.0&lt;BR /&gt; network-object 10.1.128.0 255.255.255.0&lt;BR /&gt; network-object 10.1.32.0 255.255.255.0&lt;BR /&gt; network-object 10.1.192.0 255.255.255.0&lt;BR /&gt; network-object 10.7.0.0 255.255.0.0&lt;BR /&gt;object-group network branch-networks&lt;BR /&gt; description Chamble, Clifton, Execpark&lt;BR /&gt; network-object 10.2.0.0 255.255.0.0&lt;BR /&gt; network-object 10.3.0.0 255.255.0.0&lt;BR /&gt; network-object 10.1.128.0 255.255.255.0&lt;BR /&gt; network-object 10.1.192.0 255.255.255.0&lt;BR /&gt; network-object 10.7.0.0 255.255.0.0&lt;BR /&gt;object-group network HPRSS&lt;BR /&gt; description HP Remote Support Servers&lt;BR /&gt; network-object host 15.193.24.60&lt;BR /&gt; network-object host 15.193.24.61&lt;BR /&gt; network-object host 15.216.12.255&lt;BR /&gt;object-group service Port_8443 tcp&lt;BR /&gt; description for Mcafee Agent&lt;BR /&gt; port-object range 8443 8444&lt;BR /&gt;object-group service WBEM tcp&lt;BR /&gt; description HPSIM&lt;BR /&gt; port-object range 5989 5989&lt;BR /&gt;object-group service compaq-https tcp&lt;BR /&gt; port-object range 2381 2381&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object udp eq snmp &lt;BR /&gt; service-object udp eq netbios-ns &lt;BR /&gt;access-list 101 standard permit 10.1.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.1.10.0 255.255.255.0 any &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.1.5.0 255.255.255.0 any &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.3.0.0 255.255.0.0 any &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.2.0.0 255.255.0.0 any &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.7.0.0 255.255.0.0 any &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.1.1.0 255.255.255.0 any &lt;BR /&gt;access-list dmz_access_in remark DMZ - dns to internal servers&lt;BR /&gt;access-list dmz_access_in extended permit tcp any object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq domain &lt;BR /&gt;access-list dmz_access_in remark Elan-Multipoint - production host authorization&lt;BR /&gt;access-list dmz_access_in extended permit tcp 206.208.79.0 255.255.255.0 object-group ATM_Prod_Auth host 10.1.5.9 object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark Netlend - respond to secure request&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.196 eq https any object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark Netlend - respond to insecure request&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.196 10.1.0.0 255.255.0.0 eq www &lt;BR /&gt;access-list dmz_access_in remark Internet Banking - eStatement traffic&lt;BR /&gt;access-list dmz_access_in extended permit tcp 10.199.8.0 255.255.255.0 object-group non-well-known_tcp host 10.1.5.2 eq www &lt;BR /&gt;access-list dmz_access_in remark Internet Banking - authorization traffic to Primary DB&lt;BR /&gt;access-list dmz_access_in extended permit tcp 10.199.8.0 255.255.255.0 object-group non-well-known_tcp host 10.1.5.5 object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark Elan-Multipoint - test host authorization&lt;BR /&gt;access-list dmz_access_in extended permit tcp 206.208.79.0 255.255.255.0 object-group ATM_Test_Auth host 10.1.5.9 object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark DMZ - Ping to outside&lt;BR /&gt;access-list dmz_access_in extended permit icmp 63.171.86.192 255.255.255.224 any &lt;BR /&gt;access-list dmz_access_in remark Barracuda - forward email to Exchange&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group DM_INLINE_TCP_2 host 10.1.5.55 eq smtp &lt;BR /&gt;access-list dmz_access_in remark Barracuda - ldap lookups to domain controllers&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq ldap &lt;BR /&gt;access-list dmz_access_in remark Barracuda - Let http request out&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp any eq www &lt;BR /&gt;access-list dmz_access_in remark Barracuda - SSH response out diagnostics request&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp any eq ssh &lt;BR /&gt;access-list dmz_access_in remark Barracuda - respond to smtp&amp;nbsp; in&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 eq smtp any object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark Barracuda - let smtp request out to Exchange or other&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp any eq smtp &lt;BR /&gt;access-list dmz_access_in remark Barracuda - let NTP request out&lt;BR /&gt;access-list dmz_access_in extended permit udp host 63.171.86.194 eq ntp any eq ntp &lt;BR /&gt;access-list dmz_access_in remark DMZ - udp dns to internal dns servers&lt;BR /&gt;access-list dmz_access_in extended permit udp any object-group Above_well-known_UDP 10.1.5.0 255.255.255.0 eq domain &lt;BR /&gt;access-list dmz_access_in remark Barracuda - Let P8000 response into inside client&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group TCP8000 10.1.0.0 255.255.0.0 object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark Barracuda - ftp control port to back itself up to core ftp server&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq ftp &lt;BR /&gt;access-list dmz_access_in remark Barracuda - ftp data port to back itself up to Core server&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq ftp-data &lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.197 object-group non-well-known_tcp any eq www &lt;BR /&gt;access-list dmz_access_in extended permit tcp 63.171.86.192 255.255.255.224 object-group non-well-known_tcp host 10.1.5.58 object-group vseaup &lt;BR /&gt;access-list dmz_access_in remark Internet Banking - image retrieval for ISChecks&lt;BR /&gt;access-list dmz_access_in extended permit tcp 10.199.8.0 255.255.255.0 object-group non-well-known_tcp host 10.1.5.31 eq www &lt;BR /&gt;access-list dmz_access_in remark Netlend-Velocity Communication&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.196 object-group non-well-known_tcp host 10.1.5.27 eq www &lt;BR /&gt;access-list dmz_access_in remark secure request dmz to inside&lt;BR /&gt;access-list dmz_access_in extended permit tcp 63.171.86.192 255.255.255.224 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq https &lt;BR /&gt;access-list dmz_access_in remark for Mcafee Agent&lt;BR /&gt;access-list dmz_access_in extended permit tcp 63.171.86.192 255.255.255.224 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 object-group Port_8443 &lt;BR /&gt;access-list dmz_access_in remark snmp for SIM&lt;BR /&gt;access-list dmz_access_in extended permit udp host 63.171.86.196 host 10.1.5.52 eq snmp &lt;BR /&gt;access-list dmz_access_in remark HPSIM&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.196 host 10.1.5.52 object-group compaq-https &lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.196 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq ldap &lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp host 64.235.144.107 eq https &lt;BR /&gt;access-list outside_access_in remark Barracuda - receive ssh request for diagnostics&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.144 eq ssh &lt;BR /&gt;access-list outside_access_in remark IAS_Credit receive bi-https for credit check&lt;BR /&gt;access-list outside_access_in extended permit tcp host 70.251.39.12 eq https host 63.171.86.141 eq https &lt;BR /&gt;access-list outside_access_in remark IAS_Credit receive for credit check&lt;BR /&gt;access-list outside_access_in extended permit tcp host 204.181.116.29 eq https host 63.171.86.141 eq https &lt;BR /&gt;access-list outside_access_in remark Barracuda - Let smtp request in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_TCP_1 host 63.171.86.144 eq smtp &lt;BR /&gt;access-list outside_access_in remark Barracuda - let in smtp response to send email out&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq smtp host 63.171.86.144 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Netlend - Let secure request in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.146 eq https &lt;BR /&gt;access-list outside_access_in remark Netlend - let insecure request in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.146 eq www &lt;BR /&gt;access-list outside_access_in remark NAT dyamic client - let icmp response in&lt;BR /&gt;access-list outside_access_in extended permit icmp any host 63.171.86.133 &lt;BR /&gt;access-list outside_access_in remark Exchange - Let https request in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.147 eq https &lt;BR /&gt;access-list outside_access_in remark IAS_Credit receive for credit check&lt;BR /&gt;access-list outside_access_in extended permit tcp host 67.133.186.12 eq https host 63.171.86.141 eq https &lt;BR /&gt;access-list outside_access_in remark DMZ - let icmp in&lt;BR /&gt;access-list outside_access_in extended permit icmp any 63.171.86.192 255.255.255.224 &lt;BR /&gt;access-list outside_access_in remark NAT dynamic client - Let http response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq www host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark NAT Dynamic client - Let https response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq https host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Netlend - Let Proxy tcp in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.146 object-group Port_1505-Proxy-TCP &lt;BR /&gt;access-list outside_access_in remark Netlend - let Proxy udp in&lt;BR /&gt;access-list outside_access_in extended permit udp any object-group Above_well-known_UDP host 63.171.86.146 object-group Port_1505-Proxy &lt;BR /&gt;access-list outside_access_in remark Elan - Sftp control response for reports (in to SYSAPPS4)&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group Elan_High_Sftp host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark NAT Dynamic client - Let dns lookup replies in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq domain host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark NAT Dynamic client - Let nntp replies in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq nntp host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark NAT Dynamic client - Let smtp reply in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq smtp host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Elan - Let Multiport response into dynamic NAT client (sysapps4 for Elan reports)&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group Elan_multi-port_allow-mcm host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Exchange - let Blackberry traffic in&lt;BR /&gt;access-list outside_access_in extended permit tcp host 206.51.26.33 object-group non-well-known_tcp host 63.171.86.147 object-group RIM_P3101 &lt;BR /&gt;access-list outside_access_in remark NAT dynamic client - let FTP response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq ftp-data host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Netlend - let secure browse response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq https host 63.171.86.146 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Exchange - let smtp response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq smtp host 63.171.86.147 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Netlend - let in response to http browse&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq www host 63.171.86.146 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Exchange - ICMP&lt;BR /&gt;access-list outside_access_in extended permit icmp any host 63.171.86.147 &lt;BR /&gt;access-list outside_access_in remark Netlend - ICMP&lt;BR /&gt;access-list outside_access_in extended permit icmp any host 63.171.86.146 &lt;BR /&gt;access-list outside_access_in remark Barracuda - let NTP response in&lt;BR /&gt;access-list outside_access_in extended permit udp any eq ntp host 63.171.86.144 object-group Above_well-known_UDP &lt;BR /&gt;access-list outside_access_in remark Netlend - Let http response in (stateful?)