nelifecare
MIS
Intermittently DNS queries are failing. Does anyone have any ideas? Config is attached.
: Saved
: Written by enable_15 at 02:19:05.143 EST Mon Jan 15 2007
ASA Version 7.0(2)
names
name 192.168.2.22 intranet
name 192.168.2.21 gateway
name 192.168.2.20 mail
name 192.168.1.41 PHOBOS
name 192.168.1.39 ENYO
name 192.168.1.38 PHAETON
name 192.168.1.40 DIEMOS
name 192.168.1.36 IRIS
name 192.168.1.33 ODYSSEUS
name 192.168.1.27 POSEIDON
name 192.168.2.0 DMZ
name 192.168.0.0 NELC
name 64.247.25.138 ssl.certifiedmail.com
name 192.168.70.0 CorrieMichaud
name 192.168.80.0 JudyGillett
name 192.168.1.26 CYPRESS
name 192.168.1.16 POLLUX
name 192.168.1.181 tftp
!
interface Ethernet0/0
nameif Outside
security-level 0
ip address 24.xx.xx.xx 255.255.255.240
!
interface Ethernet0/1
speed 100
duplex full
nameif Inside
security-level 99
ip address 192.168.1.11 255.255.255.0
!
interface Ethernet0/2
speed 100
duplex full
nameif DMZ
security-level 50
ip address 192.168.2.1 255.255.255.0
!
interface Management0/0
shutdown
nameif management
security-level 100
no ip address
management-only
!
enable password *************** encrypted
passwd *************** encrypted
hostname ZEUS
domain-name domain.com
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
object-group service Citrix tcp
description Open ports 442 and 1494
port-object eq 442
port-object eq citrix-ica
object-group network CitrixServers
description All Citrix Servers
network-object CITRIX01 255.255.255.255
network-object CITRIX02 255.255.255.255
network-object CITRIX03 255.255.255.255
network-object PHAETON 255.255.255.255
network-object ENYO 255.255.255.255
network-object DIEMOS 255.255.255.255
network-object PHOBOS 255.255.255.255
object-group network CitrixServers_real
description All Citrix Servers
network-object CITRIX01 255.255.255.255
network-object CITRIX02 255.255.255.255
network-object CITRIX03 255.255.255.255
network-object PHAETON 255.255.255.255
network-object ENYO 255.255.255.255
network-object DIEMOS 255.255.255.255
network-object PHOBOS 255.255.255.255
access-list Outside_access_in extended permit tcp any host 24.xx.xx.117 eq 3389
access-list Outside_access_in remark HTTPS (443) access to gateway (GAIA) from the outside
access-list Outside_access_in extended permit tcp any host 24.xx.xx.120 eq https
access-list Outside_access_in extended permit tcp any host 24.xx.xx.120 eq www
access-list Outside_access_in remark HTTPS (443) access to intranet (GAIA) from the outside
access-list Outside_access_in extended permit tcp any host 24.xx.xx.115 eq https
access-list Outside_access_in remark HTTP (80) access to intranet (GAIA) from the outside
access-list Outside_access_in extended permit tcp any host 24.xx.xx.115 eq www
access-list Outside_access_in remark Port opened to gateway (GAIA) for Citrix Secure Gateway communication
access-list Outside_access_in extended permit tcp any host 24.xx.xx.120 eq 444
access-list Outside_access_in remark SMTP (25) access to mail (GAIA) from the outside
access-list Outside_access_in extended permit tcp any host 24.xx.xx.114 eq smtp
access-list Outside_access_in remark HTTPS (443) access to webmail (POSEIDON) for Exchange 2000 OWA
access-list Outside_access_in extended permit tcp any host 24.xx.xx.118 eq https
access-list Outside_access_in remark Port opened to gateway (GAIA) for FTP access
access-list Outside_access_in extended permit tcp any host 24.xx.xx.120 eq 989
access-list Outside_access_in remark Ports opened to gateway (GAIA) for FTP access
access-list Outside_access_in extended permit tcp any host 24.xx.xx.120 range 1120 1128
access-list Outside_access_in extended permit udp host 216.xx.xx.157 host 24.xx.xx.122 eq tftp
access-list Outside_access_in remark Allow PING
access-list Outside_access_in extended permit icmp any any
access-list Outside_access_in remark Port opened for Incoming CertifiedMail.com SMTP(TLS) traffic
access-list Outside_access_in extended permit tcp host ssl.certifiedmail.com host 24.xx.xx.120 eq 26
access-list DMZ_access_in extended permit tcp host gateway host POSEIDON eq smtp
access-list DMZ_access_in remark Forward SMTP traffic from GAIA (mail ) to POSEIDON
access-list DMZ_access_in extended permit tcp DMZ 255.255.255.0 eq smtp host POSEIDON eq smtp
access-list DMZ_access_in remark Ports opened for Citrix Secure Gateway Access
