ASA Version 7.2(4)30! hostname vpn domain-name hollywood.com enable password BO5OGdtIUElAVJc7 encrypted passwd BO5OGdtIUElAVJc7 encrypted names name

Similar documents
IPSec tunnel for ER75i routers application guide

: Saved : : Serial Number: JMX1813Z0GJ : Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz : Written by enable_15 at 09:21: UTC Thu Dec !

Downloaded from: justpaste.it/i2os

ASA/PIX: Remote VPN Server with Inbound NAT for VPN Client Traffic with CLI and ASDM Configuration Example

PIX/ASA 7.x ASDM: Restrict the Network Access of Remote Access VPN Users

Configure the ASA for Dual Internal Networks

NAC Appliance (Cisco Clean Access) In Band Virtual Gateway for Remote Access VPN Configuration Example

This document is intended to give guidance on how to read log entries from a Cisco PIX / ASA. The specific model in this case was a PIX 501.

SSL VPN Configuration of a Cisco ASA 8.0

Table of Contents. Cisco Enhanced Spoke to Client VPN Configuration Example for PIX Security Appliance Version 7.0

Virtual private network setup

Table of Contents. Cisco PIX/ASA 7.x Enhanced Spoke to Spoke VPN Configuration Example

Virtual Private Network Setup

Table of Contents. Cisco IPSec Tunnel through a PIX Firewall (Version 7.0) with NAT Configuration Example

ASA/PIX 8.x: Radius Authorization (ACS 4.x) for VPN Access using Downloadable ACL with CLI and ASDM Configuration Example

Physical Topology. Logical Topology

Cisco Meraki EMM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

PIX/ASA 7.x and Later : Easy VPN with Split Tunneling ASA 5500 as the Server and Cisco 871 as the Easy VPN Remote Configuration Example

ASA 7.2(2): SSL VPN Client (SVC) for Public Internet VPN on a Stick Configuration Example

VPN Between Sonicwall Products and Cisco Security Appliance Configuration Example

co Configuring PIX to Router Dynamic to Static IPSec with

Firewalling Avid ISIS in a Cisco environment

Document ID: Contents. Introduction. Prerequisites. Requirements. Introduction. Prerequisites Requirements

Configuring the PIX Firewall and VPN Clients Using PPTP, MPPE and IPSec

PIX/ASA as a DHCP Server and Client Configuration Example

PIX/ASA: PPPoE Client Configuration Example

ASA with WebVPN and Single Sign-on using ASDM and NTLMv1 Configuration Example

FWSM: Multiple Context Configuration Example

Permitting PPTP Connections Through the PIX/ASA

Cisco Virtual Office: Easy VPN Deployment Guide

PIX/ASA Active/Standby Failover Configuration Example

Configuring Group Policies

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router

How to Configure the Cisco VPN Client to PIX with AES

CISCO SWITCH BEST PRACTICES GUIDE

Dynamic Site to Site IKEv2 VPN Tunnel Between Two ASAs Configuration Example

Fundamentals of Network Security v1.1 Scope and Sequence

I N D E X. Numerics. 3DES (triple Data Encryption Standard), 199

Cisco PIX. Interoperability Guide

Configuring Easy VPN Services on the ASA 5505

1.1 Configuring HQ Router as Remote Access Group VPN Server

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

L2TP IPsec Support for NAT and PAT Windows Clients

ASA/PIX 8.x: Block Certain Websites (URLs) Using Regular Expressions With MPF Configuration Example

Sample Business Ready Branch Configuration Listings

Platform Settings for Firepower Threat Defense

FTD: How to enable TCP State Bypass Configuration using FlexConfig Policy

Cisco Exam Questions & Answers

SSL VPN - IPv6 Support

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

SSL VPN - IPv6 Support

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Configuration Examples

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1

Chapter 9 Lab A: Configuring ASA Basic Settings and Firewall Using CLI

Cisco IOS Firewall Authentication Proxy

Exam Name: Implementing Cisco Edge Network Security Solutions

Configuring Authentication Proxy

L2TP over IPsec. About L2TP over IPsec/IKEv1 VPN

VPN Configuration Guide. Cisco ASA 5500 Series

RADIUS Servers for AAA

Chapter 9 Lab A: Configuring ASA Basic Settings and Firewall Using CLI

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

gateway through hw-module module shutdown Commands

Configuring a Hub & Spoke VPN in AOS

IOS Router : Easy VPN (EzVPN) in Network Extension Mode (NEM) with Split tunnelling Configuration Example

Note that you can also use the password command but the secret command gives you a better encryption algorithm.