&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq www host 63.171.86.144 object-group non-well-known_tcp inactive &lt;BR /&gt;access-list outside_access_in remark Exchange - Let Blackberry traffic in&lt;BR /&gt;access-list outside_access_in extended permit tcp host 204.187.87.33 object-group RIM_P3101 host 63.171.86.147 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Barracuda - response to User Access (Stateful?)&lt;BR /&gt;access-list outside_access_in extended permit tcp host 63.171.86.194 object-group TCP8000 10.1.0.0 255.255.0.0 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Exchange - TEST to listen on smtp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 63.171.86.147 eq smtp inactive &lt;BR /&gt;access-list outside_access_in extended permit ip host 63.171.86.144 host 63.171.86.194 inactive &lt;BR /&gt;access-list outside_access_in remark Barracuda - let response to http request - for updates&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq www host 63.171.86.144 &lt;BR /&gt;access-list outside_access_in remark uMonitor Test VPN&lt;BR /&gt;access-list outside_access_in extended permit ip host 10.100.102.2 host 10.1.5.8 &lt;BR /&gt;access-list outside_access_in remark uMonitor Test VPN&lt;BR /&gt;access-list outside_access_in extended permit icmp host 64.129.221.66 any &lt;BR /&gt;access-list outside_access_in remark uMonitor Prod1 VPN&lt;BR /&gt;access-list outside_access_in extended permit ip 192.168.0.0 255.255.255.0 host 10.1.5.8 &lt;BR /&gt;access-list outside_access_in remark U-Monitor production1&lt;BR /&gt;access-list outside_access_in extended permit icmp host 64.209.230.234 any &lt;BR /&gt;access-list outside_access_in remark uMonitor Prod2&lt;BR /&gt;access-list outside_access_in extended permit icmp host 209.235.27.44 any &lt;BR /&gt;access-list outside_access_in remark uMonitor Prod2 VPN&lt;BR /&gt;access-list outside_access_in extended permit ip 192.168.12.0 255.255.255.0 host 10.1.5.8 &lt;BR /&gt;access-list outside_access_in remark Exchange - Let secure POP3 in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.147 object-group s-POP3 &lt;BR /&gt;access-list outside_access_in remark NAT Dynamic client - let ssh-sftp reply in (set up for Elan)&lt;BR /&gt;access-list outside_access_in extended permit tcp host 170.135.128.149 object-group ssh-sftp host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark for Proxy Host on extranet&lt;BR /&gt;access-list outside_access_in extended permit tcp 63.171.86.128 255.255.255.224 object-group Port_1505-Proxy-TCP 10.1.0.0 255.255.0.0 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark http response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq www host 63.171.86.197 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Let in Elan ssh-sftp response to Appworx file xfr request&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group ElanSftp object-group Elansftp host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Verafin Test Vpn&lt;BR /&gt;access-list outside_access_in extended permit ip host 166.123.218.113 host 10.1.5.19 &lt;BR /&gt;access-list outside_access_in remark Verafin VPN DR&lt;BR /&gt;access-list outside_access_in extended permit ip host 164.95.95.112 host 10.1.5.19 &lt;BR /&gt;access-list outside_access_in remark Verafin VPN Prod&lt;BR /&gt;access-list outside_access_in extended permit ip host 166.123.218.112 host 10.1.5.19 &lt;BR /&gt;access-list outside_access_in remark USBank ssh transfers&lt;BR /&gt;access-list outside_access_in extended permit tcp 170.135.128.0 255.255.255.0 eq ssh host 63.171.86.148 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in extended permit tcp 170.135.128.0 255.255.255.0 eq ssh 10.1.11.0 255.255.255.0 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark HP Sim server from HP Remote Support Servers&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group HPRSS host 10.1.5.52 eq https &lt;BR /&gt;access-list outside_access_in remark Let UDT poll external switch&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 63.171.86.128 255.255.255.224 host 10.1.5.50 &lt;BR /&gt;access-list outside_access_in remark Use Calyx server from outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 63.171.86.149 eq https &lt;BR /&gt;access-list outside_access_in remark ssh diagnostic support for Barracudas&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.133 eq ssh &lt;BR /&gt;access-list inside_nat0_outbound remark UMonitor VPN remote network&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 10.100.102.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 63.171.86.192 255.255.255.224 &lt;BR /&gt;access-list inside_nat0_outbound remark eCB remote network&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 10.199.8.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound remark Elan remote network&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 206.208.79.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound remark U-Monitor production&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 192.168.0.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound remark uMonitor Prod2 VPN&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 192.168.12.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound remark NAT exemption for FinCen DR VPN&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 10.1.5.19 host 164.95.95.112 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.200.200.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound remark traffic to FinCen Prod, Test VPN&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 10.1.5.19 166.123.218.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 10.1.5.50 63.171.86.128 255.255.255.224 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.7.0.0 255.255.0.0 10.1.0.0 255.255.0.0 &lt;BR /&gt;access-list capout extended permit tcp any host 63.171.86.144 eq smtp &lt;BR /&gt;access-list capout extended permit tcp host 63.171.86.144 eq smtp any &lt;BR /&gt;access-list capout extended permit tcp any host 63.171.86.147 eq smtp &lt;BR /&gt;access-list capout extended permit tcp host 63.171.86.147 eq smtp any &lt;BR /&gt;access-list capdmz extended permit tcp any host 63.171.86.194 eq smtp &lt;BR /&gt;access-list capdmz extended permit tcp host 63.171.86.194 eq smtp any &lt;BR /&gt;access-list capin extended permit tcp any host 10.1.5.55 eq smtp &lt;BR /&gt;access-list capin extended permit tcp host 10.1.5.55 eq smtp any &lt;BR /&gt;access-list inside_nat_static extended permit tcp host 10.1.5.55 eq smtp any &lt;BR /&gt;access-list inside_nat_static_1 extended permit tcp host 10.1.5.55 eq smtp any &lt;BR /&gt;access-list policy_nat_mail2 extended permit ip host 10.1.5.55 any &lt;BR /&gt;access-list inside_access_in extended permit ip object-group INSIDE_NETWORKS any &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.0.0 255.255.0.0 any inactive &lt;BR /&gt;access-list inside_access_in extended permit ip host 170.186.240.100 any &lt;BR /&gt;access-list inside_access_in extended permit udp host 10.1.10.127 host 10.1.5.54 inactive &lt;BR /&gt;access-list inside_access_in extended permit udp host 10.1.5.54 host 10.1.10.127 inactive &lt;BR /&gt;access-list outside_cryptomap extended permit ip host 10.1.5.8 192.168.0.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip host 10.1.5.8 192.168.12.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap_2 extended permit ip host 10.1.5.19 host 166.123.2.110 &lt;BR /&gt;access-list outside_cryptomap_3 extended permit ip host 10.1.5.19 host 166.123.2.126 &lt;BR /&gt;access-list cap extended permit ip host 10.1.5.8 host 192.168.12.42 &lt;BR /&gt;access-list inside_nat0_outbound_1 remark Exempt any traffic to new Chamblee&lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip any 10.3.0.0 255.255.0.0 &lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip 170.186.240.0 255.255.255.0 any &lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip 10.1.0.0 255.255.0.0 170.186.240.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip 10.1.0.0 255.255.0.0 170.209.0.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound_1 remark NAT exempt traffic to branches&lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip object-group All-inside-networks object-group branch-networks &lt;BR /&gt;access-list outside_cryptomap_4 extended permit ip host 10.1.5.19 host 166.123.218.112 &lt;BR /&gt;access-list outside_cryptomap_5 extended permit ip host 10.1.5.8 host 10.100.102.2 &lt;BR /&gt;access-list outside_cryptomap_7 extended permit ip host 10.1.5.19 host 164.95.95.112 &lt;BR /&gt;access-list outside_cryptomap_6 extended permit ip host 10.1.5.19 host 166.123.218.113 &lt;BR /&gt;access-list split-tunnel standard permit 10.1.0.0 255.255.0.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 1000000&lt;BR /&gt;logging trap errors&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging from-address &lt;A href="mailto:ASA5510@cdcfcu.com"&gt;ASA5510@cdcfcu.com&lt;/A&gt;&lt;BR /&gt;logging recipient-address &lt;A href="mailto:mcmurphy@cdcfcu.com"&gt;mcmurphy@cdcfcu.com&lt;/A&gt; level critical&lt;BR /&gt;logging host inside 10.1.10.121&lt;BR /&gt;logging ftp-server 10.1.5.54 syslogs barracuda ****&lt;BR /&gt;logging class vpn buffered debugging &lt;BR /&gt;logging message 713120 level errors&lt;BR /&gt;logging message 722022 level errors&lt;BR /&gt;logging message 722023 level errors&lt;BR /&gt;logging message 713050 level errors&lt;BR /&gt;logging message 302013 level errors&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool remusers2 10.200.200.10-10.200.200.20 mask 255.255.0.0&lt;BR /&gt;ip local pool spltusers 10.210.210.10-10.210.210.20 mask 255.255.0.0&lt;BR /&gt;failover timeout -1&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-615.