<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5506-X 9.6 Problems routing specific destinations over second WAN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-x-9-6-problems-routing-specific-destinations-over/m-p/3335746#M969877</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt; wrote:&lt;BR /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"What a want to accomplish is that all trafic which is sent to destinations 10.0.0.0/8 and 192.200.0.0/16 is sent over the WAN_PON Interface.&amp;nbsp;all other internet trafic must be sent to the normal WAN."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As per the config file, this is already ok.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route WAN 0.0.0.0 0.0.0.0 1.1.1.89 1 &amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that everyhing to WAN&lt;/P&gt;
&lt;P&gt;route WAN_PON 10.0.0.0 255.0.0.0 10.49.240.1 1 &amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that network 10 must be sent to WAN_PON&lt;/P&gt;
&lt;P&gt;route VLAN10 192.168.4.0 255.255.255.0 192.168.100.253 1&lt;SPAN&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that network 192.168.4 must be sent to VLAN10&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;route WAN_PON 192.200.0.0 255.255.0.0 10.49.240.1 1&lt;SPAN&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that network 192.200&amp;nbsp; must be sent to WAN_PON&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"On the Branch Office, which is connected by an site-to-site VPN with the HQ, i also want to be able to access those networks at the WAN_PON Interface at the HQ."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;Considering you have those network permitted on your VPN policy, then, you need to add routing on the Branch Office to sent those traffic over the VPN.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-If I helped you somehow, please, rate it as useful.-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;First, thanks for pointing me in the direction. The first thing is indeed working.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now the second: Help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The problem is that i can't figure out how to permitt those networks on the VPN Policy and adding the route on the branch office to sent those traffic over the VPN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Feb 2018 10:00:29 GMT</pubDate>
    <dc:creator>Robbert Tol</dc:creator>
    <dc:date>2018-02-22T10:00:29Z</dc:date>
    <item>
      <title>ASA 5506-X 9.6 Problems routing specific destinations over second WAN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-9-6-problems-routing-specific-destinations-over/m-p/3335562#M969875</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am an newby in Cisco ASA and before the customer had two Zyxel Firewall's which had any problems with the Site to site VPN's and the second WAN on the HQ Location.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem is as follow:&lt;/P&gt;
&lt;P&gt;on the HQ, the ASA has two internal VLAN's (Production and Guest) and two WAN Interfaces.&lt;/P&gt;
&lt;P&gt;The First WAN Interface (name WAN) is for normal internet traffic and has also an Site to Site with the branche office. On the Second WAN Port (WAN_PON) is an DealerNetwork connected (kind of an intranet secured) on which serveral servers deliver apps and webservices.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What a want to accomplish is that all trafic which is sent to destinations 10.0.0.0/8 and 192.200.0.0/16 is sent over the WAN_PON Interface.&amp;nbsp;all other internet trafic must be sent to the normal WAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the Branch Office, which is connected by an site-to-site VPN with the HQ, i also want to be able to access those networks at the WAN_PON Interface at the HQ.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm so sorry that i can't figure it out, so please help if you can.&lt;/P&gt;
&lt;P&gt;Below you find the config's of both ASA's. Both are running v9.6(4) software.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Robbert&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HQ Config:&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;hostname ASA5506X-VDL&lt;/P&gt;
&lt;P class="p2"&gt;domain-name company.local&lt;/P&gt;
&lt;P class="p2"&gt;enable password $sha512$5000$IvpLaK7wslmhXCYc77Z2Dg==$IMVR8WShj36y5fUcEe0Uqg== pbkdf2&lt;/P&gt;
&lt;P class="p2"&gt;names&lt;/P&gt;
&lt;P class="p2"&gt;no mac-address auto&lt;/P&gt;
&lt;P class="p2"&gt;ip local pool VPN_DHCP_Pool 192.168.10.1-192.168.10.200 mask 255.255.255.0&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;interface GigabitEthernet1/1&lt;/P&gt;
&lt;P class="p2"&gt;description Inside LAN Interface ASA5506-X&lt;/P&gt;
&lt;P class="p2"&gt;no nameif&lt;/P&gt;
&lt;P class="p2"&gt;no security-level&lt;/P&gt;
&lt;P class="p2"&gt;no ip address&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;interface GigabitEthernet1/1.1&lt;/P&gt;
&lt;P class="p2"&gt;description company VLAN10 Interface LAN Netwerk&lt;/P&gt;
&lt;P class="p2"&gt;vlan 10&lt;/P&gt;
&lt;P class="p2"&gt;nameif VLAN10&lt;/P&gt;
&lt;P class="p2"&gt;security-level 100&lt;/P&gt;
&lt;P class="p2"&gt;ip address 192.168.100.1 255.255.255.0&lt;/P&gt;
&lt;P class="p2"&gt;policy-route route-map PON_MAP&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;interface GigabitEthernet1/1.2&lt;/P&gt;
&lt;P class="p2"&gt;description company VLAN20 Interface Guest Netwerk&lt;/P&gt;
&lt;P class="p2"&gt;vlan 20&lt;/P&gt;
&lt;P class="p2"&gt;nameif VLAN20&lt;/P&gt;
&lt;P class="p2"&gt;security-level 25&lt;/P&gt;
&lt;P class="p2"&gt;ip address 192.168.250.1 255.255.255.0&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;interface GigabitEthernet1/2&lt;/P&gt;
&lt;P class="p2"&gt;description WAN Interface Tele2 Fiber Internet&lt;/P&gt;
&lt;P class="p2"&gt;speed 100&lt;/P&gt;
&lt;P class="p2"&gt;duplex full&lt;/P&gt;
&lt;P class="p2"&gt;nameif WAN&lt;/P&gt;
&lt;P class="p2"&gt;security-level 0&lt;/P&gt;
&lt;P class="p2"&gt;ip address 1.1.1.94 255.255.255.248&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;interface GigabitEthernet1/3&lt;/P&gt;
&lt;P class="p2"&gt;description PON WAN Interface&lt;/P&gt;
&lt;P class="p2"&gt;nameif WAN_PON&lt;/P&gt;
&lt;P class="p2"&gt;security-level 0&lt;/P&gt;
&lt;P class="p2"&gt;ip address 10.49.240.10 255.255.255.0&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;interface GigabitEthernet1/4&lt;/P&gt;