Configuring Authentication Proxy

Sample Configurations

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

CISCO EXAM QUESTIONS & ANSWERS

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.

CCNA Security PT Practice SBA

Migrating to the Cisco ASA Services Module from the FWSM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Connection Profiles, Group Policies, and Users

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

This chapter covers the following exam topics for the Secure PIX Firewall Advanced Exam (CSPFA 9E0-511): 5. User interface 6. Configuring the PIX

Lab 8.5.2: Troubleshooting Enterprise Networks 2

Configuring Authentication Proxy

Configuring Management Access

ASA Cluster for the Firepower 9300 Chassis

LAN-to-LAN IPsec VPNs

LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example

upgrade-mp through xlate-bypass Commands

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL II. VERSION 2.0

Mediant MSBR. Version 6.8. Security Setup. Configuration Guide. Version 6.8. AudioCodes Family of Multi-Service Business Routers (MSBR)

SSL VPN. Finding Feature Information. Prerequisites for SSL VPN

Configuring LAN-to-LAN IPsec VPNs

Network Security CSN11111

Configuring Connection Profiles, Group Policies, and Users

NCP Secure Managed Android Client Release Notes

Internet. SonicWALL IP Cisco IOS IP IP Network Mask

In the event of re-installation, the client software will be installed as a test version (max 10 days) until the required license key is entered.

VPN Connection through Zone based Firewall Router Configuration Example

Router Allows VPN Clients to Connect IPsec and Internet Using Split Tunneling Configuration Example

Exam : Title : Securing Networks with PIX and ASA. Ver :

Connection Settings. What Are Connection Settings? management connections that go to the ASA.

Mediant MSBR. Version 6.8. Security Setup. Configuration Guide. Version 7.2. AudioCodes Family of Multi-Service Business Routers (MSBR)

RADIUS Servers for AAA

Transcription:

ASA Version 7.2(4)30 hostname vpn domain-name hollywood.com enable password BO5OGdtIUElAVJc7 encrypted passwd BO5OGdtIUElAVJc7 encrypted names name 172.30.232.128 XL description XL / idot name 172.28.28.0 Kryptonite description Kryptonite Sydney name 192.168.2.0 KL_Office description Office Kuala Lumpur name 192.168.1.0 HQ description Dutch Hollywood HQ name 172.31.13.224 LB-Application description Load Balancer in Application Network name 10.103.0.0 Internal_LAN description Trusted Local Area Network name 10.103.4.128 ManagementVPN description VPN Dial-in Management Users name 10.9.11.119 CamGSM description CamGSM Cambodia name 203.144.66.62 CAMGSM_VPN_PEER name 79.140.91.68 SEABONE_VPN_PEER name 213.144.191.234 Seabone4 description Seabone Italy ICMP1 name 213.144.191.235 Seabone5 description Seabone Italy ICMP2 name 213.144.191.140 Seabone1 description Seabone Italy APP1 name 213.144.191.141 Seabone2 description Seabone Italy APP2 name 213.144.191.142 Seabone3 description Seabone Italy APP3 name 173.209.195.20 SYNIVERSE_DL_VPN_PEER name 173.209.195.45 Syniverse_DL description Dallas USA name 72.249.120.200 IRISWIRELESS_VPN_PEER name 72.249.120.47 Iriswireless description Iris Wireless name 173.209.205.20 SYNIVERSE_SV_VPN_PEER name 173.209.205.45 Syniverse_SV description Savvis USA interface Vlan1 nameif inside security-level 100 ip address 10.103.0.250 255.255.0.0 interface Vlan2 nameif outside security-level 0 ip address 195.88.18.250 255.255.255.0 interface Vlan3 no forward interface Vlan1 nameif application security-level 50