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound_1 outside&lt;BR /&gt;nat (inside) 1 access-list inside_pnat_outbound&lt;BR /&gt;static (outside,inside) tcp 170.135.128.149 ssh 170.135.128.149 20022 netmask 255.255.255.255 &lt;BR /&gt;static (outside,inside) tcp 170.135.216.250 ssh 170.135.216.250 20022 netmask 255.255.255.255 &lt;BR /&gt;static (dmz,outside) 63.171.86.144 63.171.86.194 netmask 255.255.255.255 dns &lt;BR /&gt;static (inside,outside) 63.171.86.147 10.1.5.55 netmask 255.255.255.255 dns &lt;BR /&gt;static (dmz,outside) 63.171.86.146 63.171.86.196 netmask 255.255.255.255 dns norandomseq &lt;BR /&gt;static (inside,outside) 63.171.86.149 10.1.5.36 netmask 255.255.255.255 dns &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 63.171.86.129 1&lt;BR /&gt;route inside 10.7.0.0 255.255.0.0 10.1.8.20 1&lt;BR /&gt;route outside 10.100.102.2 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route dmz 10.199.8.0 255.255.255.0 63.171.86.203 1&lt;BR /&gt;route outside 64.209.230.234 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 66.194.237.176 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 166.123.2.110 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 166.123.2.126 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 166.123.2.142 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 166.123.208.198 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 166.123.216.112 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route inside 170.186.240.0 255.255.255.0 10.1.8.6 1&lt;BR /&gt;route inside 170.209.0.2 255.255.255.255 10.1.8.13 1&lt;BR /&gt;route inside 170.209.0.3 255.255.255.255 10.1.8.13 1&lt;BR /&gt;route inside 172.19.102.190 255.255.255.255 10.1.8.6 1&lt;BR /&gt;route outside 192.168.0.0 255.255.255.0 63.171.86.129 1&lt;BR /&gt;route outside 192.168.12.0 255.255.255.0 63.171.86.129 1&lt;BR /&gt;route inside 192.168.29.0 255.255.255.0 10.1.8.6 1&lt;BR /&gt;route inside 192.168.93.26 255.255.255.255 10.1.8.12 1&lt;BR /&gt;route inside 199.186.96.0 255.255.255.0 10.1.8.16 1&lt;BR /&gt;route inside 199.186.97.0 255.255.255.0 10.1.8.16 1&lt;BR /&gt;route inside 199.186.98.0 255.255.255.0 10.1.8.16 1&lt;BR /&gt;route outside 199.196.144.143 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 199.196.144.144 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route dmz 206.208.79.0 255.255.255.0 63.171.86.202 1&lt;BR /&gt;route outside 209.235.27.44 255.255.255.255 63.171.86.129 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;ldap attribute-map CISCOMAP&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; msNPAllowDialin IETF-Radius-Class&lt;BR /&gt;&amp;nbsp; map-value msNPAllowDialin FALSE NOACCESS&lt;BR /&gt;&amp;nbsp; map-value msNPAllowDialin TRUE ALLOWACCESS&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server LDAP_SRV_GRP protocol ldap&lt;BR /&gt;aaa-server LDAP_SRV_GRP (inside) host 10.1.5.1&lt;BR /&gt; ldap-base-dn dc=cdcfcunet,dc=local&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password *&lt;BR /&gt; ldap-login-dn cn=administrator,cn=users,dc=cdcfcunet,dc=local&lt;BR /&gt; server-type microsoft&lt;BR /&gt; ldap-attribute-map CISCOMAP&lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;snmp-server host inside 10.1.5.52 community hpsim&lt;BR /&gt;snmp-server host inside 10.1.5.50 community swudt version 2c&lt;BR /&gt;snmp-server location Northlake&lt;BR /&gt;snmp-server contact Mike Murphy&lt;BR /&gt;snmp-server community swudt&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sysopt noproxyarp inside&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer 64.209.230.234 &lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 set reverse-route&lt;BR /&gt;crypto map outside_map 2 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 2 set peer 209.235.27.44 &lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 3 match address outside_cryptomap_2&lt;BR /&gt;crypto map outside_map 3 set pfs &lt;BR /&gt;crypto map outside_map 3 set peer 199.196.144.144 &lt;BR /&gt;crypto map outside_map 3 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 3 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 3 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 4 match address outside_cryptomap_3&lt;BR /&gt;crypto map outside_map 4 set pfs &lt;BR /&gt;crypto map outside_map 4 set peer 199.196.144.143 &lt;BR /&gt;crypto map outside_map 4 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 4 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 4 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 5 match address outside_cryptomap_4&lt;BR /&gt;crypto map outside_map 5 set pfs &lt;BR /&gt;crypto map outside_map 5 set peer 166.123.208.198 &lt;BR /&gt;crypto map outside_map 5 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 5 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 5 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 6 match address outside_cryptomap_5&lt;BR /&gt;crypto map outside_map 6 set peer 64.129.221.66 &lt;BR /&gt;crypto map outside_map 6 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map outside_map 6 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 6 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 7 match address outside_cryptomap_6&lt;BR /&gt;crypto map outside_map 7 set pfs &lt;BR /&gt;crypto map outside_map 7 set peer 166.123.208.198 &lt;BR /&gt;crypto map outside_map 7 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 7 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 7 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 8 match address outside_cryptomap_7&lt;BR /&gt;crypto map outside_map 8 set pfs &lt;BR /&gt;crypto map outside_map 8 set peer 164.95.95.4 &lt;BR /&gt;crypto map outside_map 8 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 8 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 8 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp identity address &lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 28800&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 128.192.1.193 source outside&lt;BR /&gt;ntp server 128.192.1.9 source outside&lt;BR /&gt;tftp-server inside 10.1.10.120 /asa5510&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; svc image disk0:/anyconnect-win-2.4.0202-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt;group-policy NOACCESS internal&lt;BR /&gt;group-policy NOACCESS attributes&lt;BR /&gt; vpn-simultaneous-logins 0&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;BR /&gt;group-policy fcusers internal&lt;BR /&gt;group-policy fcusers attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc &lt;BR /&gt; address-pools value remusers2&lt;BR /&gt;group-policy stusers internal&lt;BR /&gt;group-policy stusers attributes&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec svc &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value split-tunnel&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc keep-installer installed&lt;BR /&gt;&amp;nbsp; svc rekey time 30&lt;BR /&gt;&amp;nbsp; svc rekey method ssl&lt;BR /&gt;&amp;nbsp; svc ask none default svc&lt;BR /&gt;group-policy ALLOWACCESS internal&lt;BR /&gt;group-policy ALLOWACCESS attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc &lt;BR /&gt; address-pools value remusers2&lt;BR /&gt;username mmurphy password G3c44QeLNGYkvwxa encrypted privilege 0&lt;BR /&gt;username mmurphy attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt;username askeen nopassword privilege 0&lt;BR /&gt;username askeen attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username velocity nopassword&lt;BR /&gt;username velocity attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username special password fnYplaKWrx7ywBKR encrypted privilege 15&lt;BR /&gt;username dphilpot nopassword privilege 0&lt;BR /&gt;username dphilpot attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username bjames password c9WvTlQzhs/8jgpt encrypted privilege 0&lt;BR /&gt;username bjames attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted&lt;BR /&gt;username jvaughn password /KdVynqfFx/TfX0m encrypted privilege 0&lt;BR /&gt;username jvaughn attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt; service-type remote-access&lt;BR /&gt;tunnel-group fcusers type remote-access&lt;BR /&gt;tunnel-group fcusers general-attributes&lt;BR /&gt; address-pool (inside) remusers2&lt;BR /&gt; address-pool remusers2&lt;BR /&gt; authentication-server-group LDAP_SRV_GRP&lt;BR /&gt; default-group-policy fcusers&lt;BR /&gt;tunnel-group fcusers webvpn-attributes&lt;BR /&gt; group-alias cdcusers enable&lt;BR /&gt;tunnel-group fcusers ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 64.209.230.234 type ipsec-l2l&lt;BR /&gt;tunnel-group 64.209.230.234 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 209.235.27.44 type ipsec-l2l&lt;BR /&gt;tunnel-group 209.235.27.44 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 199.196.144.143 type ipsec-l2l&lt;BR /&gt;tunnel-group 199.196.144.143 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 199.196.144.144 type ipsec-l2l&lt;BR /&gt;tunnel-group 199.196.144.144 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 166.123.208.198 type ipsec-l2l&lt;BR /&gt;tunnel-group 166.123.208.198 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 64.129.221.66 type ipsec-l2l&lt;BR /&gt;tunnel-group 64.129.221.66 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 164.95.95.4 type ipsec-l2l&lt;BR /&gt;tunnel-group 164.95.95.4 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group Fincen-Test type ipsec-l2l&lt;BR /&gt;tunnel-group Fincen-Test general-attributes&lt;BR /&gt;tunnel-group Fincen-Test ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group stusers type remote-access&lt;BR /&gt;tunnel-group stusers general-attributes&lt;BR /&gt; address-pool remusers2&lt;BR /&gt; authentication-server-group LDAP_SRV_GRP&lt;BR /&gt; default-group-policy stusers&lt;BR /&gt;tunnel-group stusers webvpn-attributes&lt;BR /&gt; group-alias 2wayusers enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect dns &lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 