access-list DMZ_access_in extended permit tcp host gateway object-group CitrixServers object-group Citrix
access-list DMZ_access_in extended permit tcp host gateway host IRIS eq https
access-list DMZ_access_in extended permit tcp host gateway host 192.168.1.161 eq smtp
access-list DMZ_access_in extended permit udp host 192.168.2.1 host 192.168.1.15 eq snmp
access-list DMZ_access_in extended permit tcp host gateway host CYPRESS eq ldap
access-list DMZ_access_in extended deny ip DMZ 255.255.255.0 NELC 255.255.0.0
access-list DMZ_access_in extended permit ip DMZ 255.255.255.0 any
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.20.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.30.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.30.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.20.0 255.255.255.0 192.168.30.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.20.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.30.0 255.255.255.0 192.168.20.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 172.16.1.0 255.255.255.224
access-list Inside_nat0_outbound extended permit ip 192.168.20.0 255.255.255.0 172.16.1.0 255.255.255.224
access-list Inside_nat0_outbound extended permit ip 192.168.30.0 255.255.255.0 172.16.1.0 255.255.255.224
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 CorrieMichaud 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 JudyGillett 255.255.255.0
access-list Outside_cryptomap_20 extended permit ip 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Outside_cryptomap_20 extended permit ip 192.168.20.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Outside_cryptomap_20 extended permit ip 192.168.30.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Outside_cryptomap_40 extended permit ip 192.168.1.0 255.255.255.0 192.168.30.0 255.255.255.0
access-list Outside_cryptomap_40 extended permit ip 192.168.20.0 255.255.255.0 192.168.30.0 255.255.255.0
access-list Outside_cryptomap_60 extended permit ip 192.168.1.0 255.255.255.0 192.168.20.0 255.255.255.0
access-list Outside_cryptomap_60 extended permit ip 192.168.30.0 255.255.255.0 192.168.20.0 255.255.255.0
access-list Outside_cryptomap_dyn_20 extended permit ip any 172.16.1.0 255.255.255.224
access-list Outside_cryptomap_dyn_20 extended permit ip 192.168.1.0 255.255.255.0 CorrieMichaud 255.255.255.0
access-list Outside_cryptomap_dyn_20 extended permit ip 192.168.1.0 255.255.255.0 JudyGillett 255.255.255.0
access-list 199 extended permit ip host 209.176.164.52 any
access-list 199 extended permit ip any host 209.176.164.52
pager lines 24
logging buffer-size 100000
logging trap informational
mtu Outside 1500
mtu Inside 1500
mtu DMZ 1500
mtu management 1500
ip local pool RegionalVPN 172.16.1.1-172.16.1.25 mask 255.255.255.0
monitor-interface Outside
monitor-interface Inside
monitor-interface DMZ
monitor-interface management
asdm image disk0:/asdm502.bin
asdm location 172.16.1.0 255.255.255.224 Outside
asdm location 192.168.20.0 255.255.255.0 Outside
asdm location 192.168.30.0 255.255.255.0 Outside
asdm location 192.168.60.0 255.255.255.0 Outside
asdm group CitrixServers_real Inside
asdm group CitrixServers DMZ reference CitrixServers_real
no asdm history enable
arp timeout 14400
global (Outside) 1 24.xx.xx.126
global (Outside) 100 24.xx.xx.124
nat (Inside) 0 access-list Inside_nat0_outbound
nat (Inside) 100 192.168.1.164 255.255.255.255
nat (Inside) 1 NELC 255.255.0.0
nat (DMZ) 1 DMZ 255.255.255.0
nat (management) 10 0.0.0.0 0.0.0.0
static (DMZ,Outside) 24.xx.xx.114 mail netmask 255.255.255.255
static (DMZ,Outside) 24.xx.xx.120 gateway netmask 255.255.255.255
static (DMZ,Outside) 24.xx.xx.115 intranet netmask 255.255.255.255
static (Inside,Outside) 24.xx.xx.118 POSEIDON netmask 255.255.255.255
static (Inside,DMZ) POSEIDON POSEIDON netmask 255.255.255.255
static (Inside,DMZ) 192.168.1.0 192.168.1.0 netmask 255.255.255.0
static (Inside,DMZ) 192.168.20.0 192.168.20.0 netmask 255.255.255.0
static (Inside,DMZ) 192.168.30.0 192.168.30.0 netmask 255.255.255.0
static (Inside,Outside) 24.xx.xx.117 PHAETON netmask 255.255.255.255
static (Inside,Outside) 24.xx.xx.122 tftp netmask 255.255.255.255
access-group Outside_access_in in interface Outside
access-group DMZ_access_in in interface DMZ
!