ip address 172.31.13.225 255.255.255.0 interface Ethernet0/0 switchport access vlan 2 interface Ethernet0/1 switchport access vlan 2 interface Ethernet0/2 interface Ethernet0/3 interface Ethernet0/4 switchport access vlan 3 interface Ethernet0/5 switchport access vlan 3 interface Ethernet0/6 interface Ethernet0/7 banner login banner motd --------------------------------------- banner motd W A R N I N G banner motd --------------------------------------- banner motd. banner motd THIS IS A PRIVATE NETWORK SYSTEM. banner motd This network system including all related equipment, network devices banner motd specifically including Internet access, are provided only for banner motd authorized use. banner motd. banner motd Unauthorized use may subject you to criminal prosecution. Evidence of banner motd any such unauthorized use collected during monitoring may be used for banner motd administrative, criminal or other adverse action. Use of this system banner motd constitutes consent to monitoring for these purposes. banner motd. banner motd For enquiries, contact harjit@silverstreet.com boot system disk0:/asa724-30-k8.bin ftp mode passive dns server-group DefaultDNS domain-name silverstreet.com

same-security-traffic permit intra-interface access-list outside_1_cryptomap extended permit ip LB-Application 255.255.255.252 XL 255.255.255.192 access-list outside_1_cryptomap extended permit ip ManagementVPN 255.255.255.240 host 172.30.232.136 access-list application_access_in extended permit icmp LB-Application 255.255.255.252 XL 255.255.255.192 access-list application_access_in extended permit ip LB-Application 255.255.255.252 XL 255.255.255.192 access-list application_access_in extended permit ip Application_VLAN 255.255.255.0 host Telstra_QLD access-list application_access_in extended permit icmp Application_VLAN 255.255.255.0 host Telstra_QLD access-list application_access_in extended permit ip Application_VLAN 255.255.255.0 host Telstra_NSW access-list application_access_in extended permit icmp Application_VLAN 255.255.255.0 host Telstra_NSW access-list application_access_in extended permit ip Application_VLAN 255.255.255.0 ibasis 255.255.255.240 access-list application_access_in extended permit icmp Application_VLAN 255.255.255.0 ibasis 255.255.255.240 access-list application_access_in extended permit icmp Application_VLAN 255.255.255.0 host CamGSM access-list application_access_in extended permit ip Application_VLAN 255.255.255.0 host CamGSM access-list application_access_in extended permit icmp LB-Application 255.255.255.252 Telstra 255.255.255.0 access-list application_access_in extended permit ip LB-Application 255.255.255.252 Telstra 255.255.255.0 access-list application_access_in extended permit ip Application_VLAN 255.255.255.0 host Seabone1 access-list application_access_in extended permit icmp Application_VLAN 255.255.255.0 host Seabone1 access-list application_access_in extended permit ip Application_VLAN 255.255.255.0 host Seabone2 access-list application_access_in extended permit icmp Application_VLAN 255.255.255.0 host Seabone2 access-list application_access_in extended permit ip Application_VLAN 255.255.255.0 host Seabone3 access-list application_access_in extended permit icmp Application_VLAN 255.255.255.0 host Seabone3 access-list application_access_in extended permit icmp Application_VLAN 255.255.255.0 host Seabone4 access-list application_access_in extended permit icmp Application_VLAN 255.255.255.0 host Seabone5 access-list application_access_in extended permit ip Application_VLAN 255.255.255.0 host Iriswireless access-list application_access_in extended permit icmp Application_VLAN 255.255.255.0 host Iriswireless access-list outside_3_cryptomap extended permit ip LB-Application 255.255.255.252 Telstra 255.255.255.0 access-list no-nat extended permit ip Internal_LAN 255.255.0.0 ManagementVPN 255.255.255.240 access-list no-nat extended permit ip Internal_LAN 255.255.0.0 HQ 255.255.255.0 access-list no-nat extended permit ip Internal_LAN 255.255.0.0 KL_Office 255.255.255.0 access-list 127 extended permit ip Internal_LAN 255.255.0.0 Telstra 255.255.255.0