10.1.5.55&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:c26fd13eb40be4436a08b5bcc977aa2f&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-615.bin&lt;BR /&gt;asdm location 63.171.86.200 255.255.255.255 dmz&lt;BR /&gt;asdm location 10.1.5.5 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.5.2 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.5.9 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.133 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.197 255.255.255.255 dmz&lt;BR /&gt;asdm location 10.199.8.0 255.255.255.0 dmz&lt;BR /&gt;asdm location 206.208.79.0 255.255.255.0 dmz&lt;BR /&gt;asdm location 63.171.86.135 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.200 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.141 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.142 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.10.0 255.255.255.0 inside&lt;BR /&gt;asdm location 10.1.5.8 255.255.255.255 inside&lt;BR /&gt;asdm location 10.200.200.0 255.255.255.0 inside&lt;BR /&gt;asdm location 170.135.72.77 255.255.255.255 inside&lt;BR /&gt;asdm location 170.135.72.80 255.255.255.255 inside&lt;BR /&gt;asdm location 170.135.216.250 255.255.255.255 inside&lt;BR /&gt;asdm location 209.235.27.44 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.5.58 255.255.255.255 inside&lt;BR /&gt;asdm location 199.196.144.143 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.11.0 255.255.255.0 inside&lt;BR /&gt;asdm location 170.135.128.0 255.255.255.0 inside&lt;BR /&gt;asdm location 10.3.0.0 255.255.0.0 inside&lt;BR /&gt;asdm location 10.2.0.0 255.255.0.0 inside&lt;BR /&gt;asdm location 10.1.32.0 255.255.255.0 inside&lt;BR /&gt;asdm location 10.1.128.0 255.255.255.0 inside&lt;BR /&gt;asdm location 10.1.192.0 255.255.255.0 inside&lt;BR /&gt;asdm location 10.1.5.27 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.196 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.5.50 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.5.36 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.149 255.255.255.255 inside&lt;BR /&gt;asdm location 10.7.0.0 255.255.0.0 inside&lt;BR /&gt;asdm location 10.1.5.54 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.10.127 255.255.255.255 inside&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;hostname CDCFCUASA&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password ufxaWULkRjFVEUDK encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;no names&lt;BR /&gt;name 10.1.10.0 inside-clients description clients&lt;BR /&gt;name 170.135.216.250 ElanP1 description Elan Production 1&lt;BR /&gt;name 170.135.72.77 ElanP2 description Elan Production 2&lt;BR /&gt;name 170.135.128.149 ElanT1 description Elan Test 1&lt;BR /&gt;name 170.135.72.80 ElanT2 description Elan Test 2&lt;BR /&gt;name 10.1.5.58 CDC-IT&lt;BR /&gt;name 10.1.5.0 inside-servers&lt;BR /&gt;name 10.1.1.0 inside-routers&lt;BR /&gt;name 10.3.0.0 chamblee-network&lt;BR /&gt;name 10.1.32.0 OLD-CL&lt;BR /&gt;name 10.1.128.0 OLD-EP&lt;BR /&gt;name 10.1.192.0 OLD-CH&lt;BR /&gt;name 10.1.5.27 VelocityApp&lt;BR /&gt;name 63.171.86.196 Velocity-Netlend&lt;BR /&gt;name 10.1.5.52 HPSIM&lt;BR /&gt;name 10.1.5.50 SW-UDT description User Device Tracker&lt;BR /&gt;name 10.1.5.36 CDC-Calyx description Calyx Server&lt;BR /&gt;name 63.171.86.149 ExtCalyx&lt;BR /&gt;name 10.2.0.0 clifton-network&lt;BR /&gt;name 10.7.0.0 execpark-network description Executive Park network&lt;BR /&gt;name 10.1.5.54 CDC-Northlake&lt;BR /&gt;name 10.1.10.127 Test4DNSPC&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.1.2 255.255.0.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 63.171.86.133 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 63.171.86.193 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa804-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service non-well-known_tcp tcp&lt;BR /&gt; port-object range 1024 65535&lt;BR /&gt;object-group service Above_well-known_UDP udp&lt;BR /&gt; port-object range 1024 65535&lt;BR /&gt;object-group service sftp tcp&lt;BR /&gt; description Secure ftp&lt;BR /&gt; port-object range ssh ssh&lt;BR /&gt;object-group service StandardDNS udp&lt;BR /&gt; port-object range domain domain&lt;BR /&gt;object-group service Elan_multi-port_allow-mcm tcp&lt;BR /&gt; port-object range 21000 21400&lt;BR /&gt;object-group service Elan_ATM_auth tcp&lt;BR /&gt; port-object range 9999 9999&lt;BR /&gt;object-group service realplayer-st tcp&lt;BR /&gt; port-object range 50505 50505&lt;BR /&gt;object-group service TCP-UDP_DNS tcp-udp&lt;BR /&gt; port-object range domain domain&lt;BR /&gt;object-group service Port_1505-Proxy udp&lt;BR /&gt; port-object range 1505 1505&lt;BR /&gt;object-group service Port_1505-Proxy-TCP tcp&lt;BR /&gt; port-object range 1505 1505&lt;BR /&gt;object-group service Port_4242 tcp&lt;BR /&gt; port-object range 4242 4242&lt;BR /&gt;object-group service Port_4026 tcp&lt;BR /&gt; port-object range 4026 4026&lt;BR /&gt;object-group service Elan_High_Sftp tcp&lt;BR /&gt; port-object range 20021 20021&lt;BR /&gt;object-group service Port_1052 tcp&lt;BR /&gt; port-object range 1052 1052&lt;BR /&gt;object-group service Port_5013 tcp&lt;BR /&gt; port-object range 5013 5013&lt;BR /&gt;object-group service ntp_port tcp&lt;BR /&gt; port-object range 123 123&lt;BR /&gt;object-group service RIM_P3101 tcp&lt;BR /&gt; description for Blackberry&lt;BR /&gt; port-object range 3101 3101&lt;BR /&gt;object-group service ATM_Prod_Auth tcp&lt;BR /&gt; port-object range 5013 5013&lt;BR /&gt;object-group service ATM_Test_Auth tcp&lt;BR /&gt; port-object range 9999 9999&lt;BR /&gt;object-group service TCP8000 tcp&lt;BR /&gt; description Barracuda User Access Port&lt;BR /&gt; port-object range 8000 8000&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; group-object non-well-known_tcp&lt;BR /&gt; port-object eq smtp&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; group-object non-well-known_tcp&lt;BR /&gt; port-object eq smtp&lt;BR /&gt;object-group service ndmp tcp&lt;BR /&gt; description Backup Exec&lt;BR /&gt; port-object eq 10000&lt;BR /&gt;object-group service s-POP3 tcp&lt;BR /&gt; description Secure POP3&lt;BR /&gt; port-object range 995 995&lt;BR /&gt;object-group service Port_5106 tcp&lt;BR /&gt; description FDR Terminal Emulation&lt;BR /&gt; port-object range 5106 5106&lt;BR /&gt;object-group network INSIDE_NETWORKS&lt;BR /&gt; network-object 10.1.0.0 255.255.0.0&lt;BR /&gt; network-object 10.3.0.0 255.255.0.0&lt;BR /&gt; network-object 10.2.0.0 255.255.0.0&lt;BR /&gt; network-object 10.7.0.0 255.255.0.0&lt;BR /&gt;object-group service ssh-sftp tcp&lt;BR /&gt; description for Elan file xfrs&lt;BR /&gt; port-object range ftp ftp&lt;BR /&gt;object-group service ssh-sftp-dst tcp&lt;BR /&gt; description Elan xfr dst port&lt;BR /&gt; port-object range 55129 55129&lt;BR /&gt;object-group network ElanSftp&lt;BR /&gt; description Elan Sftp Servers&lt;BR /&gt; network-object host 170.135.128.149&lt;BR /&gt; network-object host 170.135.216.250&lt;BR /&gt; network-object host 170.135.72.77&lt;BR /&gt; network-object host 170.135.72.80&lt;BR /&gt;object-group service Elansftp tcp&lt;BR /&gt; description Elan's ssh-sftp&lt;BR /&gt; port-object eq 20022&lt;BR /&gt;object-group service vseaup tcp&lt;BR /&gt; description Mcafee VirusScan Enterprise Autoupdate&lt;BR /&gt; port-object eq 81&lt;BR /&gt;object-group network All-inside-networks&lt;BR /&gt; network-object 10.3.0.0 255.255.0.0&lt;BR /&gt; network-object 10.1.1.0 255.255.255.0&lt;BR /&gt; network-object 10.1.10.0 255.255.255.0&lt;BR /&gt; network-object 10.1.5.0 255.255.255.0&lt;BR /&gt; network-object 10.2.0.0 255.255.0.0&lt;BR /&gt; network-object 10.1.128.0 255.255.255.0&lt;BR /&gt; network-object 10.1.32.0 255.255.255.0&lt;BR /&gt; network-object 10.1.192.0 255.255.255.0&lt;BR /&gt; network-object 10.7.0.0 255.255.0.0&lt;BR /&gt;object-group network branch-networks&lt;BR /&gt; description Chamble, Clifton, Execpark&lt;BR /&gt; network-object 10.2.0.0 255.255.0.0&lt;BR /&gt; network-object 10.3.0.0 255.255.0.0&lt;BR /&gt; network-object 10.1.128.0 255.255.255.0&lt;BR /&gt; network-object 10.1.192.0 255.255.255.0&lt;BR /&gt; network-object 10.7.0.0 255.255.0.0&lt;BR /&gt;object-group network HPRSS&lt;BR /&gt; description HP Remote Support Servers&lt;BR /&gt; network-object host 15.193.24.60&lt;BR /&gt; network-object host 15.193.24.61&lt;BR /&gt; network-object host 15.216.12.255&lt;BR /&gt;object-group service Port_8443 tcp&lt;BR /&gt; description for Mcafee Agent&lt;BR /&gt; port-object range 8443 8444&lt;BR /&gt;object-group service WBEM tcp&lt;BR /&gt; description HPSIM&lt;BR /&gt; port-object range 5989 5989&lt;BR /&gt;object-group service compaq-https tcp&lt;BR /&gt; port-object range 2381 2381&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object udp eq snmp &lt;BR /&gt; service-object udp eq netbios-ns &lt;BR /&gt;access-list 101 standard permit 10.1.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.1.10.0 255.255.255.0 any &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.1.5.0 255.255.255.0 any &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.3.0.0 255.255.0.0 any &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.2.0.0 255.255.0.0 any &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.7.0.0 255.255.0.0 any &lt;BR /&gt;access-list inside_pnat_outbound extended permit ip 10.1.1.0 255.255.255.0 any &lt;BR /&gt;access-list dmz_access_in remark DMZ - dns to internal servers&lt;BR /&gt;access-list dmz_access_in extended permit tcp any object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq domain &lt;BR /&gt;access-list dmz_access_in remark Elan-Multipoint - production host authorization&lt;BR /&gt;access-list dmz_access_in extended permit tcp 206.208.79.0 255.255.255.0 object-group ATM_Prod_Auth host 10.1.5.9 object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark Netlend - respond to secure request&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.196 eq https any object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark Netlend - respond to insecure request&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.196 10.1.0.0 255.255.0.0 eq www &lt;BR /&gt;access-list dmz_access_in remark Internet Banking - eStatement traffic&lt;BR /&gt;access-list dmz_access_in extended permit tcp 10.199.8.0 255.255.255.0 object-group non-well-known_tcp host 10.1.5.2 eq www &lt;BR /&gt;access-list dmz_access_in remark Internet Banking - authorization traffic to Primary DB&lt;BR /&gt;access-list dmz_access_in extended permit tcp 10.199.8.0 255.255.255.0 object-group non-well-known_tcp host 10.1.5.5 object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark