<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA - cannot reach local IP addresses in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708241#M534616</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great! Glad I could help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 31 Jul 2011 16:51:34 GMT</pubDate>
    <dc:creator>clooney</dc:creator>
    <dc:date>2011-07-31T16:51:34Z</dc:date>
    <item>
      <title>Cisco ASA - cannot reach local IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708236#M534609</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to use VPN to access our local network addresses from anywhere on the internet.&amp;nbsp; I have VPN setup on the ASA and I can connect with the Cisco VPN Client but I cannot telnet or ping any addresses on my local network.&amp;nbsp; I can access public IP addresses.&amp;nbsp; I don't se any routes under "Status/Statistics/Route Details" in my cisco VPN Client (when connected).&amp;nbsp; I have tried connecting with serveral pc's and iPads with the same results.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are trying to connect with users mark and t.reese using the DSIAdminUsers group.&amp;nbsp; When we try to telnet or ping an internal address such as 10.1.1.225 or 97.0.0.69, it times out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please look at the config and see what I am doing wrong.&amp;nbsp; Any help is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password mDnUbb1nQkpe6eG9 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 97.0.0.250 tarantella&lt;/P&gt;&lt;P&gt;name 172.31.255.3 MGMT_HOST description Remote Network Management&lt;/P&gt;&lt;P&gt;name 97.0.0.56 axis-camera-1&lt;/P&gt;&lt;P&gt;name 10.99.0.60 axis-camera-2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif CABLE&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 95.36.115.66 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;nameif DSL&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 64.173.93.28 255.255.255.128 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;nameif FIBER&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 25.181.205.2 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 97.0.0.100 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 3144 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8080 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 100 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq https &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq www &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8081 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8082 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 192.168.222.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip host 97.0.0.50 192.168.223.0 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 192.168.222.0 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list GLSVPN extended permit ip 10.1.100.0 255.255.255.0 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list GLSVPN extended permit ip 172.17.254.0 255.255.255.0 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list DSIVPNUser_splitTunnelAcl standard permit host 97.0.0.50 &lt;/P&gt;&lt;P&gt;access-list DSIAdminUsers_splitTunnelAcl standard permit any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;logging trap errors&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu CABLE 1500&lt;/P&gt;&lt;P&gt;mtu DSL 1500&lt;/P&gt;&lt;P&gt;mtu FIBER 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPNPOOL 192.168.222.1-192.168.222.10&lt;/P&gt;&lt;P&gt;ip local pool AdminPool 192.168.222.11-192.168.222.20&lt;/P&gt;&lt;P&gt;ip local pool TestPool 1.1.1.2-1.1.1.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit name DSI-Attack attack action alarm drop reset&lt;/P&gt;&lt;P&gt;ip audit name DSI-Alarm info action alarm&lt;/P&gt;&lt;P&gt;ip audit interface FIBER DSI-Alarm&lt;/P&gt;&lt;P&gt;ip audit interface FIBER DSI-Attack&lt;/P&gt;&lt;P&gt;ip audit interface inside DSI-Alarm&lt;/P&gt;&lt;P&gt;ip audit interface inside DSI-Attack&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any echo DSL&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply DSL&lt;/P&gt;&lt;P&gt;icmp permit any unreachable DSL&lt;/P&gt;&lt;P&gt;icmp permit any unreachable FIBER&lt;/P&gt;&lt;P&gt;icmp permit any echo FIBER&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply FIBER&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-613.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (DSL) 1 interface&lt;/P&gt;&lt;P&gt;global (FIBER) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 80&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8080 tarantella 8080 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 3144 tarantella 3144 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface telnet 97.0.0.2 telnet netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 2222 97.0.0.179 ssh netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 100 10.18.0.88 100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface https 97.0.0.34 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface www 97.0.0.34 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8081 axis-camera-1 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8082 axis-camera-2 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group 100 in interface FIBER&lt;/P&gt;&lt;P&gt;route FIBER 0.0.0.0 0.0.0.0 25.181.205.1 254&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.2.