router ospf 100
network 192.168.1.0 255.255.255.0 area 0
area 0
log-adj-changes
!
route Outside 0.0.0.0 0.0.0.0 24.xx.xx.113 1
timeout xlate 1:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:10:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
url-list Admin "Help Center Tickets" url-list Admin "Company Directory" url-list Admin "Workstation List" url-list Admin "Private" cifs://private
aaa-server cypress protocol radius
aaa-server cypress host CYPRESS
timeout 5
key cbllps6558
aaa-server metis protocol radius
aaa-server metis host tftp
timeout 5
key cbllps6558
group-policy DfltGrpPolicy attributes
banner none
wins-server none
dns-server none
dhcp-network-scope none
vpn-access-hours none
vpn-simultaneous-logins 3
vpn-idle-timeout 30
vpn-session-timeout none
vpn-filter none
vpn-tunnel-protocol IPSec
password-storage disable
ip-comp disable
re-xauth disable
group-lock none
pfs enable
ipsec-udp disable
ipsec-udp-port 10000
split-tunnel-policy tunnelall
split-tunnel-network-list none
default-domain none
split-dns none
secure-unit-authentication disable
user-authentication disable
user-authentication-idle-timeout 30
ip-phone-bypass disable
leap-bypass disable
nem disable
backup-servers keep-client-config
client-firewall none
client-access-rule none
webvpn
functions url-entry
port-forward-name value Application Access
group-policy webvpn internal
group-policy webvpn attributes
vpn-tunnel-protocol webvpn
webvpn
functions url-entry file-access file-entry file-browsing
group-policy nelifevpn internal
group-policy nelifevpn attributes
vpn-tunnel-protocol IPSec
webvpn
group-policy Laptops internal
group-policy Laptops attributes
vpn-tunnel-protocol IPSec
webvpn
http server enable
http 0.0.0.0 0.0.0.0 Inside
snmp-server host Outside 192.168.1.15 community xxxxxxxx
snmp-server host Inside 192.168.1.15 community xxxxxxxxx
snmp-server host DMZ 192.168.1.15 community xxxxxxxxxxx
no snmp-server location
no snmp-server contact
snmp-server community xxxxxxxxxx
no snmp-server enable traps all
sysopt noproxyarp Inside
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map Outside_dyn_map 20 match address Outside_cryptomap_dyn_20
crypto dynamic-map Outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto map Outside_map 20 match address Outside_cryptomap_20
crypto map Outside_map 20 set peer 216.xx.xx.157
crypto map Outside_map 20 set transform-set ESP-3DES-MD5
crypto map Outside_map 40 match address Outside_cryptomap_40
crypto map Outside_map 40 set peer 64.xx.xx.254
crypto map Outside_map 40 set transform-set ESP-3DES-MD5
crypto map Outside_map 60 match address Outside_cryptomap_60
crypto map Outside_map 60 set peer 24.xx.xx.210
crypto map Outside_map 60 set transform-set ESP-3DES-MD5
crypto map Outside_map 65535 ipsec-isakmp dynamic Outside_dyn_map
crypto map Outside_map interface Outside
isakmp identity auto
isakmp enable Outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
telnet 0.0.0.0 0.0.0.0 Inside
telnet timeout 5
ssh 24.xx.xx.214 255.255.255.255 Outside
ssh 64.xx.xx.253 255.255.255.255 Outside
ssh 216.xx.xx.157 255.255.255.255 Outside