Elan-Multipoint - test host authorization&lt;BR /&gt;access-list dmz_access_in extended permit tcp 206.208.79.0 255.255.255.0 object-group ATM_Test_Auth host 10.1.5.9 object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark DMZ - Ping to outside&lt;BR /&gt;access-list dmz_access_in extended permit icmp 63.171.86.192 255.255.255.224 any &lt;BR /&gt;access-list dmz_access_in remark Barracuda - forward email to Exchange&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group DM_INLINE_TCP_2 host 10.1.5.55 eq smtp &lt;BR /&gt;access-list dmz_access_in remark Barracuda - ldap lookups to domain controllers&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq ldap &lt;BR /&gt;access-list dmz_access_in remark Barracuda - Let http request out&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp any eq www &lt;BR /&gt;access-list dmz_access_in remark Barracuda - SSH response out diagnostics request&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp any eq ssh &lt;BR /&gt;access-list dmz_access_in remark Barracuda - respond to smtp&amp;nbsp; in&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 eq smtp any object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark Barracuda - let smtp request out to Exchange or other&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp any eq smtp &lt;BR /&gt;access-list dmz_access_in remark Barracuda - let NTP request out&lt;BR /&gt;access-list dmz_access_in extended permit udp host 63.171.86.194 eq ntp any eq ntp &lt;BR /&gt;access-list dmz_access_in remark DMZ - udp dns to internal dns servers&lt;BR /&gt;access-list dmz_access_in extended permit udp any object-group Above_well-known_UDP 10.1.5.0 255.255.255.0 eq domain &lt;BR /&gt;access-list dmz_access_in remark Barracuda - Let P8000 response into inside client&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group TCP8000 10.1.0.0 255.255.0.0 object-group non-well-known_tcp &lt;BR /&gt;access-list dmz_access_in remark Barracuda - ftp control port to back itself up to core ftp server&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq ftp &lt;BR /&gt;access-list dmz_access_in remark Barracuda - ftp data port to back itself up to Core server&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq ftp-data &lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.197 object-group non-well-known_tcp any eq www &lt;BR /&gt;access-list dmz_access_in extended permit tcp 63.171.86.192 255.255.255.224 object-group non-well-known_tcp host 10.1.5.58 object-group vseaup &lt;BR /&gt;access-list dmz_access_in remark Internet Banking - image retrieval for ISChecks&lt;BR /&gt;access-list dmz_access_in extended permit tcp 10.199.8.0 255.255.255.0 object-group non-well-known_tcp host 10.1.5.31 eq www &lt;BR /&gt;access-list dmz_access_in remark Netlend-Velocity Communication&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.196 object-group non-well-known_tcp host 10.1.5.27 eq www &lt;BR /&gt;access-list dmz_access_in remark secure request dmz to inside&lt;BR /&gt;access-list dmz_access_in extended permit tcp 63.171.86.192 255.255.255.224 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq https &lt;BR /&gt;access-list dmz_access_in remark for Mcafee Agent&lt;BR /&gt;access-list dmz_access_in extended permit tcp 63.171.86.192 255.255.255.224 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 object-group Port_8443 &lt;BR /&gt;access-list dmz_access_in remark snmp for SIM&lt;BR /&gt;access-list dmz_access_in extended permit udp host 63.171.86.196 host 10.1.5.52 eq snmp &lt;BR /&gt;access-list dmz_access_in remark HPSIM&lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.196 host 10.1.5.52 object-group compaq-https &lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.196 object-group non-well-known_tcp 10.1.5.0 255.255.255.0 eq ldap &lt;BR /&gt;access-list dmz_access_in extended permit tcp host 63.171.86.194 object-group non-well-known_tcp host 64.235.144.107 eq https &lt;BR /&gt;access-list outside_access_in remark Barracuda - receive ssh request for diagnostics&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.144 eq ssh &lt;BR /&gt;access-list outside_access_in remark IAS_Credit receive bi-https for credit check&lt;BR /&gt;access-list outside_access_in extended permit tcp host 70.251.39.12 eq https host 63.171.86.141 eq https &lt;BR /&gt;access-list outside_access_in remark IAS_Credit receive for credit check&lt;BR /&gt;access-list outside_access_in extended permit tcp host 204.181.116.29 eq https host 63.171.86.141 eq https &lt;BR /&gt;access-list outside_access_in remark Barracuda - Let smtp request in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_TCP_1 host 63.171.86.144 eq smtp &lt;BR /&gt;access-list outside_access_in remark Barracuda - let in smtp response to send email out&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq smtp host 63.171.86.144 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Netlend - Let secure request in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.146 eq https &lt;BR /&gt;access-list outside_access_in remark Netlend - let insecure request in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.146 eq www &lt;BR /&gt;access-list outside_access_in remark NAT dyamic client - let icmp response in&lt;BR /&gt;access-list outside_access_in extended permit icmp any host 63.171.86.133 &lt;BR /&gt;access-list outside_access_in remark Exchange - Let https request in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.147 eq https &lt;BR /&gt;access-list outside_access_in remark IAS_Credit receive for credit check&lt;BR /&gt;access-list outside_access_in extended permit tcp host 67.133.186.12 eq https host 63.171.86.141 eq https &lt;BR /&gt;access-list outside_access_in remark DMZ - let icmp in&lt;BR /&gt;access-list outside_access_in extended permit icmp any 63.171.86.192 255.255.255.224 &lt;BR /&gt;access-list outside_access_in remark NAT dynamic client - Let http response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq www host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark NAT Dynamic client - Let https response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq https host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Netlend - Let Proxy tcp in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.146 object-group Port_1505-Proxy-TCP &lt;BR /&gt;access-list outside_access_in remark Netlend - let Proxy udp in&lt;BR /&gt;access-list outside_access_in extended permit udp any object-group Above_well-known_UDP host 63.171.86.146 object-group Port_1505-Proxy &lt;BR /&gt;access-list outside_access_in remark Elan - Sftp control response for reports (in to SYSAPPS4)&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group Elan_High_Sftp host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark NAT Dynamic client - Let dns lookup replies in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq domain host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark NAT Dynamic client - Let nntp replies in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq nntp host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark NAT Dynamic client - Let smtp reply in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq smtp host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Elan - Let Multiport response into dynamic NAT client (sysapps4 for Elan reports)&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group Elan_multi-port_allow-mcm host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Exchange - let Blackberry traffic in&lt;BR /&gt;access-list outside_access_in extended permit tcp host 206.51.26.33 object-group non-well-known_tcp host 63.171.86.147 object-group RIM_P3101 &lt;BR /&gt;access-list outside_access_in remark NAT dynamic client - let FTP response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq ftp-data host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Netlend - let secure browse response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq https host 63.171.86.146 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Exchange - let smtp response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq smtp host 63.171.86.147 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Netlend - let in response to http browse&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq www host 63.171.86.146 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Exchange - ICMP&lt;BR /&gt;access-list outside_access_in extended permit icmp any host 63.171.86.147 &lt;BR /&gt;access-list outside_access_in remark Netlend - ICMP&lt;BR /&gt;access-list outside_access_in extended permit icmp any host 63.171.86.146 &lt;BR /&gt;access-list outside_access_in remark Barracuda - let NTP response in&lt;BR /&gt;access-list outside_access_in extended permit udp any eq ntp host 63.171.86.144 object-group Above_well-known_UDP &lt;BR /&gt;access-list outside_access_in remark Netlend - Let http response in (stateful?)&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq www host 63.171.86.144 object-group non-well-known_tcp inactive &lt;BR /&gt;access-list outside_access_in remark Exchange - Let Blackberry traffic in&lt;BR /&gt;access-list outside_access_in extended permit tcp host 204.187.87.33 object-group RIM_P3101 host 63.171.86.147 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Barracuda - response to User Access (Stateful?)