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.3.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.4.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.8.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.12.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.31.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.41.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.99.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 172.17.253.0 255.255.255.0 97.0.0.235 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;url-server (inside) vendor websense host 97.0.0.87 timeout 10 protocol TCP version 4 connections 5&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;filter url http 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sla monitor 88&lt;/P&gt;&lt;P&gt;type echo protocol ipIcmpEcho 96.36.115.65 interface CABLE&lt;/P&gt;&lt;P&gt;num-packets 3&lt;/P&gt;&lt;P&gt;timeout 1000&lt;/P&gt;&lt;P&gt;frequency 3&lt;/P&gt;&lt;P&gt;sla monitor schedule 88 life forever start-time now&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TSET esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set transform-set TSET&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 match address GLSVPN&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set peer 66.129.114.59 &lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map CMAP 10 ipsec-isakmp dynamic DCMAP&lt;/P&gt;&lt;P&gt;crypto map CMAP interface FIBER&lt;/P&gt;&lt;P&gt;crypto map inside_map 65535 ipsec-isakmp dynamic inside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable FIBER&lt;/P&gt;&lt;P&gt;crypto isakmp enable inside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash md5&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 1 rtr 88 reachability&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 FIBER&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt;group-policy ASAVPN internal&lt;/P&gt;&lt;P&gt;group-policy ASAVPN attributes&lt;/P&gt;&lt;P&gt;dns-server value 24.217.0.3 63.162.197.99&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec svc &lt;/P&gt;&lt;P&gt;default-domain value dsidsi.com&lt;/P&gt;&lt;P&gt;group-policy DSIAdminUsers internal&lt;/P&gt;&lt;P&gt;group-policy DSIAdminUsers attributes&lt;/P&gt;&lt;P&gt;dns-server value 97.0.0.21 97.0.0.22&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value DSIAdminUsers_splitTunnelAcl&lt;/P&gt;&lt;P&gt;default-domain value dsi.local&lt;/P&gt;&lt;P&gt;group-policy DSIVPNUser internal&lt;/P&gt;&lt;P&gt;group-policy DSIVPNUser attributes&lt;/P&gt;&lt;P&gt;dns-server value 97.0.0.21 97.0.0.22&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value DSIVPNUser_splitTunnelAcl&lt;/P&gt;&lt;P&gt;default-domain value dsi.local&lt;/P&gt;&lt;P&gt;username test password hmQhTUMT1T5Z4KHC encrypted&lt;/P&gt;&lt;P&gt;username test attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;username akipper password 9PojOPiG2IXFp42B encrypted privilege 0&lt;/P&gt;&lt;P&gt;username akipper attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy ASAVPN&lt;/P&gt;&lt;P&gt;username user1 password 0dldJICVF//EH4X3 encrypted&lt;/P&gt;&lt;P&gt;username user1 attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIVPNUser&lt;/P&gt;&lt;P&gt;username t.reese password JvMrGsialw4hFL/z encrypted privilege 15&lt;/P&gt;&lt;P&gt;username mark password g2vDAdNY1Hx6WOoS encrypted privilege 15&lt;/P&gt;&lt;P&gt;username mark attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) VPNPOOL&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;default-group-policy ASAVPN&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 66.129.114.59 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 66.129.114.59 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;default-group-policy DSIVPNUser&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) AdminPool&lt;/P&gt;&lt;P&gt;default-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group TestUser type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group TestUser general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) AdminPool&lt;/P&gt;&lt;P&gt;default-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group TestUser ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:dfb0accab0916d7f7f3a886c6c7d1ca2&lt;/P&gt;&lt;P&gt;: end&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password mDnUbb1nQkpe6eG9 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 97.0.0.250 tarantella&lt;/P&gt;&lt;P&gt;name 172.31.255.3 MGMT_HOST description Remote Network Management&lt;/P&gt;&lt;P&gt;name 97.0.0.56 axis-camera-1&lt;/P&gt;&lt;P&gt;name 10.99.0.60 axis-camera-2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif CABLE&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 95.36.115.66 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;nameif