&lt;P class="p2"&gt;shutdown&lt;/P&gt;
&lt;P class="p2"&gt;no nameif&lt;/P&gt;
&lt;P class="p2"&gt;no security-level&lt;/P&gt;
&lt;P class="p2"&gt;no ip address&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;interface GigabitEthernet1/5&lt;/P&gt;
&lt;P class="p2"&gt;shutdown&lt;/P&gt;
&lt;P class="p2"&gt;no nameif&lt;/P&gt;
&lt;P class="p2"&gt;no security-level&lt;/P&gt;
&lt;P class="p2"&gt;no ip address&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;interface GigabitEthernet1/6&lt;/P&gt;
&lt;P class="p2"&gt;shutdown&lt;/P&gt;
&lt;P class="p2"&gt;no nameif&lt;/P&gt;
&lt;P class="p2"&gt;no security-level&lt;/P&gt;
&lt;P class="p2"&gt;no ip address&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;interface GigabitEthernet1/7&lt;/P&gt;
&lt;P class="p2"&gt;shutdown&lt;/P&gt;
&lt;P class="p2"&gt;no nameif&lt;/P&gt;
&lt;P class="p2"&gt;no security-level&lt;/P&gt;
&lt;P class="p2"&gt;no ip address&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;interface GigabitEthernet1/8&lt;/P&gt;
&lt;P class="p2"&gt;shutdown&lt;/P&gt;
&lt;P class="p2"&gt;no nameif&lt;/P&gt;
&lt;P class="p2"&gt;no security-level&lt;/P&gt;
&lt;P class="p2"&gt;no ip address&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;interface Management1/1&lt;/P&gt;
&lt;P class="p2"&gt;management-only&lt;/P&gt;
&lt;P class="p2"&gt;no nameif&lt;/P&gt;
&lt;P class="p2"&gt;no security-level&lt;/P&gt;
&lt;P class="p2"&gt;no ip address&lt;/P&gt;
&lt;P class="p2"&gt;boot system disk0:/asa964-lfbff-k8.SPA&lt;/P&gt;
&lt;P class="p2"&gt;ftp mode passive&lt;/P&gt;
&lt;P class="p2"&gt;dns domain-lookup VLAN10&lt;/P&gt;
&lt;P class="p2"&gt;dns domain-lookup VLAN20&lt;/P&gt;
&lt;P class="p2"&gt;dns domain-lookup WAN&lt;/P&gt;
&lt;P class="p2"&gt;dns domain-lookup WAN_PON&lt;/P&gt;
&lt;P class="p2"&gt;dns server-group DefaultDNS&lt;/P&gt;
&lt;P class="p2"&gt;name-server 8.8.8.8&lt;/P&gt;
&lt;P class="p2"&gt;name-server 8.8.4.4&lt;/P&gt;
&lt;P class="p2"&gt;name-server 10.150.1.3&lt;/P&gt;
&lt;P class="p2"&gt;name-server 192.168.100.21&lt;/P&gt;
&lt;P class="p2"&gt;domain-name company.local&lt;/P&gt;
&lt;P class="p2"&gt;same-security-traffic permit inter-interface&lt;/P&gt;
&lt;P class="p2"&gt;same-security-traffic permit intra-interface&lt;/P&gt;
&lt;P class="p2"&gt;object network Gonzo_LAN&lt;/P&gt;
&lt;P class="p2"&gt;host 192.168.100.22&lt;/P&gt;
&lt;P class="p2"&gt;description Microsoft Exchange 2010 Server company&lt;/P&gt;
&lt;P class="p2"&gt;object network Gonzo_WAN&lt;/P&gt;
&lt;P class="p2"&gt;host 1.1.1.90&lt;/P&gt;
&lt;P class="p2"&gt;description Microsoft Exchange 2010 Server company WAN Address&lt;/P&gt;
&lt;P class="p2"&gt;object network Gonzo_LAN_SMTP&lt;/P&gt;
&lt;P class="p2"&gt;host 192.168.100.22&lt;/P&gt;
&lt;P class="p2"&gt;object network Gonzo_LAN_HTTPS&lt;/P&gt;
&lt;P class="p2"&gt;host 192.168.100.22&lt;/P&gt;
&lt;P class="p2"&gt;object network Camera_LAN&lt;/P&gt;
&lt;P class="p2"&gt;host 192.168.100.10&lt;/P&gt;
&lt;P class="p2"&gt;object network Camera_WAN&lt;/P&gt;
&lt;P class="p2"&gt;host 1.1.1.92&lt;/P&gt;
&lt;P class="p2"&gt;object network Camera_LAN_554&lt;/P&gt;
&lt;P class="p2"&gt;host 192.168.100.10&lt;/P&gt;
&lt;P class="p2"&gt;object network Camera_LAN_8000&lt;/P&gt;
&lt;P class="p2"&gt;host 192.168.100.10&lt;/P&gt;
&lt;P class="p2"&gt;object network Camera_LAN_8099&lt;/P&gt;
&lt;P class="p2"&gt;host 192.168.100.10&lt;/P&gt;
&lt;P class="p2"&gt;object network Hyper_LAN&lt;/P&gt;
&lt;P class="p2"&gt;host 192.168.100.250&lt;/P&gt;
&lt;P class="p2"&gt;object network Hyper_WAN&lt;/P&gt;
&lt;P class="p2"&gt;host 1.1.1.91&lt;/P&gt;
&lt;P class="p2"&gt;object network Hyper_LAN_HTTPS&lt;/P&gt;
&lt;P class="p2"&gt;host 192.168.100.250&lt;/P&gt;
&lt;P class="p2"&gt;object network Hyper_LAN_17990&lt;/P&gt;
&lt;P class="p2"&gt;host 192.168.100.250&lt;/P&gt;
&lt;P class="p2"&gt;object network Zoetermeer_LAN&lt;/P&gt;
&lt;P class="p2"&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;
&lt;P class="p2"&gt;object network Zoetermeer_WAN&lt;/P&gt;
&lt;P class="p2"&gt;host 2.2.2.98&lt;/P&gt;
&lt;P class="p2"&gt;object network VLAN10_Subnet&lt;/P&gt;
&lt;P class="p2"&gt;subnet 192.168.100.0 255.255.255.0&lt;/P&gt;
&lt;P class="p2"&gt;description VLAN10 company LAN Subnet&lt;/P&gt;
&lt;P class="p2"&gt;object network VLAN20_Subnet&lt;/P&gt;
&lt;P class="p2"&gt;subnet 192.168.250.0 255.255.255.0&lt;/P&gt;
&lt;P class="p2"&gt;description VLAN20 company Guest Subnet&lt;/P&gt;
&lt;P class="p2"&gt;object network NETWORK_OBJ_192.168.10.0_24&lt;/P&gt;
&lt;P class="p2"&gt;subnet 192.168.10.0 255.255.255.0&lt;/P&gt;
&lt;P class="p2"&gt;object network NETWORK_OBJ_192.168.100.0_24&lt;/P&gt;
&lt;P class="p2"&gt;subnet 192.168.100.0 255.255.255.0&lt;/P&gt;
&lt;P class="p2"&gt;object network PON_192_200_0_0&lt;/P&gt;
&lt;P class="p2"&gt;subnet 192.200.0.0 255.255.0.0&lt;/P&gt;
&lt;P class="p2"&gt;object network PON_10_0_0_0&lt;/P&gt;
&lt;P class="p2"&gt;subnet 10.0.0.0 255.0.0.0&lt;/P&gt;
&lt;P class="p2"&gt;object network VLAN10_PON&lt;/P&gt;
&lt;P class="p2"&gt;subnet 192.168.100.0 255.255.255.0&lt;/P&gt;
&lt;P class="p2"&gt;object-group service Gonzo_Services&lt;/P&gt;
&lt;P class="p2"&gt;service-object tcp destination eq https&lt;/P&gt;
&lt;P class="p2"&gt;service-object tcp destination eq smtp&lt;/P&gt;
&lt;P class="p2"&gt;object-group service Camera_Services&lt;/P&gt;
&lt;P class="p2"&gt;service-object tcp destination eq rtsp&lt;/P&gt;
&lt;P class="p2"&gt;service-object tcp destination eq 8000&lt;/P&gt;
&lt;P class="p2"&gt;service-object tcp destination eq 8099&lt;/P&gt;
&lt;P class="p2"&gt;object-group service Hyper_Services&lt;/P&gt;
&lt;P class="p2"&gt;service-object tcp destination eq https&lt;/P&gt;
&lt;P class="p2"&gt;service-object tcp destination eq 17990&lt;/P&gt;
&lt;P class="p2"&gt;object-group network PON_Network_Group&lt;/P&gt;
&lt;P class="p2"&gt;network-object object PON_10_0_0_0&lt;/P&gt;
&lt;P class="p2"&gt;network-object object PON_192_200_0_0&lt;/P&gt;
&lt;P class="p2"&gt;access-list outside_inside extended permit icmp any any echo&lt;/P&gt;
&lt;P class="p2"&gt;access-list outside_inside extended permit udp any any range 33434 33523&lt;/P&gt;
&lt;P class="p2"&gt;access-list outside_inside extended permit icmp any any time-exceeded&lt;/P&gt;
&lt;P class="p2"&gt;access-list outside_inside extended permit icmp any any source-quench&lt;/P&gt;
&lt;P class="p2"&gt;access-list outside_inside extended permit icmp any any echo-reply&lt;/P&gt;