ssh 0.0.0.0 0.0.0.0 Inside
ssh NELC 255.255.0.0 Inside
ssh 192.168.1.0 255.255.255.0 Inside
ssh 192.168.1.176 255.255.255.255 Inside
ssh timeout 15
console timeout 30
dhcpd lease 3600
dhcpd ping_timeout 50
tunnel-group DefaultL2LGroup type ipsec-l2l
tunnel-group DefaultL2LGroup ipsec-attributes
pre-shared-key xxxxxxxxxxx
tunnel-group 216.xx.xx.157 type ipsec-l2l
tunnel-group 216.xx.xx.157 ipsec-attributes
pre-shared-key xxxxxxxxxxxxx
tunnel-group Laptops type ipsec-ra
tunnel-group Laptops general-attributes
address-pool RegionalVPN
authentication-server-group metis
default-group-policy Laptops
tunnel-group Laptops ipsec-attributes
pre-shared-key xxxxxxxxxx
tunnel-group 24.xx.xx.210 type ipsec-l2l
tunnel-group 24.xx.xx.210 ipsec-attributes
pre-shared-key xxxxxxxxxx
tunnel-group nelifevpn type ipsec-ra
tunnel-group nelifevpn general-attributes
address-pool RegionalVPN
authentication-server-group metis
default-group-policy nelifevpn
tunnel-group nelifevpn ipsec-attributes
pre-shared-key xxxxxxxxxx
tunnel-group 0.0.0.0 type ipsec-l2l
tunnel-group 0.0.0.0 ipsec-attributes
pre-shared-key xxxxxxxxxxx
tunnel-group 64.xx.xx.254 type ipsec-l2l
tunnel-group 64.xx.xx.254 ipsec-attributes
pre-shared-key xxxxxxxxxxx
tunnel-group-map default-group DefaultL2LGroup
!
class-map class_ftp
match port tcp range 1024 65535
class-map sip-port
match port tcp eq sip
class-map class_ftp1
match port tcp range 1 1023
class-map inspection_default
match default-inspection-traffic
!
!
policy-map sip_policy
class sip-port
inspect sip
class inspection_default
inspect dns maximum-length 1500
class class_ftp
inspect ftp
class class_ftp1
inspect ftp
!
terminal width 200
service-policy sip_policy global
ntp server ODYSSEUS source Inside
tftp-server Inside tftp ZEUS/
webvpn
enable Outside
logo file disk0:/header.jpg
title-color 0,102,204
nbns-server ODYSSEUS master timeout 2 retry 2
nbns-server CYPRESS timeout 2 retry 2
authentication-server-group metis
default-group-policy webvpn
smtp-server 192.168.1.27
management-access Inside
Cryptochecksum:4417771cc89fc7cfd5eac1f226ccf6a1
: end
: Saved
: Written by enable_15 at 02:19:05.143 EST Mon Jan 15 2007
ASA Version 7.0(2)
names
name 192.168.2.22 intranet
name 192.168.2.21 gateway
name 192.168.2.20 mail
name 192.168.1.41 PHOBOS
name 192.168.1.39 ENYO
name 192.168.1.38 PHAETON
name 192.168.1.40 DIEMOS
name 192.168.1.36 IRIS
name 192.168.1.33 ODYSSEUS
name 192.168.1.27 POSEIDON
name 192.168.2.0 DMZ
name 192.168.0.0 NELC
name 64.247.25.138 ssl.certifiedmail.com
name 192.168.70.0 CorrieMichaud
name 192.168.80.0 JudyGillett
name 192.168.1.26 CYPRESS
name 192.168.1.16 POLLUX
name 192.168.1.181 tftp
!
interface Ethernet0/0
nameif Outside
security-level 0
ip address 24.xx.xx.xx 255.255.255.240
!
interface Ethernet0/1
speed 100
duplex full
nameif Inside
security-level 99
ip address 192.168.1.11 255.255.255.0
!
interface Ethernet0/2
speed 100
duplex full
nameif DMZ
security-level 50
ip address 192.168.2.1 255.255.255.0
!
interface Management0/0
shutdown
nameif management
security-level 100
no ip address
management-only
!