DSL&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 64.173.93.28 255.255.255.128 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;nameif FIBER&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 25.181.205.2 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 97.0.0.100 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 3144 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8080 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 100 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq https &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq www &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8081 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8082 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 192.168.222.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip host 97.0.0.50 192.168.223.0 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 192.168.222.0 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list GLSVPN extended permit ip 10.1.100.0 255.255.255.0 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list GLSVPN extended permit ip 172.17.254.0 255.255.255.0 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list DSIVPNUser_splitTunnelAcl standard permit host 97.0.0.50 &lt;/P&gt;&lt;P&gt;access-list DSIAdminUsers_splitTunnelAcl standard permit any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;logging trap errors&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu CABLE 1500&lt;/P&gt;&lt;P&gt;mtu DSL 1500&lt;/P&gt;&lt;P&gt;mtu FIBER 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPNPOOL 192.168.222.1-192.168.222.10&lt;/P&gt;&lt;P&gt;ip local pool AdminPool 192.168.222.11-192.168.222.20&lt;/P&gt;&lt;P&gt;ip local pool TestPool 1.1.1.2-1.1.1.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit name DSI-Attack attack action alarm drop reset&lt;/P&gt;&lt;P&gt;ip audit name DSI-Alarm info action alarm&lt;/P&gt;&lt;P&gt;ip audit interface FIBER DSI-Alarm&lt;/P&gt;&lt;P&gt;ip audit interface FIBER DSI-Attack&lt;/P&gt;&lt;P&gt;ip audit interface inside DSI-Alarm&lt;/P&gt;&lt;P&gt;ip audit interface inside DSI-Attack&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any echo DSL&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply DSL&lt;/P&gt;&lt;P&gt;icmp permit any unreachable DSL&lt;/P&gt;&lt;P&gt;icmp permit any unreachable FIBER&lt;/P&gt;&lt;P&gt;icmp permit any echo FIBER&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply FIBER&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-613.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (DSL) 1 interface&lt;/P&gt;&lt;P&gt;global (FIBER) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 80&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8080 tarantella 8080 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 3144 tarantella 3144 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface telnet 97.0.0.2 telnet netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 2222 97.0.0.179 ssh netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 100 10.18.0.88 100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface https 97.0.0.34 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface www 97.0.0.34 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8081 axis-camera-1 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8082 axis-camera-2 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group 100 in interface FIBER&lt;/P&gt;&lt;P&gt;route FIBER 0.0.0.0 0.0.0.0 25.181.205.1 254&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.2.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.3.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.4.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.8.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.12.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.31.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.41.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.99.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 172.17.253.0 255.255.255.0 97.0.0.235 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;url-server (inside) vendor websense host 97.0.0.87 timeout 10 protocol TCP version 4 connections 5&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;filter url http 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sla monitor 88&lt;/P&gt;&lt;P&gt;type echo protocol ipIcmpEcho 96.36.115.65 interface CABLE&lt;/P&gt;&lt;P&gt;num-packets 3&lt;/P&gt;&lt;P&gt;timeout 1000&lt;/P&gt;&lt;P&gt;frequency 3&lt;/P&gt;&lt;P&gt;sla monitor schedule 88 life forever start-time now&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TSET esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set transform-set TSET&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 match address GLSVPN&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set peer 66.129.114.59 &lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map CMAP 10 ipsec-isakmp dynamic DCMAP&lt;/P&gt;&lt;P&gt;crypto map CMAP interface FIBER&lt;/P&gt;&lt;P&gt;crypto map inside_map 65535 ipsec-isakmp dynamic inside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable FIBER&lt;/P&gt;&lt;P&gt;crypto isakmp enable inside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash md5&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 1 rtr 88 reachability&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 FIBER&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt;group-policy ASAVPN internal&lt;/P&gt;&lt;P&gt;group-policy ASAVPN attributes&lt;/P&gt;&lt;P&gt;dns-server value 24.217.0.3 63.162.197.99&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec svc &lt;/P&gt;&lt;P&gt;default-domain value dsidsi.com&lt;/P&gt;&lt;P&gt;group-policy DSIAdminUsers internal&lt;/P&gt;&lt;P&gt;group-policy DSIAdminUsers attributes&lt;/P&gt;&lt;P&gt;dns-server value 97.0.0.21 97.0.0.22&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value DSIAdminUsers_splitTunnelAcl&lt;/P&gt;&lt;P&gt;default-domain value dsi.local&lt;/P&gt;&lt;P&gt;group-policy DSIVPNUser internal&lt;/P&gt;&lt;P&gt;group-policy DSIVPNUser attributes&lt;/P&gt;&lt;P&gt;dns-server value 97.0.0.21 97.0.0.22&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value DSIVPNUser_splitTunnelAcl&lt;/P&gt;&lt;P&gt;default-domain value dsi.local&lt;/P&gt;&lt;P&gt;username test password hmQhTUMT1T5Z4KHC encrypted&lt;/P&gt;&lt;P&gt;username test attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;username akipper password 9PojOPiG2IXFp42B encrypted privilege 0&lt;/P&gt;&lt;P&gt;username akipper attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy ASAVPN&lt;/P&gt;&lt;P&gt;username user1 password 0dldJICVF//EH4X3 encrypted&lt;/P&gt;&lt;P&gt;username user1 attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIVPNUser&lt;/P&gt;&lt;P&gt;username t.reese password JvMrGsialw4hFL/z encrypted privilege 15&lt;/P&gt;&lt;P&gt;username mark password g2vDAdNY1Hx6WOoS encrypted privilege 15&lt;/P&gt;&lt;P&gt;username mark attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) VPNPOOL&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;default-group-policy ASAVPN&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 66.129.114.59 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 66.129.114.59 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;default-group-policy DSIVPNUser&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) AdminPool&lt;/P&gt;&lt;P&gt;default-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group TestUser type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group TestUser general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) AdminPool&lt;/P&gt;&lt;P&gt;default-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group TestUser ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:dfb0accab0916d7f7f3a886c6c7d1ca2&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:05:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708236#M534609</guid>
      <dc:creator>mark1mccorkle</dc:creator>
      <dc:date>2019-03-11T21:05:47Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA - cannot reach local IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708237#M534610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I didn't look at everything in this config so there might still be something else but one thing I did see is that your using a standard access-list to specify traffic to be tunneled that is permiting any.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to use an extended acl to specify traffic to be encrypted.&amp;nbsp; Specifically the line below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DSIAdminUsers_splitTunnelAcl standard permit any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you need to include your inside subnets in access-list 80 in order to excluded from nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jul 2011 23:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708237#M534610</guid>
      <dc:creator>clooney</dc:creator>
      <dc:date>2011-07-30T23:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - cannot reach local IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708238#M534612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Clooney,&lt;/P&gt;&lt;P&gt;Thanks for the reply.&amp;nbsp; I am a newbie so forgive the simple question.&amp;nbsp; My internal IP addresses are 97.0.0.1 thru 97.0.0.254 and 10.1.1.1 thru 10.1.1.254.&amp;nbsp; What would the access-list 80 look like?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Jul 2011 00:56:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708238#M534612</guid>
      <dc:creator>mark1mccorkle</dc:creator>
      <dc:date>2011-07-31T00:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - cannot reach local IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708239#M534614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list 80 extended permit ip 97.0.0.0 255.255.255.0 192.168.222.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip 10.1.1.0 255.255.255.0 192.168.222.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;your access list specifiying traffic to be encrypted can be this same access-list.&amp;nbsp; It should be nearly identical unless you have a reason to not allow some of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically you are telling the firewall not to nat the traffic from the inside networks to the vpn pool and vise versa.&amp;nbsp; Otherwise the asa will nat everything and the ip's won't be the same after passing nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the command packet-tracer and it'll step you through all of the flows and tell you whether or not the traffic would be allowed/nat'd/encrypted/etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Jul 2011 01:41:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708239#M534614</guid>