&lt;P class="p2"&gt;access-list outside_inside extended permit icmp any any unreachable&lt;/P&gt;
&lt;P class="p2"&gt;access-list outside_inside extended permit object-group Gonzo_Services any object Gonzo_LAN&lt;/P&gt;
&lt;P class="p2"&gt;access-list outside_inside extended permit object-group Camera_Services any object Camera_LAN&lt;/P&gt;
&lt;P class="p2"&gt;access-list outside_inside extended permit object-group Hyper_Services any object Hyper_LAN&lt;/P&gt;
&lt;P class="p2"&gt;access-list outside_inside extended deny ip any any&lt;/P&gt;
&lt;P class="p2"&gt;access-list ICMPACL extended permit icmp any any&lt;/P&gt;
&lt;P class="p2"&gt;access-list outbound extended permit tcp host 192.168.100.22 any eq smtp&lt;/P&gt;
&lt;P class="p2"&gt;access-list outbound extended deny tcp any any eq smtp&lt;/P&gt;
&lt;P class="p2"&gt;access-list outbound extended permit ip any any&lt;/P&gt;
&lt;P class="p2"&gt;access-list PON_Inside extended permit icmp any any echo&lt;/P&gt;
&lt;P class="p2"&gt;access-list PON_Inside extended permit udp any any range 33434 33523&lt;/P&gt;
&lt;P class="p2"&gt;access-list PON_Inside extended permit icmp any any time-exceeded&lt;/P&gt;
&lt;P class="p2"&gt;access-list PON_Inside extended permit icmp any any source-quench&lt;/P&gt;
&lt;P class="p2"&gt;access-list PON_Inside extended permit icmp any any echo-reply&lt;/P&gt;
&lt;P class="p2"&gt;access-list PON_Inside extended permit icmp any any unreachable&lt;/P&gt;
&lt;P class="p2"&gt;access-list Split_Tunnel standard permit 192.168.100.0 255.255.255.0&lt;/P&gt;
&lt;P class="p2"&gt;access-list Split_Tunnel standard permit 192.168.4.0 255.255.255.0&lt;/P&gt;
&lt;P class="p2"&gt;access-list WAN_cryptomap extended permit ip 192.168.100.0 255.255.255.0 object Zoetermeer_LAN&lt;/P&gt;
&lt;P class="p2"&gt;access-list ACL_PONNET standard permit 10.0.0.0 255.0.0.0&lt;/P&gt;
&lt;P class="p2"&gt;pager lines 24&lt;/P&gt;
&lt;P class="p2"&gt;logging enable&lt;/P&gt;
&lt;P class="p2"&gt;logging asdm informational&lt;/P&gt;
&lt;P class="p2"&gt;mtu VLAN10 1500&lt;/P&gt;
&lt;P class="p2"&gt;mtu VLAN20 1500&lt;/P&gt;
&lt;P class="p2"&gt;mtu WAN 1500&lt;/P&gt;
&lt;P class="p2"&gt;mtu WAN_PON 1500&lt;/P&gt;
&lt;P class="p2"&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;
&lt;P class="p2"&gt;asdm image disk0:/asdm-791-151.bin&lt;/P&gt;
&lt;P class="p2"&gt;no asdm history enable&lt;/P&gt;
&lt;P class="p2"&gt;arp timeout 14400&lt;/P&gt;
&lt;P class="p2"&gt;no arp permit-nonconnected&lt;/P&gt;
&lt;P class="p2"&gt;arp rate-limit 16384&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN) source static any any destination static NETWORK_OBJ_192.168.10.0_24 NETWORK_OBJ_192.168.10.0_24 no-proxy-arp route-lookup&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN) source static NETWORK_OBJ_192.168.100.0_24 NETWORK_OBJ_192.168.100.0_24 destination static Zoetermeer_LAN Zoetermeer_LAN no-proxy-arp route-lookup&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;object network Gonzo_LAN&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN) static Gonzo_WAN&lt;/P&gt;
&lt;P class="p2"&gt;object network Gonzo_LAN_SMTP&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN) static Gonzo_WAN service tcp smtp smtp&lt;/P&gt;
&lt;P class="p2"&gt;object network Gonzo_LAN_HTTPS&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN) static Gonzo_WAN service tcp https https&lt;/P&gt;
&lt;P class="p2"&gt;object network Camera_LAN_554&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN) static Camera_WAN service tcp rtsp rtsp&lt;/P&gt;
&lt;P class="p2"&gt;object network Camera_LAN_8000&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN) static Camera_WAN service tcp 8000 8000&lt;/P&gt;
&lt;P class="p2"&gt;object network Camera_LAN_8099&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN) static Camera_WAN service tcp 8099 8099&lt;/P&gt;
&lt;P class="p2"&gt;object network Hyper_LAN_HTTPS&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN) static Hyper_WAN service tcp https https&lt;/P&gt;
&lt;P class="p2"&gt;object network Hyper_LAN_17990&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN) static Hyper_WAN service tcp 17990 17990&lt;/P&gt;
&lt;P class="p2"&gt;object network VLAN10_Subnet&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN) dynamic interface&lt;/P&gt;
&lt;P class="p2"&gt;object network VLAN20_Subnet&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN20,WAN) static Camera_WAN&lt;/P&gt;
&lt;P class="p2"&gt;object network VLAN10_PON&lt;/P&gt;
&lt;P class="p2"&gt;nat (VLAN10,WAN_PON) static interface&lt;/P&gt;
&lt;P class="p2"&gt;access-group outside_inside in interface WAN&lt;/P&gt;
&lt;P class="p2"&gt;access-group PON_Inside in interface WAN_PON&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;route-map PON_MAP permit 10&lt;/P&gt;
&lt;P class="p2"&gt;match ip address ACL_PONNET&lt;/P&gt;
&lt;P class="p2"&gt;set interface WAN_PON&lt;/P&gt;
&lt;P class="p2"&gt;set ip default next-hop 10.49.240.1&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;route WAN 0.0.0.0 0.0.0.0 1.1.1.89 1&lt;/P&gt;
&lt;P class="p2"&gt;route WAN_PON 10.0.0.0 255.0.0.0 10.49.240.1 1&lt;/P&gt;
&lt;P class="p2"&gt;route VLAN10 192.168.4.0 255.255.255.0 192.168.100.253 1&lt;/P&gt;
&lt;P class="p2"&gt;route WAN_PON 192.200.0.0 255.255.0.0 10.49.240.1 1&lt;/P&gt;
&lt;P class="p2"&gt;timeout xlate 3:00:00&lt;/P&gt;
&lt;P class="p2"&gt;timeout pat-xlate 0:00:30&lt;/P&gt;
&lt;P class="p2"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;/P&gt;
&lt;P class="p2"&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;
&lt;P class="p2"&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;
&lt;P class="p2"&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;
&lt;P class="p2"&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;
&lt;P class="p2"&gt;timeout floating-conn 0:00:00&lt;/P&gt;
&lt;P class="p2"&gt;timeout conn-holddown 0:00:15&lt;/P&gt;
&lt;P class="p2"&gt;aaa-server Radius-Kermit protocol radius&lt;/P&gt;
&lt;P class="p2"&gt;aaa-server Radius-Kermit (VLAN10) host 192.168.100.21&lt;/P&gt;
&lt;P class="p2"&gt;key *****&lt;/P&gt;
&lt;P class="p2"&gt;radius-common-pw vdL!nd3n2018?&lt;/P&gt;
&lt;P class="p2"&gt;user-identity default-domain LOCAL&lt;/P&gt;
&lt;P class="p2"&gt;aaa authentication ssh console LOCAL&lt;/P&gt;
&lt;P class="p2"&gt;http server enable&lt;/P&gt;
&lt;P class="p2"&gt;http 192.168.100.0 255.255.255.0 VLAN10&lt;/P&gt;
&lt;P class="p2"&gt;no snmp-server location&lt;/P&gt;
