I only deleted certificates and hided outside ip addresses. In case when traffic goes in the Outside_Ertel-Inside direction, a service-policy is named as Inside-policy doesn't work, but when traffic goes in the Outside_Beeline-Inside direction, this service-policy polices traffic, as it should, and i found one thing, I have an IPSec tunnel on the Outside_Ertel interface and when traffic does from this tunnel, it is policed by the Inside-policy service-policy.
!
route Outside_Ertel 0.0.0.0 0.0.0.0 I.I.I.I 1 track 1
route Outside_Beeline 0.0.0.0 0.0.0.0 H.H.H.H 2
route Inside 10.90.90.0 255.255.255.0 172.17.1.38 1
route Inside 10.90.92.0 255.255.255.0 172.17.1.38 1
route Inside 10.100.0.0 255.255.224.0 172.17.1.38 1
route Inside 10.100.48.0 255.255.248.0 172.17.1.38 1
route Inside 10.100.58.0 255.255.255.0 172.17.1.38 1
route Inside 10.100.64.0 255.255.192.0 172.17.1.38 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
aaa-server DC_RADIUS protocol radius
aaa-server DC_RADIUS (Inside) host 10.100.0.2
key ytepyftim
authentication-port 1812
accounting-port 1813
radius-common-pw ytepyftim
aaa-server LDAP protocol ldap
max-failed-attempts 2
aaa-server LDAP (Inside) host 10.100.0.2
ldap-base-dn DC=local,DC=test
ldap-scope subtree
ldap-naming-attribute sAMAccountName
ldap-login-password XXXXXXXX
ldap-login-dn CN=ASA,CN=Users,DC=local,DC=test
server-type microsoft
no user-identity enable
user-identity default-domain LOCAL
user-identity action netbios-response-fail remove-user-ip
user-identity inactive-user-timer minutes 120
user-identity logout-probe netbios local-system probe-time minutes 10 retry-interval seconds 10 retry-count 2 user-not-needed
user-identity poll-import-user-group-timer hours 1
user-identity user-not-found enable
aaa authentication ssh console LOCAL
aaa authentication login-history
http server enable
http 10.100.0.0 255.255.224.0 Management
http 10.100.64.0 255.255.192.0 Management
http 10.100.0.0 255.255.0.0 3com_Management
http 10.100.64.0 255.255.192.0 Beeline_pool_2
http 10.100.0.0 255.255.0.0 Inside
http redirect Outside_Ertel 80
http redirect Outside_Beeline 80
snmp-server host Inside 10.100.0.254 community public version 2c
no snmp-server location
no snmp-server contact
sla monitor 1
type echo protocol ipIcmpEcho I.I.I.I interface Outside_Ertel
num-packets 5
sla monitor schedule 1 life forever start-time now
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
crypto ipsec ikev2 ipsec-proposal DES
protocol esp encryption des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
protocol esp encryption aes
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
protocol esp encryption aes-192
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES256
protocol esp encryption aes-256
protocol esp integrity sha-1 md5
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map Outside_Ertel_map 2 match address Outside_Ertel_cryptomap_4
crypto map Outside_Ertel_map 2 set peer J.J.J.J
crypto map Outside_Ertel_map 2 set ikev1 transform-set ESP-AES-128-MD5
crypto map Outside_Ertel_map 2 set security-association lifetime seconds 3600
crypto map Outside_Ertel_map 10 match address Outside_Ertel_cryptomap_10
crypto map Outside_Ertel_map 10 set pfs
crypto map Outside_Ertel_map 10 set peer K.K.K.K
crypto map Outside_Ertel_map 10 set ikev1 transform-set ESP-AES-128-MD5
crypto map Outside_Ertel_map 10 set security-association lifetime seconds 1800
crypto map Outside_Ertel_map 20 match address Outside_Ertel_CZ
crypto map Outside_Ertel_map 20 set pfs
crypto map Outside_Ertel_map 20 set peer L.L.L.L
crypto map Outside_Ertel_map 20 set ikev1 transform-set ESP-AES-128-SHA
crypto map Outside_Ertel_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map Outside_Ertel_map interface Outside_Ertel
crypto map Outside_Ertel_map interface Outside_Beeline
crypto ca trustpoint ASDM_TrustPoint0-1
validation-usage ipsec-client ssl-client ssl-server