      <dc:creator>clooney</dc:creator>
      <dc:date>2011-07-31T01:41:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - cannot reach local IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708240#M534615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Clooney,&lt;/P&gt;&lt;P&gt;THAT WORKED!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After adding the access-list 80 lines, I can now telnet to any address on my network from a vpn connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate your help.&amp;nbsp; I have been working on this for 3 days and was close to giving up...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Jul 2011 13:47:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708240#M534615</guid>
      <dc:creator>mark1mccorkle</dc:creator>
      <dc:date>2011-07-31T13:47:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - cannot reach local IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708241#M534616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great! Glad I could help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Jul 2011 16:51:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708241#M534616</guid>
      <dc:creator>clooney</dc:creator>
      <dc:date>2011-07-31T16:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - cannot reach local IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708242#M534617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, I know this does not make any sense, but VPN is no longer working.&amp;nbsp; It was working earlier today, I tested with a PC and my iPad and it worked.&amp;nbsp; But I was checking things out one last time today and it is no longer working with either device.&amp;nbsp; I made no other changes to the config after adding the two lines to it that initially made it start working.&amp;nbsp; I saved the config after editing this morning and got a copy of the config just now.&amp;nbsp; I used diff and there are no changes since it was working.&amp;nbsp; I made no other network related changes since it was working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is a copy of the current config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other ideas before I just give up?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password mDnUbb1nQkpe6eG9 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 97.0.0.250 tarantella&lt;/P&gt;&lt;P&gt;name 172.31.255.3 MGMT_HOST description Remote Network Management&lt;/P&gt;&lt;P&gt;name 97.0.0.56 axis-camera-1&lt;/P&gt;&lt;P&gt;name 10.99.0.60 axis-camera-2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif CABLE&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 95.36.115.66 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;nameif DSL&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 64.173.93.28 255.255.255.128 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;nameif FIBER&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 25.181.205.2 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 97.0.0.100 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 3144 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8080 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 100 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq https &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq www &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8081 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8082 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 192.168.222.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip host 97.0.0.50 192.168.223.0 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 192.168.222.0 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip 97.0.0.0 255.255.255.0 192.168.222.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip 10.1.1.0 255.255.255.0 192.168.222.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list GLSVPN extended permit ip 10.1.100.0 255.255.255.0 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list GLSVPN extended permit ip 172.17.254.0 255.255.255.0 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list DSIVPNUser_splitTunnelAcl standard permit host 97.0.0.50 &lt;/P&gt;&lt;P&gt;access-list DSIAdminUsers_splitTunnelAcl standard permit any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;logging trap errors&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu CABLE 1500&lt;/P&gt;&lt;P&gt;mtu DSL 1500&lt;/P&gt;&lt;P&gt;mtu FIBER 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPNPOOL 192.168.222.1-192.168.222.10&lt;/P&gt;&lt;P&gt;ip local pool AdminPool 192.168.222.11-192.168.222.20&lt;/P&gt;&lt;P&gt;ip local pool TestPool 1.1.1.2-1.1.1.