&lt;BR /&gt;access-list outside_access_in extended permit tcp host 63.171.86.194 object-group TCP8000 10.1.0.0 255.255.0.0 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Exchange - TEST to listen on smtp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 63.171.86.147 eq smtp inactive &lt;BR /&gt;access-list outside_access_in extended permit ip host 63.171.86.144 host 63.171.86.194 inactive &lt;BR /&gt;access-list outside_access_in remark Barracuda - let response to http request - for updates&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq www host 63.171.86.144 &lt;BR /&gt;access-list outside_access_in remark uMonitor Test VPN&lt;BR /&gt;access-list outside_access_in extended permit ip host 10.100.102.2 host 10.1.5.8 &lt;BR /&gt;access-list outside_access_in remark uMonitor Test VPN&lt;BR /&gt;access-list outside_access_in extended permit icmp host 64.129.221.66 any &lt;BR /&gt;access-list outside_access_in remark uMonitor Prod1 VPN&lt;BR /&gt;access-list outside_access_in extended permit ip 192.168.0.0 255.255.255.0 host 10.1.5.8 &lt;BR /&gt;access-list outside_access_in remark U-Monitor production1&lt;BR /&gt;access-list outside_access_in extended permit icmp host 64.209.230.234 any &lt;BR /&gt;access-list outside_access_in remark uMonitor Prod2&lt;BR /&gt;access-list outside_access_in extended permit icmp host 209.235.27.44 any &lt;BR /&gt;access-list outside_access_in remark uMonitor Prod2 VPN&lt;BR /&gt;access-list outside_access_in extended permit ip 192.168.12.0 255.255.255.0 host 10.1.5.8 &lt;BR /&gt;access-list outside_access_in remark Exchange - Let secure POP3 in&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.147 object-group s-POP3 &lt;BR /&gt;access-list outside_access_in remark NAT Dynamic client - let ssh-sftp reply in (set up for Elan)&lt;BR /&gt;access-list outside_access_in extended permit tcp host 170.135.128.149 object-group ssh-sftp host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark for Proxy Host on extranet&lt;BR /&gt;access-list outside_access_in extended permit tcp 63.171.86.128 255.255.255.224 object-group Port_1505-Proxy-TCP 10.1.0.0 255.255.0.0 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark http response in&lt;BR /&gt;access-list outside_access_in extended permit tcp any eq www host 63.171.86.197 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Let in Elan ssh-sftp response to Appworx file xfr request&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group ElanSftp object-group Elansftp host 63.171.86.133 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark Verafin Test Vpn&lt;BR /&gt;access-list outside_access_in extended permit ip host 166.123.218.113 host 10.1.5.19 &lt;BR /&gt;access-list outside_access_in remark Verafin VPN DR&lt;BR /&gt;access-list outside_access_in extended permit ip host 164.95.95.112 host 10.1.5.19 &lt;BR /&gt;access-list outside_access_in remark Verafin VPN Prod&lt;BR /&gt;access-list outside_access_in extended permit ip host 166.123.218.112 host 10.1.5.19 &lt;BR /&gt;access-list outside_access_in remark USBank ssh transfers&lt;BR /&gt;access-list outside_access_in extended permit tcp 170.135.128.0 255.255.255.0 eq ssh host 63.171.86.148 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in extended permit tcp 170.135.128.0 255.255.255.0 eq ssh 10.1.11.0 255.255.255.0 object-group non-well-known_tcp &lt;BR /&gt;access-list outside_access_in remark HP Sim server from HP Remote Support Servers&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group HPRSS host 10.1.5.52 eq https &lt;BR /&gt;access-list outside_access_in remark Let UDT poll external switch&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 63.171.86.128 255.255.255.224 host 10.1.5.50 &lt;BR /&gt;access-list outside_access_in remark Use Calyx server from outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 63.171.86.149 eq https &lt;BR /&gt;access-list outside_access_in remark ssh diagnostic support for Barracudas&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group non-well-known_tcp host 63.171.86.133 eq ssh &lt;BR /&gt;access-list inside_nat0_outbound remark UMonitor VPN remote network&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 10.100.102.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 63.171.86.192 255.255.255.224 &lt;BR /&gt;access-list inside_nat0_outbound remark eCB remote network&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 10.199.8.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound remark Elan remote network&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 206.208.79.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound remark U-Monitor production&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 192.168.0.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound remark uMonitor Prod2 VPN&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 192.168.12.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group All-inside-networks 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound remark NAT exemption for FinCen DR VPN&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 10.1.5.19 host 164.95.95.112 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.200.200.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound remark traffic to FinCen Prod, Test VPN&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 10.1.5.19 166.123.218.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 10.1.5.50 63.171.86.128 255.255.255.224 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.7.0.0 255.255.0.0 10.1.0.0 255.255.0.0 &lt;BR /&gt;access-list capout extended permit tcp any host 63.171.86.144 eq smtp &lt;BR /&gt;access-list capout extended permit tcp host 63.171.86.144 eq smtp any &lt;BR /&gt;access-list capout extended permit tcp any host 63.171.86.147 eq smtp &lt;BR /&gt;access-list capout extended permit tcp host 63.171.86.147 eq smtp any &lt;BR /&gt;access-list capdmz extended permit tcp any host 63.171.86.194 eq smtp &lt;BR /&gt;access-list capdmz extended permit tcp host 63.171.86.194 eq smtp any &lt;BR /&gt;access-list capin extended permit tcp any host 10.1.5.55 eq smtp &lt;BR /&gt;access-list capin extended permit tcp host 10.1.5.55 eq smtp any &lt;BR /&gt;access-list inside_nat_static extended permit tcp host 10.1.5.55 eq smtp any &lt;BR /&gt;access-list inside_nat_static_1 extended permit tcp host 10.1.5.55 eq smtp any &lt;BR /&gt;access-list policy_nat_mail2 extended permit ip host 10.1.5.55 any &lt;BR /&gt;access-list inside_access_in extended permit ip object-group INSIDE_NETWORKS any &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.0.0 255.255.0.0 any inactive &lt;BR /&gt;access-list inside_access_in extended permit ip host 170.186.240.100 any &lt;BR /&gt;access-list inside_access_in extended permit udp host 10.1.10.127 host 10.1.5.54 inactive &lt;BR /&gt;access-list inside_access_in extended permit udp host 10.1.5.54 host 10.1.10.127 inactive &lt;BR /&gt;access-list outside_cryptomap extended permit ip host 10.1.5.8 192.168.0.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip host 10.1.5.8 192.168.12.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap_2 extended permit ip host 10.1.5.19 host 166.123.2.110 &lt;BR /&gt;access-list outside_cryptomap_3 extended permit ip host 10.1.5.19 host 166.123.2.126 &lt;BR /&gt;access-list cap extended permit ip host 10.1.5.8 host 192.168.12.42 &lt;BR /&gt;access-list inside_nat0_outbound_1 remark Exempt any traffic to new Chamblee&lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip any 10.3.0.0 255.255.0.0 &lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip 170.186.240.0 255.255.255.0 any &lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip 10.1.0.0 255.255.0.0 170.186.240.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip 10.1.0.0 255.255.0.0 170.209.0.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound_1 remark NAT exempt traffic to branches&lt;BR /&gt;access-list inside_nat0_outbound_1 extended permit ip object-group All-inside-networks object-group branch-networks &lt;BR /&gt;access-list outside_cryptomap_4 extended permit ip host 10.1.5.19 host 166.123.218.112 &lt;BR /&gt;access-list outside_cryptomap_5 extended permit ip host 10.1.5.8 host 10.100.102.2 &lt;BR /&gt;access-list outside_cryptomap_7 extended permit ip host 10.1.5.19 host 164.95.95.112 &lt;BR /&gt;access-list outside_cryptomap_6 extended permit ip host 10.1.5.19 host 166.123.218.113 &lt;BR /&gt;access-list split-tunnel standard permit 10.1.0.0 255.255.0.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 1000000&lt;BR /&gt;logging trap errors&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging from-address &lt;A href="mailto:ASA5510@cdcfcu.com"&gt;ASA5510@cdcfcu.com&lt;/A&gt;&lt;BR /&gt;logging recipient-address &lt;A href="mailto:mcmurphy@cdcfcu.com"&gt;mcmurphy@cdcfcu.com&lt;/A&gt; level critical&lt;BR /&gt;logging host inside 10.1.10.121&lt;BR /&gt;logging ftp-server 10.1.5.54 syslogs barracuda ****&lt;BR /&gt;logging class vpn buffered debugging &lt;BR /&gt;logging message 713120 level errors&lt;BR /&gt;logging message 722022 level errors&lt;BR /&gt;logging message 722023 level errors&lt;BR /&gt;logging message 713050 level errors&lt;BR /&gt;logging message 302013 level errors&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool remusers2 10.200.200.10-10.200.200.20 mask 255.255.0.0&lt;BR /&gt;ip local pool spltusers 10.210.210.10-10.210.210.20 mask 255.255.0.0&lt;BR /&gt;failover timeout -1&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-615.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound_1 outside&lt;BR /&gt;nat (inside) 1 access-list inside_pnat_outbound&lt;BR /&gt;static (outside,inside) tcp 170.135.128.149 ssh 170.135.128.149 20022 netmask 255.255.255.255 &lt;BR /&gt;static (outside,inside) tcp 170.135.216.250 ssh 170.135.216.250 20022 netmask 255.255.255.255 &lt;BR /&gt;static (dmz,outside) 63.171.86.144 63.171.86.194 netmask 255.255.255.255 dns &lt;BR /&gt;static (inside,outside) 63.171.86.147 10.1.5.55 netmask 255.255.255.255 dns &lt;BR /&gt;static (dmz,outside) 63.171.86.146 63.171.86.196 netmask 255.255.255.255 dns norandomseq &lt;BR /&gt;static (inside,outside) 63.171.86.149 10.1.5.36 netmask 255.255.255.255 dns &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 63.171.86.129 1&lt;BR /&gt;route inside 10.7.0.0 255.255.0.0 10.1.8.20 1&lt;BR /&gt;route outside 10.100.102.2 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route dmz 10.199.8.0 255.255.255.0 63.171.86.203 1&lt;BR /&gt;route outside 64.209.230.234 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 66.194.237.176 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 166.123.2.110 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 166.123.2.126 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 166.123.2.142 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 166.123.208.198 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 166.123.216.112 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route inside 170.186.240.0 255.255.255.0 10.1.8.6 1&lt;BR /&gt;route inside 170.209.0.2 255.255.255.255 10.1.8.13 1&lt;BR /&gt;route inside 170.209.0.3 255.255.255.255 10.1.8.13 1&lt;BR /&gt;route inside 172.19.102.190 255.255.255.255 10.1.8.6 1&lt;BR /&gt;route outside 192.168.0.0 255.255.255.0 63.171.86.129 1&lt;BR /&gt;route outside 192.168.12.0 255.255.255.0 63.171.86.129 1&lt;BR /&gt;route inside 192.168.29.0 255.255.255.0 10.1.8.6 1&lt;BR /&gt;route inside 192.168.93.26 255.255.255.255 10.1.8.12 1&lt;BR /&gt;route inside 199.186.96.0 255.255.255.0 10.1.8.16 1&lt;BR /&gt;route inside 199.186.97.0 255.255.255.0 10.1.8.16 1&lt;BR /&gt;route inside 199.186.98.0 255.255.255.0 10.1.8.16 1&lt;BR /&gt;route outside 199.196.144.143 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route outside 199.196.144.144 255.255.255.255 63.171.86.129 