&lt;P class="p2"&gt;no snmp-server contact&lt;/P&gt;
&lt;P class="p2"&gt;service sw-reset-button&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;******* REMOVED CRYPTO LINES FOR LENGTH ********&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev2 enable WAN client-services port 443&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev2 remote-access trustpoint vpn_company-groep_nl&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev1 enable WAN&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev1 policy 10&lt;/P&gt;
&lt;P class="p2"&gt;authentication pre-share&lt;/P&gt;
&lt;P class="p2"&gt;encryption aes-256&lt;/P&gt;
&lt;P class="p2"&gt;hash sha&lt;/P&gt;
&lt;P class="p2"&gt;group 2&lt;/P&gt;
&lt;P class="p2"&gt;lifetime 86400&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev1 policy 20&lt;/P&gt;
&lt;P class="p2"&gt;authentication rsa-sig&lt;/P&gt;
&lt;P class="p2"&gt;encryption aes-256&lt;/P&gt;
&lt;P class="p2"&gt;hash sha&lt;/P&gt;
&lt;P class="p2"&gt;group 2&lt;/P&gt;
&lt;P class="p2"&gt;lifetime 86400&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev1 policy 40&lt;/P&gt;
&lt;P class="p2"&gt;authentication pre-share&lt;/P&gt;
&lt;P class="p2"&gt;encryption aes-192&lt;/P&gt;
&lt;P class="p2"&gt;hash sha&lt;/P&gt;
&lt;P class="p2"&gt;group 2&lt;/P&gt;
&lt;P class="p2"&gt;lifetime 86400&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev1 policy 50&lt;/P&gt;
&lt;P class="p2"&gt;authentication rsa-sig&lt;/P&gt;
&lt;P class="p2"&gt;encryption aes-192&lt;/P&gt;
&lt;P class="p2"&gt;hash sha&lt;/P&gt;
&lt;P class="p2"&gt;group 2&lt;/P&gt;
&lt;P class="p2"&gt;lifetime 86400&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev1 policy 70&lt;/P&gt;
&lt;P class="p2"&gt;authentication pre-share&lt;/P&gt;
&lt;P class="p2"&gt;encryption aes&lt;/P&gt;
&lt;P class="p2"&gt;hash sha&lt;/P&gt;
&lt;P class="p2"&gt;group 2&lt;/P&gt;
&lt;P class="p2"&gt;lifetime 86400&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev1 policy 80&lt;/P&gt;
&lt;P class="p2"&gt;authentication rsa-sig&lt;/P&gt;
&lt;P class="p2"&gt;encryption aes&lt;/P&gt;
&lt;P class="p2"&gt;hash sha&lt;/P&gt;
&lt;P class="p2"&gt;group 2&lt;/P&gt;
&lt;P class="p2"&gt;lifetime 86400&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev1 policy 100&lt;/P&gt;
&lt;P class="p2"&gt;authentication pre-share&lt;/P&gt;
&lt;P class="p2"&gt;encryption 3des&lt;/P&gt;
&lt;P class="p2"&gt;hash sha&lt;/P&gt;
&lt;P class="p2"&gt;group 2&lt;/P&gt;
&lt;P class="p2"&gt;lifetime 86400&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev1 policy 110&lt;/P&gt;
&lt;P class="p2"&gt;authentication rsa-sig&lt;/P&gt;
&lt;P class="p2"&gt;encryption 3des&lt;/P&gt;
&lt;P class="p2"&gt;hash sha&lt;/P&gt;
&lt;P class="p2"&gt;group 2&lt;/P&gt;
&lt;P class="p2"&gt;lifetime 86400&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev1 policy 130&lt;/P&gt;
&lt;P class="p2"&gt;authentication pre-share&lt;/P&gt;
&lt;P class="p2"&gt;encryption des&lt;/P&gt;
&lt;P class="p2"&gt;hash sha&lt;/P&gt;
&lt;P class="p2"&gt;group 2&lt;/P&gt;
&lt;P class="p2"&gt;lifetime 86400&lt;/P&gt;
&lt;P class="p2"&gt;crypto ikev1 policy 140&lt;/P&gt;
&lt;P class="p2"&gt;authentication rsa-sig&lt;/P&gt;
&lt;P class="p2"&gt;encryption des&lt;/P&gt;
&lt;P class="p2"&gt;hash sha&lt;/P&gt;
&lt;P class="p2"&gt;group 2&lt;/P&gt;
&lt;P class="p2"&gt;lifetime 86400&lt;/P&gt;
&lt;P class="p2"&gt;telnet timeout 5&lt;/P&gt;
&lt;P class="p2"&gt;no ssh stricthostkeycheck&lt;/P&gt;
&lt;P class="p2"&gt;ssh 192.168.100.0 255.255.255.0 VLAN10&lt;/P&gt;
&lt;P class="p2"&gt;ssh timeout 5&lt;/P&gt;
&lt;P class="p2"&gt;ssh cipher encryption all&lt;/P&gt;
&lt;P class="p2"&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;
&lt;P class="p2"&gt;console timeout 0&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;dhcpd address 192.168.250.10-192.168.250.200 VLAN20&lt;/P&gt;
&lt;P class="p2"&gt;dhcpd enable VLAN20&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;threat-detection basic-threat&lt;/P&gt;
&lt;P class="p2"&gt;threat-detection statistics access-list&lt;/P&gt;
&lt;P class="p2"&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;
&lt;P class="p2"&gt;ssl trust-point vpn_company-groep_nl VLAN10&lt;/P&gt;
&lt;P class="p2"&gt;ssl trust-point vpn_company-groep_nl VLAN20&lt;/P&gt;
&lt;P class="p2"&gt;ssl trust-point vpn_company-groep_nl WAN&lt;/P&gt;
&lt;P class="p2"&gt;ssl trust-point vpn_company-groep_nl WAN_PON&lt;/P&gt;
&lt;P class="p2"&gt;webvpn&lt;/P&gt;
&lt;P class="p2"&gt;enable WAN&lt;/P&gt;
&lt;P class="p2"&gt;anyconnect image disk0:/anyconnect-macos-4.5.01044-webdeploy-k9.pkg 1&lt;/P&gt;
&lt;P class="p2"&gt;anyconnect image disk0:/anyconnect-win-4.5.01044-webdeploy-k9.pkg 2&lt;/P&gt;
&lt;P class="p2"&gt;anyconnect profiles ASA5506-X_company_client_profile disk0:/ASA5506-X_company_client_profile.xml&lt;/P&gt;
&lt;P class="p2"&gt;anyconnect enable&lt;/P&gt;
&lt;P class="p2"&gt;tunnel-group-list enable&lt;/P&gt;
&lt;P class="p2"&gt;cache&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;disable&lt;/P&gt;
&lt;P class="p2"&gt;error-recovery disable&lt;/P&gt;
&lt;P class="p2"&gt;group-policy "GroupPolicy_ASA5506-X company" internal&lt;/P&gt;
&lt;P class="p2"&gt;group-policy "GroupPolicy_ASA5506-X company" attributes&lt;/P&gt;
&lt;P class="p2"&gt;wins-server none&lt;/P&gt;
&lt;P class="p2"&gt;dns-server value 192.168.100.21&lt;/P&gt;
&lt;P class="p2"&gt;vpn-tunnel-protocol ikev2 ssl-client&lt;/P&gt;
&lt;P class="p2"&gt;split-tunnel-policy excludespecified&lt;/P&gt;
&lt;P class="p2"&gt;split-tunnel-network-list value Split_Tunnel&lt;/P&gt;
&lt;P class="p2"&gt;default-domain value company.local&lt;/P&gt;
&lt;P class="p2"&gt;webvpn&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;anyconnect profiles value ASA5506-X_company_client_profile type user&lt;/P&gt;
&lt;P class="p2"&gt;group-policy GroupPolicy_2.2.2.98 internal&lt;/P&gt;
&lt;P class="p2"&gt;group-policy GroupPolicy_2.2.2.98 attributes&lt;/P&gt;
&lt;P class="p2"&gt;vpn-tunnel-protocol ikev1 ikev2&lt;/P&gt;
&lt;P class="p2"&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;
&lt;P class="p2"&gt;username admin password $sha512$5000$mXimwUYVhPk6HBnK+ct8NQ==$sj3JFxcM4u/aw/0LN3W9FQ== pbkdf2 privilege 15&lt;/P&gt;
&lt;P class="p2"&gt;tunnel-group "ASA5506-X company" type remote-access&lt;/P&gt;
&lt;P class="p2"&gt;tunnel-group "ASA5506-X company" general-attributes&lt;/P&gt;
&lt;P class="p2"&gt;address-pool VPN_DHCP_Pool&lt;/P&gt;
&lt;P class="p2"&gt;authentication-server-group Radius-Kermit&lt;/P&gt;