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit name DSI-Attack attack action alarm drop reset&lt;/P&gt;&lt;P&gt;ip audit name DSI-Alarm info action alarm&lt;/P&gt;&lt;P&gt;ip audit interface FIBER DSI-Alarm&lt;/P&gt;&lt;P&gt;ip audit interface FIBER DSI-Attack&lt;/P&gt;&lt;P&gt;ip audit interface inside DSI-Alarm&lt;/P&gt;&lt;P&gt;ip audit interface inside DSI-Attack&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any echo DSL&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply DSL&lt;/P&gt;&lt;P&gt;icmp permit any unreachable DSL&lt;/P&gt;&lt;P&gt;icmp permit any unreachable FIBER&lt;/P&gt;&lt;P&gt;icmp permit any echo FIBER&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply FIBER&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-613.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (DSL) 1 interface&lt;/P&gt;&lt;P&gt;global (FIBER) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 80&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8080 tarantella 8080 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 3144 tarantella 3144 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface telnet 97.0.0.2 telnet netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 2222 97.0.0.179 ssh netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 100 10.18.0.88 100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface https 97.0.0.34 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface www 97.0.0.34 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8081 axis-camera-1 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8082 axis-camera-2 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group 100 in interface FIBER&lt;/P&gt;&lt;P&gt;route FIBER 0.0.0.0 0.0.0.0 25.181.205.1 254&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.2.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.3.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.4.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.8.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.12.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.31.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.41.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.99.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 172.17.253.0 255.255.255.0 97.0.0.235 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;url-server (inside) vendor websense host 97.0.0.87 timeout 10 protocol TCP version 4 connections 5&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;filter url http 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sla monitor 88&lt;/P&gt;&lt;P&gt;type echo protocol ipIcmpEcho 96.36.115.65 interface CABLE&lt;/P&gt;&lt;P&gt;num-packets 3&lt;/P&gt;&lt;P&gt;timeout 1000&lt;/P&gt;&lt;P&gt;frequency 3&lt;/P&gt;&lt;P&gt;sla monitor schedule 88 life forever start-time now&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TSET esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set transform-set TSET&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 match address GLSVPN&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set peer 66.129.114.59 &lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map CMAP 10 ipsec-isakmp dynamic DCMAP&lt;/P&gt;&lt;P&gt;crypto map CMAP interface FIBER&lt;/P&gt;&lt;P&gt;crypto map inside_map 65535 ipsec-isakmp dynamic inside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable FIBER&lt;/P&gt;&lt;P&gt;crypto isakmp enable inside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash md5&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 1 rtr 88 reachability&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 FIBER&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt;group-policy ASAVPN internal&lt;/P&gt;&lt;P&gt;group-policy ASAVPN attributes&lt;/P&gt;&lt;P&gt;dns-server value 24.217.0.3 63.162.197.99&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec svc &lt;/P&gt;&lt;P&gt;default-domain value dsidsi.com&lt;/P&gt;&lt;P&gt;group-policy DSIAdminUsers internal&lt;/P&gt;&lt;P&gt;group-policy DSIAdminUsers attributes&lt;/P&gt;&lt;P&gt;dns-server value 97.0.0.21 97.0.0.22&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value DSIAdminUsers_splitTunnelAcl&lt;/P&gt;&lt;P&gt;default-domain value dsi.local&lt;/P&gt;&lt;P&gt;group-policy DSIVPNUser internal&lt;/P&gt;&lt;P&gt;group-policy DSIVPNUser attributes&lt;/P&gt;&lt;P&gt;dns-server value 97.0.0.21 97.0.0.22&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value DSIVPNUser_splitTunnelAcl&lt;/P&gt;&lt;P&gt;default-domain value dsi.local&lt;/P&gt;&lt;P&gt;username test password hmQhTUMT1T5Z4KHC encrypted&lt;/P&gt;&lt;P&gt;username test attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;username akipper password 9PojOPiG2IXFp42B encrypted privilege 0&lt;/P&gt;&lt;P&gt;username akipper attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy ASAVPN&lt;/P&gt;&lt;P&gt;username user1 password 0dldJICVF//EH4X3 encrypted&lt;/P&gt;&lt;P&gt;username user1 attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIVPNUser&lt;/P&gt;&lt;P&gt;username