crl configure
crypto ca trustpoint ASDM_TrustPoint1_vpn
keypair ASDM_TrustPoint1_vpn
crl configure
crypto ca trustpoint ASDM_TrustPoint1_vpn-1
crl configure
crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0
enrollment self
fqdn none
subject-name CN=172.17.1.37,CN=webvpn
keypair ASDM_LAUNCHER
crl configure
crypto ca trustpoint ASDM_TrustPoint1_webvpn
enrollment terminal
subject-name CN=webvpn.mbafin.ru,C=RU
keypair WEBVPN
no validation-usage
crl configure
crypto ca trustpoint ASDM_TrustPoint1
enrollment terminal
crl configure
crypto ca trustpoint ASDM_TrustPoint_COMODO
keypair ASDM_TrustPoint_COMODO
crl configure
crypto ca trustpoint ASDM_TrustPoint_COMODO-1
crl configure
crypto ca trustpool policy
crypto ikev2 policy 1
encryption aes-256
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 10
encryption aes-192
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 20
encryption aes
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 30
encryption 3des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 40
encryption des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 enable Outside_Ertel client-services port 443
crypto ikev2 enable Outside_Beeline client-services port 443
crypto ikev2 remote-access trustpoint ASDM_TrustPoint1_vpn
crypto ikev1 enable Outside_Ertel
crypto ikev1 enable Outside_Beeline
crypto ikev1 policy 5
authentication pre-share
encryption aes
hash md5
group 2
lifetime 48000
crypto ikev1 policy 20
authentication rsa-sig
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 30
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 50
authentication rsa-sig
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 60
authentication pre-share
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 80
authentication rsa-sig
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 90
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 110
authentication rsa-sig
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 120
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 140
authentication rsa-sig
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 150
authentication pre-share
encryption des
hash sha
group 2
lifetime 86400
client-update enable
!
track 1 rtr 1 reachability
telnet timeout 5
ssh stricthostkeycheck
ssh 10.100.0.0 255.255.0.0 Inside
ssh 10.100.64.0 255.255.192.0 Beeline_pool_2
ssh 10.100.0.0 255.255.0.0 3com_Management
ssh 10.100.0.0 255.255.0.0 Management
ssh timeout 15
ssh version 1 2
ssh key-exchange group dh-group1-sha1
console timeout 0
management-access Inside
vpn-sessiondb max-other-vpn-limit 250
vpn-sessiondb max-anyconnect-premium-or-essentials-limit 750
vpn load-balancing
interface lbpublic Outside_Ertel
interface lbprivate Inside
priority-queue Inside
priority-queue Outside_Ertel
priority-queue Outside_Beeline
priority-queue 3com_Management
threat-detection basic-threat
threat-detection statistics access-list
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
dynamic-filter updater-client enable
dynamic-filter use-database
dynamic-filter enable interface Outside_Ertel
dynamic-filter enable interface Outside_Beeline
dynamic-filter drop blacklist interface Outside_Ertel
dynamic-filter drop blacklist interface Outside_Beeline
dynamic-filter whitelist
address 109.232.250.90 255.255.255.255
address 87.118.199.38 255.255.255.255
name
www.bankvrn.ru name ibank.bankvrn.ru
dynamic-filter blacklist
name yaplakal.com
name pikabu.ru
name yaplakal.ru
name yap.ru
name yaplakal.com.ru
ntp server 10.100.0.2
ssl trust-point ASDM_Launcher_Access_TrustPoint_0 Inside
ssl trust-point ASDM_TrustPoint_COMODO Outside_Ertel
ssl trust-point ASDM_TrustPoint_COMODO Outside_Beeline
ssl trust-point ASDM_TrustPoint_COMODO Beeline_pool_2
ssl trust-point ASDM_Launcher_Access_TrustPoint_0 Inside vpnlb-ip
ssl trust-point ASDM_TrustPoint_COMODO domain vpn.mbafin.ru
webvpn
enable Outside_Ertel
enable Outside_Beeline