&lt;P class="p2"&gt;default-group-policy "GroupPolicy_ASA5506-X company"&lt;/P&gt;
&lt;P class="p2"&gt;tunnel-group "ASA5506-X company" webvpn-attributes&lt;/P&gt;
&lt;P class="p2"&gt;group-alias "ASA5506-X company" enable&lt;/P&gt;
&lt;P class="p2"&gt;tunnel-group 2.2.2.98 type ipsec-l2l&lt;/P&gt;
&lt;P class="p2"&gt;tunnel-group 2.2.2.98 general-attributes&lt;/P&gt;
&lt;P class="p2"&gt;default-group-policy GroupPolicy_2.2.2.98&lt;/P&gt;
&lt;P class="p2"&gt;tunnel-group 2.2.2.98 ipsec-attributes&lt;/P&gt;
&lt;P class="p2"&gt;ikev1 pre-shared-key *****&lt;/P&gt;
&lt;P class="p2"&gt;ikev2 remote-authentication pre-shared-key *****&lt;/P&gt;
&lt;P class="p2"&gt;ikev2 local-authentication pre-shared-key *****&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;class-map inspection_default&lt;/P&gt;
&lt;P class="p2"&gt;match default-inspection-traffic&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;
&lt;P class="p2"&gt;parameters&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;message-length maximum client auto&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;message-length maximum 512&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;no tcp-inspection&lt;/P&gt;
&lt;P class="p2"&gt;policy-map global_policy&lt;/P&gt;
&lt;P class="p2"&gt;class inspection_default&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect dns preset_dns_map&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect ftp&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect h323 h225&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect h323 ras&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect rsh&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect rtsp&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect sqlnet&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect skinny&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect sunrpc&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect xdmcp&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect sip&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect netbios&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect tftp&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect ip-options&lt;/P&gt;
&lt;P class="p2"&gt;!&lt;/P&gt;
&lt;P class="p2"&gt;service-policy global_policy global&lt;/P&gt;
&lt;P class="p2"&gt;prompt hostname context&lt;/P&gt;
&lt;P class="p2"&gt;no call-home reporting anonymous&lt;/P&gt;
&lt;P class="p2"&gt;Cryptochecksum:e6f9318f1bbd2d0e7efbbfcf31235c35&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;ASA Branche Office&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ASA Version 9.6(4)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;hostname ASA5506X-ZTM&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;domain-name company.local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;enable password $sha512$5000$q37wopLLpi3FeO/gR9nBag==$iiYKD04GYsEvzb6hpHu6QQ== pbkdf2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;names&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no mac-address auto&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;interface GigabitEthernet1/1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;description WAN Interface Address company Zoetermeer&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;nameif outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;security-level 0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ip address 6.6.6.98 255.255.255.252&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;interface GigabitEthernet1/2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;description LAN Interface company Zoetermeer&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;nameif inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;security-level 100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ip address 192.168.1.254 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;interface GigabitEthernet1/3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;shutdown&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no nameif&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;security-level 100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;interface GigabitEthernet1/4&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;shutdown&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no nameif&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;security-level 100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;interface GigabitEthernet1/5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;shutdown&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no nameif&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;security-level 100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;interface GigabitEthernet1/6&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;shutdown&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no nameif&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;security-level 100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;interface GigabitEthernet1/7&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;shutdown&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no nameif&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;security-level 100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;interface GigabitEthernet1/8&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;shutdown&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no nameif&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;security-level 100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;interface Management1/1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;management-only&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no nameif&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no security-level&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;boot system disk0:/asa964-lfbff-k8.SPA&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ftp mode passive&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;dns domain-lookup outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;dns domain-lookup inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;dns server-group DefaultDNS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;name-server 8.8.8.8 inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;name-server 192.168.100.21&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;name-server 8.8.4.4&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;domain-name company.local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;same-security-traffic permit inter-interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;same-security-traffic permit intra-interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;object network Internal_LAN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;subnet 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;object network Waddinxveen&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;subnet 192.168.100.