t.reese password JvMrGsialw4hFL/z encrypted privilege 15&lt;/P&gt;&lt;P&gt;username mark password g2vDAdNY1Hx6WOoS encrypted privilege 15&lt;/P&gt;&lt;P&gt;username mark attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) VPNPOOL&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;default-group-policy ASAVPN&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 66.129.114.59 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 66.129.114.59 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;default-group-policy DSIVPNUser&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) AdminPool&lt;/P&gt;&lt;P&gt;default-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group TestUser type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group TestUser general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) AdminPool&lt;/P&gt;&lt;P&gt;default-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group TestUser ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:dfb0accab0916d7f7f3a886c6c7d1ca2&lt;/P&gt;&lt;P&gt;: end &lt;/P&gt;&lt;P&gt;ASA Version 8.0(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password mDnUbb1nQkpe6eG9 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 97.0.0.250 tarantella&lt;/P&gt;&lt;P&gt;name 172.31.255.3 MGMT_HOST description Remote Network Management&lt;/P&gt;&lt;P&gt;name 97.0.0.56 axis-camera-1&lt;/P&gt;&lt;P&gt;name 10.99.0.60 axis-camera-2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif CABLE&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 95.36.115.66 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;nameif DSL&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 64.173.93.28 255.255.255.128 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;nameif FIBER&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 25.181.205.2 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 97.0.0.100 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 3144 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8080 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 100 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq https &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq www &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8081 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 25.181.205.2 eq 8082 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 192.168.222.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip host 97.0.0.50 192.168.223.0 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip any 192.168.222.0 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip 97.0.0.0 255.255.255.0 192.168.222.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 80 extended permit ip 10.1.1.0 255.255.255.0 192.168.222.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list GLSVPN extended permit ip 10.1.100.0 255.255.255.0 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list GLSVPN extended permit ip 172.17.254.0 255.255.255.0 172.31.253.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list DSIVPNUser_splitTunnelAcl standard permit host 97.0.0.50 &lt;/P&gt;&lt;P&gt;access-list DSIAdminUsers_splitTunnelAcl standard permit any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;logging trap errors&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu CABLE 1500&lt;/P&gt;&lt;P&gt;mtu DSL 1500&lt;/P&gt;&lt;P&gt;mtu FIBER 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPNPOOL 192.168.222.1-192.168.222.10&lt;/P&gt;&lt;P&gt;ip local pool AdminPool 192.168.222.11-192.168.222.20&lt;/P&gt;&lt;P&gt;ip local pool TestPool 1.1.1.2-1.1.1.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit name DSI-Attack attack action alarm drop reset&lt;/P&gt;&lt;P&gt;ip audit name DSI-Alarm info action alarm&lt;/P&gt;&lt;P&gt;ip audit interface FIBER DSI-Alarm&lt;/P&gt;&lt;P&gt;ip audit interface FIBER DSI-Attack&lt;/P&gt;&lt;P&gt;ip audit interface inside DSI-Alarm&lt;/P&gt;&lt;P&gt;ip audit interface inside DSI-Attack&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any echo DSL&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply DSL&lt;/P&gt;&lt;P&gt;icmp permit any unreachable DSL&lt;/P&gt;&lt;P&gt;icmp permit any unreachable FIBER&lt;/P&gt;&lt;P&gt;icmp permit any echo FIBER&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply FIBER&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-613.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (DSL) 1 interface&lt;/P&gt;&lt;P&gt;global (FIBER) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 80&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8080 tarantella 8080 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 3144 tarantella 3144 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface telnet 97.0.0.2 telnet netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 2222 97.0.0.179 ssh netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 100 10.18.0.88 100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface https 97.0.0.34 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface www 97.0.0.34 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8081 axis-camera-1 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,FIBER) tcp interface 8082 axis-camera-2 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group 100 in interface FIBER&lt;/P&gt;&lt;P&gt;route FIBER 0.0.0.0 0.0.0.0 25.181.205.1 254&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.2.