access-list 127 extended permit ip Internal_LAN 255.255.0.0 XL 255.255.255.192 access-list 127 extended permit ip Internal_LAN 255.255.0.0 host Telstra_QLD access-list 127 extended permit ip Internal_LAN 255.255.0.0 host Telstra_NSW access-list 127 extended permit ip Internal_LAN 255.255.0.0 ibasis 255.255.255.240 access-list 127 extended permit ip Internal_LAN 255.255.0.0 host CamGSM access-list 127 extended permit ip Internal_LAN 255.255.0.0 host Seabone1 access-list 127 extended permit ip Internal_LAN 255.255.0.0 host Seabone2 access-list 127 extended permit ip Internal_LAN 255.255.0.0 host Seabone3 access-list 127 extended permit ip Internal_LAN 255.255.0.0 host Seabone4 access-list 127 extended permit ip Internal_LAN 255.255.0.0 host Seabone5 access-list 127 extended permit ip Internal_LAN 255.255.0.0 host Iriswireless access-list split standard permit Internal_LAN 255.255.0.0 access-list split standard permit HQ 255.255.255.0 access-list split standard permit Telstra 255.255.255.0 access-list split standard permit KL_Office 255.255.255.0 access-list split standard permit XL 255.255.255.192 access-list 130 extended permit ip ManagementVPN 255.255.255.240 any access-list outside_2_cryptomap extended permit ip Internal_LAN 255.255.0.0 HQ 255.255.255.0 access-list office_access_out extended permit icmp HQ 255.255.255.0 Internal_LAN 255.255.0.0 access-list office_access_out extended permit ip HQ 255.255.255.0 Internal_LAN 255.255.0.0 access-list office_access_out extended permit icmp KL_Office 255.255.255.0 Internal_LAN 255.255.0.0 access-list office_access_out extended permit ip KL_Office 255.255.255.0 Internal_LAN 255.255.0.0 access-list 135 extended permit ip ManagementVPN 255.255.255.240 Internal_LAN 255.255.0.0 access-list outside_4_cryptomap extended permit ip Internal_LAN 255.255.0.0 KL_Office 255.255.255.0 access-list 125 extended permit ip HQ 255.255.255.0 Internal_LAN 255.255.0.0 access-list 125 extended permit ip KL_Office 255.255.255.0 Internal_LAN 255.255.0.0 access-list outside_5_cryptomap extended permit ip Application_VLAN 255.255.255.0 host CamGSM access-list outside_6_cryptomap extended permit ip Application_VLAN 255.255.255.0 host Telstra_QLD access-list outside_7_cryptomap extended permit ip Application_VLAN 255.255.255.0 host Telstra_NSW access-list outside_8_cryptomap extended permit ip Application_VLAN 255.255.255.0 ibasis 255.255.255.240 access-list xlmanage_acl standard permit host 172.30.232.136 access-list xlmanage_acl standard deny any access-list outside_9_cryptomap extended permit ip Application_VLAN 255.255.255.0 host Seabone4 access-list outside_9_cryptomap extended permit ip Application_VLAN 255.255.255.0 host Seabone5 access-list outside_9_cryptomap extended permit ip Application_VLAN 255.255.255.0 host Seabone1 access-list outside_9_cryptomap extended permit ip Application_VLAN 255.255.255.0 host Seabone2 access-list outside_9_cryptomap extended permit ip Application_VLAN 255.255.255.0 host Seabone3 access-list outside_10_cryptomap extended permit ip Application_VLAN 255.255.255.0 host Iriswireless access-list application_access_in_syniverse extended permit ip Application_VLAN 255.255.255.0 host Syniverse_DL