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;description Waddinxveen Subnet HQ&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;object network NETWORK_OBJ_192.168.1.0_24&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;subnet 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list outside_inside extended permit icmp any any echo&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list outside_inside extended permit udp any any range 33434 33523&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list outside_inside extended permit icmp any any time-exceeded&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list outside_inside extended permit icmp any any source-quench&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list outside_inside extended permit icmp any any echo-reply&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list outside_inside extended permit icmp any any unreachable&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list outside_inside extended deny ip any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list ICMPACL extended permit icmp any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list outbound extended permit tcp host 192.168.100.22 any eq smtp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list outbound extended deny tcp any any eq smtp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list outbound extended permit ip any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list outside_cryptomap extended permit ip 192.168.1.0 255.255.255.0 object Waddinxveen&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;pager lines 24&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;logging asdm informational&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;mtu outside 1500&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;mtu inside 1500&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;asdm image disk0:/asdm-791-151.bin&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no asdm history enable&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;arp timeout 14400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;arp permit-nonconnected&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;arp rate-limit 8192&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;nat (inside,outside) source static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 destination static Waddinxveen Waddinxveen no-proxy-arp route-lookup&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;object network Internal_LAN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;nat (inside,outside) dynamic interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-group outside_inside in interface outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;route outside 0.0.0.0 0.0.0.0 6.6.6.97 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;timeout xlate 3:00:00&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;timeout pat-xlate 0:00:30&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;timeout floating-conn 0:00:00&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;timeout conn-holddown 0:00:15&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;user-identity default-domain LOCAL&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;aaa authentication ssh console LOCAL&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;http server enable&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;http 192.168.1.0 255.255.255.0 inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;http 192.168.100.0 255.255.255.0 inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no snmp-server location&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no snmp-server contact&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;service sw-reset-button&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;protocol esp encryption des&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;protocol esp integrity sha-1 md5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;protocol esp encryption 3des&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;protocol esp integrity sha-1 md5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;protocol esp encryption aes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;protocol esp integrity sha-1 md5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;protocol esp encryption aes-192&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;protocol esp integrity sha-1 md5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;protocol esp encryption aes-256&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;protocol esp integrity sha-1 md5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ipsec security-association pmtu-aging infinite&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto map outside_map 1 match address outside_cryptomap&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto map outside_map 1 set peer 62.177.202.94&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto map outside_map 1 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto map outside_map interface outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ca trustpool policy&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev2 policy 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption aes-256&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;integrity sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 5 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;prf sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime seconds 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev2 policy 10&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption aes-192&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;integrity sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 5 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;prf sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime seconds 