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.3.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.4.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.8.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.12.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.31.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.41.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 10.99.0.0 255.255.0.0 97.0.0.3 1&lt;/P&gt;&lt;P&gt;route inside 172.17.253.0 255.255.255.0 97.0.0.235 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;url-server (inside) vendor websense host 97.0.0.87 timeout 10 protocol TCP version 4 connections 5&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;filter url http 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sla monitor 88&lt;/P&gt;&lt;P&gt;type echo protocol ipIcmpEcho 96.36.115.65 interface CABLE&lt;/P&gt;&lt;P&gt;num-packets 3&lt;/P&gt;&lt;P&gt;timeout 1000&lt;/P&gt;&lt;P&gt;frequency 3&lt;/P&gt;&lt;P&gt;sla monitor schedule 88 life forever start-time now&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TSET esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set transform-set TSET&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map DCMAP 10 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map inside_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 match address GLSVPN&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set peer 66.129.114.59 &lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto map CMAP 1 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map CMAP 10 ipsec-isakmp dynamic DCMAP&lt;/P&gt;&lt;P&gt;crypto map CMAP interface FIBER&lt;/P&gt;&lt;P&gt;crypto map inside_map 65535 ipsec-isakmp dynamic inside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable FIBER&lt;/P&gt;&lt;P&gt;crypto isakmp enable inside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash md5&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 1 rtr 88 reachability&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 FIBER&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt;group-policy ASAVPN internal&lt;/P&gt;&lt;P&gt;group-policy ASAVPN attributes&lt;/P&gt;&lt;P&gt;dns-server value 24.217.0.3 63.162.197.99&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec svc &lt;/P&gt;&lt;P&gt;default-domain value dsidsi.com&lt;/P&gt;&lt;P&gt;group-policy DSIAdminUsers internal&lt;/P&gt;&lt;P&gt;group-policy DSIAdminUsers attributes&lt;/P&gt;&lt;P&gt;dns-server value 97.0.0.21 97.0.0.22&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value DSIAdminUsers_splitTunnelAcl&lt;/P&gt;&lt;P&gt;default-domain value dsi.local&lt;/P&gt;&lt;P&gt;group-policy DSIVPNUser internal&lt;/P&gt;&lt;P&gt;group-policy DSIVPNUser attributes&lt;/P&gt;&lt;P&gt;dns-server value 97.0.0.21 97.0.0.22&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value DSIVPNUser_splitTunnelAcl&lt;/P&gt;&lt;P&gt;default-domain value dsi.local&lt;/P&gt;&lt;P&gt;username test password hmQhTUMT1T5Z4KHC encrypted&lt;/P&gt;&lt;P&gt;username test attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;username akipper password 9PojOPiG2IXFp42B encrypted privilege 0&lt;/P&gt;&lt;P&gt;username akipper attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy ASAVPN&lt;/P&gt;&lt;P&gt;username user1 password 0dldJICVF//EH4X3 encrypted&lt;/P&gt;&lt;P&gt;username user1 attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIVPNUser&lt;/P&gt;&lt;P&gt;username t.reese password JvMrGsialw4hFL/z encrypted privilege 15&lt;/P&gt;&lt;P&gt;username mark password g2vDAdNY1Hx6WOoS encrypted privilege 15&lt;/P&gt;&lt;P&gt;username mark attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) VPNPOOL&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;default-group-policy ASAVPN&lt;/P&gt;&lt;P&gt;tunnel-group ASAVPN ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 66.129.114.59 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 66.129.114.59 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;default-group-policy DSIVPNUser&lt;/P&gt;&lt;P&gt;tunnel-group DSIVPNUser ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) AdminPool&lt;/P&gt;&lt;P&gt;default-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group DSIAdminUsers ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group TestUser type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group TestUser general-attributes&lt;/P&gt;&lt;P&gt;address-pool (FIBER) AdminPool&lt;/P&gt;&lt;P&gt;default-group-policy DSIAdminUsers&lt;/P&gt;&lt;P&gt;tunnel-group TestUser ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Jul 2011 22:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cannot-reach-local-ip-addresses/m-p/1708242#M534617</guid>
      <dc:creator>mark1mccorkle</dc:creator>
      <dc:date>2011-07-31T22:13:32Z</dc:date>
    </item>
  </channel>
</rss>