access-list application_access_in_syniverse extended permit ip Internal_LAN 255.255.0.0 host Syniverse_DL access-list application_access_in_syniverse extended permit icmp Application_VLAN 255.255.255.0 host Syniverse_DL access-list application_access_in_syniverse extended permit ip Application_VLAN 255.255.255.0 host Syniverse_SV access-list application_access_in_syniverse extended permit ip Internal_LAN 255.255.0.0 host Syniverse_SV access-list application_access_in_syniverse extended permit icmp Application_VLAN 255.255.255.0 host Syniverse_SV access-list outside_100_cryptomap extended permit ip host 195.88.18.249 host Syniverse_SV access-list outside_110_cryptomap extended permit ip host 195.88.18.249 host Syniverse_DL pager lines 24 logging enable logging timestamp logging console critical logging monitor debugging logging buffered emergencies logging asdm informational mtu inside 1500 mtu outside 1500 mtu application 1500 ip local pool ManagementVPN 10.103.4.130-10.103.4.140 mask 255.255.255.240 icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-524.bin no asdm history enable arp timeout 14400 global (inside) 3 interface global (outside) 1 interface global (outside) 5 172.31.13.225 global (outside) 6 195.88.18.249 nat (inside) 0 access-list no-nat nat (inside) 6 access-list application_access_in_syniverse nat (inside) 1 0.0.0.0 0.0.0.0 nat (outside) 0 access-list 135 outside nat (outside) 5 access-list 127 outside nat (outside) 1 access-list 130 outside nat (outside) 3 access-list 125 outside no threat-detection statistics tcp-intercept access-group office_access_out out interface inside access-group application_access_in in interface application route outside 0.0.0.0 0.0.0.0 195.88.18.1 1

timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 aaa authentication ssh console LOCAL http server enable http 10.103.4.0 255.255.255.0 inside snmp-server host inside 10.103.4.40 community public version 2c no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart snmp-server enable traps entity config-change crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec transform-set TRANS_ESP_3DES_MD5 esp-3des esp-md5-hmac crypto ipsec transform-set TRANS_ESP_3DES_MD5 mode transport crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport crypto ipsec transform-set TRANS_ESP_AES_SHA esp-aes esp-sha-hmac crypto ipsec transform-set TRANS_ESP_AES_SHA mode transport crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 crypto dynamic-map outside_dyn_map 20 set transform-set TRANS_ESP_3DES_MD5 TRANS_ESP_3DES_SHA TRANS_ESP_AES_SHA crypto map outside_map 1 match address outside_1_cryptomap crypto map outside_map 1 set peer XL_VPN_PEER crypto map outside_map 1 set transform-set ESP-3DES-MD5 crypto map outside_map 2 match address outside_2_cryptomap crypto map outside_map 2 set peer HQ_VPN_PEER crypto map outside_map 2 set transform-set ESP-3DES-MD5 crypto map outside_map 3 match address outside_3_cryptomap crypto map outside_map 3 set peer TELSTRA_VPN_PEER crypto map outside_map 3 set transform-set ESP-3DES-MD5 crypto map outside_map 4 match address outside_4_cryptomap crypto map outside_map 4 set peer KL_OFFICE_PEER crypto map outside_map 4 set transform-set ESP-3DES-MD5 crypto map outside_map 5 match address outside_5_cryptomap crypto map outside_map 5 set peer CAMGSM_VPN_PEER crypto map outside_map 5 set transform-set ESP-3DES-MD5 crypto map outside_map 6 match address outside_6_cryptomap

crypto map outside_map 6 set peer TELSTRA_QLD_VPN_PEER crypto map outside_map 6 set transform-set ESP-3DES-MD5 crypto map outside_map 7 match address outside_7_cryptomap crypto map outside_map 7 set peer TELSTRA_NSW_VPN_PEER crypto map outside_map 7 set transform-set ESP-3DES-MD5 crypto map outside_map 8 match address outside_8_cryptomap crypto map outside_map 8 set peer IBASIS_VPN_PEER crypto map outside_map 8 set transform-set ESP-3DES-MD5 crypto map outside_map 9 match address outside_9_cryptomap crypto map outside_map 9 set peer SEABONE_VPN_PEER crypto map outside_map 9 set transform-set ESP-3DES-SHA crypto map outside_map 10 set peer IRISWIRELESS_VPN_PEER crypto map outside_map 10 set transform-set ESP-3DES-MD5 ESP-3DES-SHA crypto map outside_map 20 ipsec-isakmp dynamic outside_dyn_map crypto map outside_map 100 match address outside_100_cryptomap crypto map outside_map 100 set peer SYNIVERSE_SV_VPN_PEER crypto map outside_map 100 set transform-set ESP-3DES-SHA crypto map outside_map 110 match address outside_110_cryptomap crypto map outside_map 110 set peer SYNIVERSE_DL_VPN_PEER crypto map outside_map 110 set transform-set ESP-3DES-SHA crypto map outside_map interface outside crypto isakmp enable outside crypto isakmp policy 10 authentication pre-share encryption 3des hash md5 group 2 lifetime 86400 crypto isakmp policy 20 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 crypto isakmp policy 30 authentication pre-share encryption 3des hash md5 group 2 lifetime 28800 crypto isakmp nat-traversal 20 telnet timeout 30