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev2 policy 20&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption aes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;integrity sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 5 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;prf sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime seconds 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev2 policy 30&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption 3des&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;integrity sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 5 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;prf sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime seconds 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev2 policy 40&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption des&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;integrity sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 5 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;prf sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime seconds 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev2 enable outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev1 enable outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev1 policy 10&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;authentication pre-share&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption aes-256&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;hash sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev1 policy 20&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;authentication rsa-sig&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption aes-256&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;hash sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev1 policy 40&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;authentication pre-share&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption aes-192&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;hash sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev1 policy 50&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;authentication rsa-sig&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption aes-192&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;hash sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev1 policy 70&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;authentication pre-share&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption aes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;hash sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev1 policy 80&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;authentication rsa-sig&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption aes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;hash sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev1 policy 100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;authentication pre-share&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption 3des&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;hash sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev1 policy 110&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;authentication rsa-sig&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption 3des&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;hash sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev1 policy 130&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;authentication pre-share&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption des&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;hash sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;crypto ikev1 policy 140&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;authentication rsa-sig&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;encryption des&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;hash sha&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;telnet timeout 5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no ssh stricthostkeycheck&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ssh 192.168.100.0 255.255.255.0 inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ssh timeout 5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ssh cipher encryption all&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ssh key-exchange group dh-group1-sha1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;console timeout 0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;dhcpd address 192.168.1.100-192.168.1.225 inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;dhcpd dns 192.168.100.21 8.8.8.8 interface inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;dhcpd enable inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;threat-detection basic-threat&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;threat-detection statistics access-list&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no threat-detection statistics tcp-intercept&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group-policy GroupPolicy_62.177.202.94 internal&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;group-policy GroupPolicy_62.177.202.94 attributes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;vpn-tunnel-protocol ikev1 ikev2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;username admin password $sha512$5000$XJhfzyR/fvZjzfGSUQEdwA==$N5789JoSOE9DfuSXz6HO9Q== pbkdf2 privilege 15&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;tunnel-group 62.177.202.94 type ipsec-l2l&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;tunnel-group 62.177.202.94 general-attributes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;default-group-policy GroupPolicy_62.177.202.94&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;tunnel-group 62.177.202.94 ipsec-attributes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ikev1 pre-shared-key *****&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ikev2 remote-authentication pre-shared-key *****&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;ikev2 local-authentication pre-shared-key *****&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;class-map inspection_default&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;match default-inspection-traffic&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;policy-map type inspect dns