no anyconnect-essentials
anyconnect image disk0:/anyconnect-win-3.1.14018-k9.pkg 7
anyconnect image disk0:/anyconnect-macosx-i386-3.1.14018-k9.pkg 9
anyconnect image disk0:/anyconnect-linux-3.1.14018-k9.pkg 10
anyconnect image disk0:/anyconnect-linux-64-3.1.14018-k9.pkg 11
anyconnect profiles AnyConnect_client_profile disk0:/anyconnect_client_profile.xml
anyconnect enable
tunnel-group-list enable
smart-tunnel network RD host rd.mbaru.ru
smart-tunnel notification-icon
cache
disable
error-recovery disable
ssl-server-check warn-on-failure
group-policy DefaultRAGroup internal
group-policy DefaultRAGroup attributes
dns-server value 10.100.0.2
vpn-tunnel-protocol ikev2
default-domain value mbaru.ru
group-policy DfltGrpPolicy attributes
vpn-tunnel-protocol ikev2
group-policy easy-vpn internal
group-policy easy-vpn attributes
dns-server value 10.100.0.2
vpn-tunnel-protocol ikev1
split-tunnel-policy tunnelspecified
split-tunnel-network-list value easy-vpn_splitTunnelAcl
default-domain value mbaru.ru
group-policy GroupPolicy_J.J.J.J internal
group-policy GroupPolicy_J.J.J.J attributes
vpn-tunnel-protocol ikev1
group-policy GroupPolicy_AnyConnect internal
group-policy GroupPolicy_AnyConnect attributes
wins-server none
dns-server value 10.100.0.2
vpn-idle-timeout 600
vpn-tunnel-protocol ikev2 ssl-client
split-tunnel-policy tunnelspecified
split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl_1
default-domain value mbaru.ru
split-dns value 10.100.0.2
webvpn
anyconnect profiles value AnyConnect_client_profile type user
group-policy GroupPolicy_K.K.K.K internal
group-policy GroupPolicy_K.K.K.K attributes
vpn-tunnel-protocol ikev1
group-policy GroupPolicy_L.L.L.L internal
group-policy GroupPolicy_L.L.L.L attributes
vpn-tunnel-protocol ikev1
group-policy GroupPolicy1 internal
group-policy GroupPolicy1 attributes
vpn-tunnel-protocol l2tp-ipsec
group-policy ClientlessGroupPolicy internal
group-policy ClientlessGroupPolicy attributes
vpn-tunnel-protocol l2tp-ipsec
dynamic-access-policy-record DfltAccessPolicy
action terminate
dynamic-access-policy-record RestrictedVPN
network-acl RestrictedVPN
priority 1
dynamic-access-policy-record "Allow All"
network-acl Allow_All_VPN
quota management-session 100
username admin password 0on4306YzAN5BlzQ encrypted privilege 15
username root password EoNvB9LxLeNFLMGs1HmcLQ== nt-encrypted privilege 15
tunnel-group DefaultRAGroup general-attributes
address-pool VPN_IP_POOL_TEST
default-group-policy DefaultRAGroup
tunnel-group DefaultRAGroup ipsec-attributes
ikev1 pre-shared-key heslox
tunnel-group AnyConnect type remote-access
tunnel-group AnyConnect general-attributes
address-pool VPN_IP_POOL_TEST
authentication-server-group LDAP
default-group-policy GroupPolicy_AnyConnect
tunnel-group AnyConnect webvpn-attributes
group-alias AnyConnect enable
tunnel-group easy-vpn type remote-access
tunnel-group easy-vpn general-attributes
address-pool VPN_IP_POOL_TEST
authentication-server-group LDAP
default-group-policy easy-vpn
tunnel-group easy-vpn ipsec-attributes
ikev1 pre-shared-key Qq123123
tunnel-group J.J.J.J type ipsec-l2l
tunnel-group J.J.J.J general-attributes
default-group-policy GroupPolicy_J.J.J.J
tunnel-group J.J.J.J ipsec-attributes
ikev1 pre-shared-key heslox
tunnel-group K.K.K.K type ipsec-l2l
tunnel-group K.K.K.K general-attributes
default-group-policy GroupPolicy_K.K.K.K
tunnel-group K.K.K.K ipsec-attributes
ikev1 pre-shared-key heslox
tunnel-group L.L.L.L type ipsec-l2l
tunnel-group L.L.L.L general-attributes
default-group-policy GroupPolicy_L.L.L.L
tunnel-group L.L.L.L ipsec-attributes
ikev1 pre-shared-key heslox
tunnel-group MBAFServices type remote-access
tunnel-group MBAFServices general-attributes
authentication-server-group LDAP
default-group-policy ClientlessGroupPolicy
tunnel-group MBAFServices webvpn-attributes
customization MBAFServices
group-alias JetMoneySevices enable
group-alias MBAFServices disable
!