1&lt;BR /&gt;route dmz 206.208.79.0 255.255.255.0 63.171.86.202 1&lt;BR /&gt;route outside 209.235.27.44 255.255.255.255 63.171.86.129 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;ldap attribute-map CISCOMAP&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; msNPAllowDialin IETF-Radius-Class&lt;BR /&gt;&amp;nbsp; map-value msNPAllowDialin FALSE NOACCESS&lt;BR /&gt;&amp;nbsp; map-value msNPAllowDialin TRUE ALLOWACCESS&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server LDAP_SRV_GRP protocol ldap&lt;BR /&gt;aaa-server LDAP_SRV_GRP (inside) host 10.1.5.1&lt;BR /&gt; ldap-base-dn dc=cdcfcunet,dc=local&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password *&lt;BR /&gt; ldap-login-dn cn=administrator,cn=users,dc=cdcfcunet,dc=local&lt;BR /&gt; server-type microsoft&lt;BR /&gt; ldap-attribute-map CISCOMAP&lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;snmp-server host inside 10.1.5.52 community hpsim&lt;BR /&gt;snmp-server host inside 10.1.5.50 community swudt version 2c&lt;BR /&gt;snmp-server location Northlake&lt;BR /&gt;snmp-server contact Mike Murphy&lt;BR /&gt;snmp-server community swudt&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sysopt noproxyarp inside&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer 64.209.230.234 &lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 set reverse-route&lt;BR /&gt;crypto map outside_map 2 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 2 set peer 209.235.27.44 &lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 3 match address outside_cryptomap_2&lt;BR /&gt;crypto map outside_map 3 set pfs &lt;BR /&gt;crypto map outside_map 3 set peer 199.196.144.144 &lt;BR /&gt;crypto map outside_map 3 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 3 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 3 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 4 match address outside_cryptomap_3&lt;BR /&gt;crypto map outside_map 4 set pfs &lt;BR /&gt;crypto map outside_map 4 set peer 199.196.144.143 &lt;BR /&gt;crypto map outside_map 4 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 4 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 4 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 5 match address outside_cryptomap_4&lt;BR /&gt;crypto map outside_map 5 set pfs &lt;BR /&gt;crypto map outside_map 5 set peer 166.123.208.198 &lt;BR /&gt;crypto map outside_map 5 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 5 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 5 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 6 match address outside_cryptomap_5&lt;BR /&gt;crypto map outside_map 6 set peer 64.129.221.66 &lt;BR /&gt;crypto map outside_map 6 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map outside_map 6 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 6 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 7 match address outside_cryptomap_6&lt;BR /&gt;crypto map outside_map 7 set pfs &lt;BR /&gt;crypto map outside_map 7 set peer 166.123.208.198 &lt;BR /&gt;crypto map outside_map 7 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 7 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 7 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 8 match address outside_cryptomap_7&lt;BR /&gt;crypto map outside_map 8 set pfs &lt;BR /&gt;crypto map outside_map 8 set peer 164.95.95.4 &lt;BR /&gt;crypto map outside_map 8 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 8 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 8 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp identity address &lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 28800&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 128.192.1.193 source outside&lt;BR /&gt;ntp server 128.192.1.9 source outside&lt;BR /&gt;tftp-server inside 10.1.10.120 /asa5510&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; svc image disk0:/anyconnect-win-2.4.0202-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt;group-policy NOACCESS internal&lt;BR /&gt;group-policy NOACCESS attributes&lt;BR /&gt; vpn-simultaneous-logins 0&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;BR /&gt;group-policy fcusers internal&lt;BR /&gt;group-policy fcusers attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc &lt;BR /&gt; address-pools value remusers2&lt;BR /&gt;group-policy stusers internal&lt;BR /&gt;group-policy stusers attributes&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec svc &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value split-tunnel&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc keep-installer installed&lt;BR /&gt;&amp;nbsp; svc rekey time 30&lt;BR /&gt;&amp;nbsp; svc rekey method ssl&lt;BR /&gt;&amp;nbsp; svc ask none default svc&lt;BR /&gt;group-policy ALLOWACCESS internal&lt;BR /&gt;group-policy ALLOWACCESS attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc &lt;BR /&gt; address-pools value remusers2&lt;BR /&gt;username mmurphy password G3c44QeLNGYkvwxa encrypted privilege 0&lt;BR /&gt;username mmurphy attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt;username askeen nopassword privilege 0&lt;BR /&gt;username askeen attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username velocity nopassword&lt;BR /&gt;username velocity attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username special password fnYplaKWrx7ywBKR encrypted privilege 15&lt;BR /&gt;username dphilpot nopassword privilege 0&lt;BR /&gt;username dphilpot attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username bjames password c9WvTlQzhs/8jgpt encrypted privilege 0&lt;BR /&gt;username bjames attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted&lt;BR /&gt;username jvaughn password /KdVynqfFx/TfX0m encrypted privilege 0&lt;BR /&gt;username jvaughn attributes&lt;BR /&gt; vpn-group-policy fcusers&lt;BR /&gt; service-type remote-access&lt;BR /&gt;tunnel-group fcusers type remote-access&lt;BR /&gt;tunnel-group fcusers general-attributes&lt;BR /&gt; address-pool (inside) remusers2&lt;BR /&gt; address-pool remusers2&lt;BR /&gt; authentication-server-group LDAP_SRV_GRP&lt;BR /&gt; default-group-policy fcusers&lt;BR /&gt;tunnel-group fcusers webvpn-attributes&lt;BR /&gt; group-alias cdcusers enable&lt;BR /&gt;tunnel-group fcusers ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 64.209.230.234 type ipsec-l2l&lt;BR /&gt;tunnel-group 64.209.230.234 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 209.235.27.44 type ipsec-l2l&lt;BR /&gt;tunnel-group 209.235.27.44 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 199.196.144.143 type ipsec-l2l&lt;BR /&gt;tunnel-group 199.196.144.143 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 199.196.144.144 type ipsec-l2l&lt;BR /&gt;tunnel-group 199.196.144.144 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 166.123.208.198 type ipsec-l2l&lt;BR /&gt;tunnel-group 166.123.208.198 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 64.129.221.66 type ipsec-l2l&lt;BR /&gt;tunnel-group 64.129.221.66 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 164.95.95.4 type ipsec-l2l&lt;BR /&gt;tunnel-group 164.95.95.4 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group Fincen-Test type ipsec-l2l&lt;BR /&gt;tunnel-group Fincen-Test general-attributes&lt;BR /&gt;tunnel-group Fincen-Test ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group stusers type remote-access&lt;BR /&gt;tunnel-group stusers general-attributes&lt;BR /&gt; address-pool remusers2&lt;BR /&gt; authentication-server-group LDAP_SRV_GRP&lt;BR /&gt; default-group-policy stusers&lt;BR /&gt;tunnel-group stusers webvpn-attributes&lt;BR /&gt; group-alias 2wayusers enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect dns &lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 10.1.5.55&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:c26fd13eb40be4436a08b5bcc977aa2f&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-615.bin&lt;BR /&gt;asdm location 63.171.86.200 255.255.255.255 dmz&lt;BR /&gt;asdm location 10.1.5.5 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.5.2 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.5.9 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.133 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.197 255.255.255.255 dmz&lt;BR /&gt;asdm location 10.199.8.0 255.255.255.0 dmz&lt;BR /&gt;asdm location 206.208.79.0 255.255.255.0 dmz&lt;BR /&gt;asdm location 63.171.86.135 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.200 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.141 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.142 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.10.0 255.255.255.0 inside&lt;BR /&gt;asdm location 10.1.5.8 255.255.255.255 inside&lt;BR /&gt;asdm location 10.200.200.0 255.255.255.0 inside&lt;BR /&gt;asdm location 170.135.72.77 255.255.255.255 inside&lt;BR /&gt;asdm location 170.135.72.80 255.255.255.255 inside&lt;BR /&gt;asdm location 170.135.216.250 255.255.255.255 inside&lt;BR /&gt;asdm location 209.235.27.44 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.5.58 255.255.255.255 inside&lt;BR /&gt;asdm location 199.196.144.143 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.11.0 255.255.255.0 inside&lt;BR /&gt;asdm location 170.135.128.0 255.255.255.0 inside&lt;BR /&gt;asdm location 10.3.0.0 255.255.0.0 inside&lt;BR /&gt;asdm location 10.2.0.0 255.255.0.0 inside&lt;BR /&gt;asdm location 10.1.32.0 255.255.255.0 inside&lt;BR /&gt;asdm location 10.1.128.0 255.255.255.0 inside&lt;BR /&gt;asdm location 10.1.192.0 255.255.255.0 inside&lt;BR /&gt;asdm location 10.1.5.27 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.196 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.5.50 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.5.36 255.255.255.255 inside&lt;BR /&gt;asdm location 63.171.86.149 255.255.255.255 inside&lt;BR /&gt;asdm location 10.7.0.0 255.255.0.0 inside&lt;BR /&gt;asdm location 10.1.5.54 255.255.255.255 inside&lt;BR /&gt;asdm location 10.1.10.127 255.255.255.255 inside&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 19:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814772#M489887</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2011-12-29T19:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814773#M489890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mcmpurphy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So lets do the capture on the same interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test permit udp host test_host host DNS_server&lt;/P&gt;&lt;P&gt;access-list test permit udp host DNS_server host test_host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list test interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then go to a host on the inside and on a browser:&lt;/P&gt;&lt;P&gt;&lt;A href="https://10.1.1.2/capture/capin/pcap"&gt;https://10.1.1.2/capture/capin/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets see what the capture shows us&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 20:30:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814773#M489890</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-29T20:30:31Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814774#M489892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Curiouser and curiouser.