preset_dns_map&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;parameters&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;message-length maximum client auto&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;message-length maximum 512&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;no tcp-inspection&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;class inspection_default&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect dns preset_dns_map&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect ftp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect h323 h225&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect h323 ras&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect rsh&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect rtsp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect sqlnet&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect skinny&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect sunrpc&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect xdmcp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect sip&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect netbios&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect tftp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;inspect ip-options&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;prompt hostname context&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;no call-home reporting anonymous&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;Cryptochecksum:32c6a0af3e4f1738ea72b27db186581f&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-9-6-problems-routing-specific-destinations-over/m-p/3335562#M969875</guid>
      <dc:creator>Robbert Tol</dc:creator>
      <dc:date>2020-02-21T15:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X 9.6 Problems routing specific destinations over second WAN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-9-6-problems-routing-specific-destinations-over/m-p/3335584#M969876</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"What a want to accomplish is that all trafic which is sent to destinations 10.0.0.0/8 and 192.200.0.0/16 is sent over the WAN_PON Interface.&amp;nbsp;all other internet trafic must be sent to the normal WAN."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As per the config file, this is already ok.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route WAN 0.0.0.0 0.0.0.0 1.1.1.89 1 &amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that everyhing to WAN&lt;/P&gt;
&lt;P&gt;route WAN_PON 10.0.0.0 255.0.0.0 10.49.240.1 1 &amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that network 10 must be sent to WAN_PON&lt;/P&gt;
&lt;P&gt;route VLAN10 192.168.4.0 255.255.255.0 192.168.100.253 1&lt;SPAN&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that network 192.168.4 must be sent to VLAN10&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;route WAN_PON 192.200.0.0 255.255.0.0 10.49.240.1 1&lt;SPAN&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that network 192.200&amp;nbsp; must be sent to WAN_PON&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"On the Branch Office, which is connected by an site-to-site VPN with the HQ, i also want to be able to access those networks at the WAN_PON Interface at the HQ."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;Considering you have those network permitted on your VPN policy, then, you need to add routing on the Branch Office to sent those traffic over the VPN.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-If I helped you somehow, please, rate it as useful.-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 03:29:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-9-6-problems-routing-specific-destinations-over/m-p/3335584#M969876</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2018-02-22T03:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X 9.6 Problems routing specific destinations over second WAN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-9-6-problems-routing-specific-destinations-over/m-p/3335746#M969877</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt; wrote:&lt;BR /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"What a want to accomplish is that all trafic which is sent to destinations 10.0.0.0/8 and 192.200.0.0/16 is sent over the WAN_PON Interface.&amp;nbsp;all other internet trafic must be sent to the normal WAN."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As per the config file, this is already ok.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route WAN 0.0.0.0 0.0.0.0 1.1.1.89 1 &amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that everyhing to WAN&lt;/P&gt;
&lt;P&gt;route WAN_PON 10.0.0.0 255.0.0.0 10.49.240.1 1 &amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that network 10 must be sent to WAN_PON&lt;/P&gt;
&lt;P&gt;route VLAN10 192.168.4.0 255.255.255.0 192.168.100.253 1&lt;SPAN&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that network 192.168.4 must be sent to VLAN10&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;route WAN_PON 192.200.0.0 255.255.0.0 10.49.240.1 1&lt;SPAN&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; This tell the firewall that network 192.200&amp;nbsp; must be sent to WAN_PON&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"On the Branch Office, which is connected by an site-to-site VPN with the HQ, i also want to be able to access those networks at the WAN_PON Interface at the HQ."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;Considering you have those network permitted on your VPN policy, then, you need to add routing on the Branch Office to sent those traffic over the VPN.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-If I helped you somehow, please, rate it as useful.-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;First, thanks for pointing me in the direction. The first thing is indeed working.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now the second: Help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The problem is that i can't figure out how to permitt those networks on the VPN Policy and adding the route on the branch office to sent those traffic over the VPN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 10:00:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-9-6-problems-routing-specific-destinations-over/m-p/3335746#M969877</guid>
      <dc:creator>Robbert Tol</dc:creator>
      <dc:date>2018-02-22T10:00:29Z</dc:date>
    </item>
  </channel>
</rss>