ssh 10.103.4.0 255.255.255.0 inside ssh timeout 5 console timeout 10 management-access inside dhcpd auto_config outside dhcpd address 10.103.0.251-10.103.1.26 inside group-policy DfltGrpPolicy attributes banner none wins-server none dns-server value 10.103.0.1 dhcp-network-scope none vpn-access-hours none vpn-simultaneous-logins 3 vpn-idle-timeout none vpn-session-timeout none vpn-filter none vpn-tunnel-protocol IPSec l2tp-ipsec password-storage disable ip-comp disable re-xauth disable group-lock none pfs disable ipsec-udp disable ipsec-udp-port 10000 split-tunnel-policy tunnelall split-tunnel-network-list none default-domain value silverstreet.com split-dns none intercept-dhcp 255.255.255.255 enable secure-unit-authentication disable user-authentication disable user-authentication-idle-timeout 30 ip-phone-bypass disable leap-bypass disable nem disable backup-servers keep-client-config msie-proxy server none msie-proxy method no-modify msie-proxy except-list none

msie-proxy local-bypass disable nac disable nac-sq-period 300 nac-reval-period 36000 nac-default-acl none address-pools none smartcard-removal-disconnect enable client-firewall none client-access-rule none webvpn functions url-entry html-content-filter none homepage none keep-alive-ignore 4 http-comp gzip filter none url-list none customization value DfltCustomization port-forward none port-forward-name value Application Access sso-server none deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information svc none svc keep-installer installed svc keepalive none svc rekey time none svc rekey method none svc dpd-interval client none svc dpd-interval gateway none svc compression deflate username xlmanage password wka92oa7kbqzer5lmptk3w== nt-encrypted username xlmanage attributes vpn-filter value xlmanage_acl username admin password eab0loszkfjik6vm encrypted username sean password buw9nwzmh5zv5onl encrypted username harjit password O1tLmEbCtF.ktFXX encrypted username silveradmin password pwh+6iupebz9omra1zmbca== nt-encrypted username xsnetworks password kvnwttqqzwxh0kxu8i0mqq== nt-encrypted tunnel-group DefaultRAGroup general-attributes address-pool ManagementVPN

tunnel-group DefaultRAGroup ipsec-attributes isakmp keepalive disable tunnel-group DefaultRAGroup ppp-attributes no authentication chap authentication ms-chap-v2 tunnel-group 202.152.224.2 type ipsec-l2l tunnel-group 202.152.224.2 ipsec-attributes tunnel-group 212.241.51.234 type ipsec-l2l tunnel-group 212.241.51.234 ipsec-attributes tunnel-group 134.159.123.70 type ipsec-l2l tunnel-group 134.159.123.70 ipsec-attributes tunnel-group 203.121.25.118 type ipsec-l2l tunnel-group 203.121.25.118 ipsec-attributes tunnel-group 79.140.91.68 type ipsec-l2l tunnel-group 79.140.91.68 ipsec-attributes tunnel-group 203.52.36.53 type ipsec-l2l tunnel-group 203.52.36.53 ipsec-attributes tunnel-group 203.52.67.53 type ipsec-l2l tunnel-group 203.52.67.53 ipsec-attributes tunnel-group 62.93.147.132 type ipsec-l2l tunnel-group 62.93.147.132 ipsec-attributes tunnel-group 203.144.66.62 type ipsec-l2l tunnel-group 203.144.66.62 ipsec-attributes tunnel-group 72.249.120.200 type ipsec-l2l tunnel-group 72.249.120.200 ipsec-attributes tunnel-group 173.209.195.20 type ipsec-l2l tunnel-group 173.209.195.20 ipsec-attributes tunnel-group 173.209.205.20 type ipsec-l2l tunnel-group 173.209.205.20 ipsec-attributes

class-map inspection_default match default-inspection-traffic policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect icmp inspect ftp service-policy global_policy global prompt hostname context Cryptochecksum:84ff609896cf1392717480914e528811 : end