class-map HTTP_IN
match access-list Inside_mpc
class-map ASTER_RTP_IN
match access-list Beeline_pool_mpc_1
class-map Outside_Ertel-class-shape
match access-list Outside_Ertel_mpc_14
class-map IPSEC_SMO
match access-list SMO_VLAN_mpc
class-map type regex match-any SiteBlackList
match regex domainlis
class-map type inspect http match-all URLClass
match response header allow regex class SiteBlackList
class-map Outside_Beeline-class-shape
match access-list Outside_Beeline_mpc_11
class-map ASTER_SIGNAL_IN
match access-list Beeline_pool_mpc
class-map CX_Proxy
match access-list global_mpc_2
class-map type regex match-any Regex
match regex _default_gnu-http-tunnel_arg
match regex _default_firethru-tunnel_1
match regex _default_firethru-tunnel_2
match regex _default_msn-messenger
match regex _default_GoToMyPC-tunnel_2
match regex _default_windows-media-player-tunnel
match regex _default_x-kazaa-network
match regex _default_shoutcast-tunneling-protocol
match regex _default_gator
match regex _default_aim-messenger
match regex _default_gnu-http-tunnel_uri
match regex _default_http-tunnel
match regex _default_httport-tunnel
match regex _default_GoToMyPC-tunnel
match regex _default_icy-metadata
match regex _default_yahoo-messenger
class-map STATUS_IN
match access-list Inside_mpc_2
class-map Outside_Beeline-class-shape-first
match access-list Outside_Beeline_mpc_10
class-map MAIL_IN
match access-list Inside_mpc_1
class-map Outside_Ertel-class-shape-first
match access-list Outside_Ertel_mpc
class-map Inside-class-prio
match access-list Inside_mpc_3
class-map Outside_Ertel-class-shape-msk
match access-list Outside_Ertel_mpc_1
class-map FTP_IN
match access-list Inside_mpc_5
class-map Inside-class-shape-msk
match access-list Inside_mpc_4
class-map DM_INLINE_Child-Class
match access-list global_mpc
class-map inspection_default
match default-inspection-traffic
class-map Outside_Beeline-class_shape-msk
match access-list Outside_Beeline_mpc
class-map type inspect http match-all asdm_high_security_methods
match not request method get
match not request method head
class-map Outside_Beeline-class-priority
match access-list Outside_Beeline_mpc_4
class-map Outside_Ertel-class-priority
match access-list Outside_Ertel_mpc_13
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
no tcp-inspection
policy-map type inspect im IM
parameters
match protocol msn-im yahoo-im
drop-connection log
policy-map DM_INLINE_Child-Policy
class DM_INLINE_Child-Class
priority
policy-map Inside-policy
class Inside-class-prio
priority
class FTP_IN
priority
class Inside-class-shape-msk
police output 15000000 15000
class MAIL_IN
police output 10000000 5000
class HTTP_IN
police output 30000000 15000
class STATUS_IN
police output 10000000 150000
class class-default
police output 30000000 15000
policy-map type inspect gtp default_gtp_map
parameters
policy-map global_policy
class inspection_default
inspect ctiqbe
inspect dcerpc
inspect esmtp
inspect ftp
inspect h323 h225
inspect h323 ras
inspect http
inspect icmp
inspect ils
inspect ip-options
inspect mgcp
inspect netbios
inspect rsh
inspect rtsp
inspect sip
inspect skinny
inspect snmp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect waas
inspect xdmcp
inspect icmp error
inspect pptp
inspect dns preset_dns_map dynamic-filter-snoop
inspect gtp default_gtp_map
class CX_Proxy
sfr fail-open
policy-map type inspect http http_inspection
parameters
protocol-violation action drop-connection log
class URLClass
reset log
policy-map Beeline_pool-policy
class ASTER_SIGNAL_IN
priority
class ASTER_RTP_IN
priority
policy-map Outside_Beeline-policy
class Outside_Beeline-class-priority
priority
class Outside_Beeline-class_shape-msk
police output 15000000 15000
class Outside_Beeline-class-shape-first
set connection per-client-max 1000 per-client-embryonic-max 100
set connection timeout idle 0:30:00 dcd 0:15:00 5
police output 15000000 150000
class Outside_Beeline-class-shape
set connection per-client-max 1500 per-client-embryonic-max 300
set connection timeout idle 0:30:00 dcd 0:15:00 5
police output 10000000 1000000
class class-default
police output 15000000 15000
policy-map Outside_Ertel-policy
class Outside_Ertel-class-priority
priority
class Outside_Ertel-class-shape-msk
police output 15000000 150000
class Outside_Ertel-class-shape-first
police output 10000000 150000
set connection per-client-max 1000 per-client-embryonic-max 100
set connection timeout idle 0:30:00 dcd 0:15:00 5
class Outside_Ertel-class-shape
set connection per-client-max 1500 per-client-embryonic-max 300
set connection timeout idle 0:30:00 dcd 0:15:00 5
police output 10000000 150000
class class-default
police output 150000000 75000
policy-map type inspect http P2P
parameters
protocol-violation action drop-connection log
class asdm_high_security_methods
drop-connection
match request header non-ascii
drop-connection
match request uri regex class Regex
drop-connection log
policy-map SMO_VLAN-policy
class IPSEC_SMO
priority
!
service-policy global_policy global
service-policy Inside-policy interface Inside
service-policy Outside_Ertel-policy interface Outside_Ertel
service-policy Outside_Beeline-policy interface Outside_Beeline
: end