&amp;nbsp; I nno longer see the dns packet inspsection error I started with, but I still do not get NS lookups working.&amp;nbsp; I re-enabled DNS inspection, since disabling it did not seem to change the problem:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns &lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns &lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the sequence when I try lookups from my test PC at 10.7.1.10:&lt;/P&gt;&lt;P&gt;Sniffer on test PC shows dns requests going to 10.1.5.1 and 10.1.5.54 (I have 2 dns servers)&lt;/P&gt;&lt;P&gt;Sniffer on dns server 10.1.5.54 show it receives DNS query, sends DNS response&lt;/P&gt;&lt;P&gt;Real-Time Log Viewer on ASA shows a recurring sequence of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/3/7/70731-ASARealTimeLog.bmp" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Built inbound UDP connection for inside 'dns-server' to inside 'test PC'&lt;/P&gt;&lt;P&gt;&amp;nbsp; Teardown UDP connection for inside 'dns-server' to inside 'test PC' duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ran the Capture,&amp;nbsp; it showed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/3/7/70730-ASACapture.bmp" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this sequence a problem?&amp;nbsp; 10.7.1.10 sends packet destination 10.1.5.54.&amp;nbsp; In the switchVLAN the packet routes to the 10.1 network, where the destination 10.1.5.54 is local.&amp;nbsp; So the packet 10.7.1.10 sends does not touch the ASA 10.1.1.2, but goes directly to 10.1.5.54.&amp;nbsp; 10.1.5.54 replies with a packet with destination 10.7.1.10 on another network, so it has to route the packet through the ASA 10.1.1.2.&amp;nbsp; The ASA has a static route 10.7.0.0 255.255.0.0 10.1.8.20, the ASA builds the connection 10.1.5.54 to 10.7.1.10, but tears it down right away for some reason and drops the packet. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Dec 2011 16:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814774#M489892</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2011-12-30T16:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814775#M489893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Asymetric routing seems to be the problem, ASA might be dropping the packets as he is not waiting for a DNS reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Test-pc------R1-----------Switch-------ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dns server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS server default gateway is ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1-So test-pc udp packet will go to its default gateway R1, he will see the destination IP address and will know is directly connected so will send it to the DNS server without going to the ASA....&lt;/P&gt;&lt;P&gt;2-DNS server will reply to its default gateway witch is the ASA, he will receive the DNS reply and will say, Wait a minute I do not have on my existing connections a entry for this reply, so it will drop it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can we change this:&lt;/P&gt;&lt;P&gt;I did a lab recreation and I think this is the real solution ( work-around (Not real solution)make dns default gateway R1)&lt;/P&gt;&lt;P&gt;We need to let R1 that in order to get to the DNS server he needs to send the packet to the ASA interface,&lt;/P&gt;&lt;P&gt;For that I need you to give me an ip address you are not using on that segment ( inside network connected to dns) Lets say you gave me 10.1.5.33&lt;/P&gt;&lt;P&gt;1-Static (inside,inside) 10.1.5.33 10.1.5.54&lt;/P&gt;&lt;P&gt;The ASA will let R1 I have 10.1.5.33, You also will need to change in the PC test the DNS ip addres to 10.1.5.33&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also need a Global for the packet comming from the inside because as you know all the packets getting to a ASA with nat control enable need a global to match&lt;/P&gt;&lt;P&gt;2- global (inside) 1 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the packet tracer output on my lab recreation (Test pc is 192.168.20.2, Server DNS 192.168.15.2 natted to 192.168.2.44):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# packet-tracer input inside udp 192.168.20.2 1025 192.168.15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.15.44 192.168.15.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host 192.168.15.2 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.15.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 4&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 192.168.15.44/0 to 192.168.15.2/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.15.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 13, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 192.168.20.2/1025 to 192.168.15.1/54941 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.15.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 13, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.15.44 192.168.15.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host 192.168.15.2 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.15.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 2&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.15.44 192.168.15.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host 192.168.15.2 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.15.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 2&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 20, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 192.168.15.2 using egress ifc inside&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address ca00.0e10.001c hits 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall(config)#&amp;nbsp; sh run glo&lt;/P&gt;&lt;P&gt;pixfirewall(config)#&amp;nbsp; sh run global&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;global (outisde) 1 interface&lt;/P&gt;&lt;P&gt;pixfirewall(config)# packet-tracer input inside udp 192.168.20.2 1025 192.168.$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.15.44 192.168.15.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host 192.168.15.2 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.15.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 3&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 192.168.15.44/0 to 192.168.15.2/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.15.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 14, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 192.168.20.2/1025 to 192.168.15.1/1194 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.15.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 14, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.15.44 192.168.15.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host 192.168.15.2 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.15.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 3&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.15.44 192.168.15.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host 192.168.15.2 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.15.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 3&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 21, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 192.168.15.2 using egress ifc inside&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address ca00.0e10.001c hits 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Dec 2011 19:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814775#M489893</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-30T19:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814776#M489897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sorry for the delay, the usual distractions from working things that break.&amp;nbsp; I'm trying to be sure I understand this before I put it in on a working ASA.&amp;nbsp; My config already has a "Global (outside) 1 interface", and all packets arriving on the inside are translated unless they meet one of the NAT exceptions.&amp;nbsp; Is the "Global (inside) 1 inside" you recommend also noeeded?&amp;nbsp; And does it not conflict naming the same nat_id?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 18:05:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814776#M489897</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2012-01-04T18:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814777#M489898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will no affect,because the ASA only use the global (inside) to contact inside ip addresses not outside ip addresses (public ones)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 18:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814777#M489898</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-04T18:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: dns through asa returns inspect-dns-invalid-pak</title>
      <link>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814778#M489899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I see where I add a static route to the ASA:&lt;/P&gt;&lt;P&gt;1-Static (inside,inside) 10.1.5.33 10.1.5.54&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;This next I don't understand.&amp;nbsp; Am I to assign 10.1.5.33 to an interface?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The ASA will let R1 I have 10.1.5.33.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I get this - change the Test PC the DNS ip address to 10.1.5.33 from 10.1.5.54&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And you explained the global, so it's OK&lt;/P&gt;&lt;P&gt;2- global (inside) 1 inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 19:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-through-asa-returns-inspect-dns-invalid-pak/m-p/1814778#M489899</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2012-01-04T19:13:32Z</dc:date>
    </item>
  </channel>
</rss>