enable password *************** encrypted
passwd *************** encrypted
hostname ZEUS
domain-name domain.com
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
object-group service Citrix tcp
description Open ports 442 and 1494
port-object eq 442
port-object eq citrix-ica
object-group network CitrixServers
description All Citrix Servers
network-object CITRIX01 255.255.255.255
network-object CITRIX02 255.255.255.255
network-object CITRIX03 255.255.255.255
network-object PHAETON 255.255.255.255
network-object ENYO 255.255.255.255
network-object DIEMOS 255.255.255.255
network-object PHOBOS 255.255.255.255
object-group network CitrixServers_real
description All Citrix Servers
network-object CITRIX01 255.255.255.255
network-object CITRIX02 255.255.255.255
network-object CITRIX03 255.255.255.255
network-object PHAETON 255.255.255.255
network-object ENYO 255.255.255.255
network-object DIEMOS 255.255.255.255
network-object PHOBOS 255.255.255.255
access-list Outside_access_in extended permit tcp any host 24.xx.xx.117 eq 3389
access-list Outside_access_in remark HTTPS (443) access to gateway (GAIA) from the outside
access-list Outside_access_in extended permit tcp any host 24.xx.xx.120 eq https
access-list Outside_access_in extended permit tcp any host 24.xx.xx.120 eq www
access-list Outside_access_in remark HTTPS (443) access to intranet (GAIA) from the outside
access-list Outside_access_in extended permit tcp any host 24.xx.xx.115 eq https
access-list Outside_access_in remark HTTP (80) access to intranet (GAIA) from the outside
access-list Outside_access_in extended permit tcp any host 24.xx.xx.115 eq www
access-list Outside_access_in remark Port opened to gateway (GAIA) for Citrix Secure Gateway communication
access-list Outside_access_in extended permit tcp any host 24.xx.xx.120 eq 444
access-list Outside_access_in remark SMTP (25) access to mail (GAIA) from the outside
access-list Outside_access_in extended permit tcp any host 24.xx.xx.114 eq smtp
access-list Outside_access_in remark HTTPS (443) access to webmail (POSEIDON) for Exchange 2000 OWA
access-list Outside_access_in extended permit tcp any host 24.xx.xx.118 eq https
access-list Outside_access_in remark Port opened to gateway (GAIA) for FTP access
access-list Outside_access_in extended permit tcp any host 24.xx.xx.120 eq 989
access-list Outside_access_in remark Ports opened to gateway (GAIA) for FTP access
access-list Outside_access_in extended permit tcp any host 24.xx.xx.120 range 1120 1128
access-list Outside_access_in extended permit udp host 216.xx.xx.157 host 24.xx.xx.122 eq tftp
access-list Outside_access_in remark Allow PING
access-list Outside_access_in extended permit icmp any any
access-list Outside_access_in remark Port opened for Incoming CertifiedMail.com SMTP(TLS) traffic
access-list Outside_access_in extended permit tcp host ssl.certifiedmail.com host 24.xx.xx.120 eq 26
access-list DMZ_access_in extended permit tcp host gateway host POSEIDON eq smtp
access-list DMZ_access_in remark Forward SMTP traffic from GAIA (mail ) to POSEIDON
access-list DMZ_access_in extended permit tcp DMZ 255.255.255.0 eq smtp host POSEIDON eq smtp
access-list DMZ_access_in remark Ports opened for Citrix Secure Gateway Access
access-list DMZ_access_in extended permit tcp host gateway object-group CitrixServers object-group Citrix
access-list DMZ_access_in extended permit tcp host gateway host IRIS eq https
access-list DMZ_access_in extended permit tcp host gateway host 192.168.1.161 eq smtp
access-list DMZ_access_in extended permit udp host 192.168.2.1 host 192.168.1.15 eq snmp
access-list DMZ_access_in extended permit tcp host gateway host CYPRESS eq ldap
access-list DMZ_access_in extended deny ip DMZ 255.255.255.0 NELC 255.255.0.0
access-list DMZ_access_in extended permit ip DMZ 255.255.255.0 any
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.20.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.30.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.30.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.20.0 255.255.255.0 192.168.30.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.20.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.30.0 255.255.255.0 192.168.20.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 172.16.1.0 255.255.255.224
access-list Inside_nat0_outbound extended permit ip 192.168.20.0 255.255.255.0 172.16.1.0 255.255.255.224
access-list Inside_nat0_outbound extended permit ip 192.168.30.0 255.255.255.0 172.16.1.0 255.255.255.224
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 CorrieMichaud 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 JudyGillett 255.255.255.0
access-list Outside_cryptomap_20 extended permit ip 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Outside_cryptomap_20 extended permit ip 192.168.20.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Outside_cryptomap_20 extended permit ip 192.168.30.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list Outside_cryptomap_40 extended permit ip 192.168.1.0 255.255.255.0 192.168.30.0 255.255.255.0
access-list Outside_cryptomap_40 extended permit ip 192.168.20.0 255.255.255.0 192.168.30.0 255.255.255.0
access-list Outside_cryptomap_60 extended permit ip 192.168.1.0 255.255.255.0 192.168.20.0 255.255.255.0
access-list Outside_cryptomap_60 extended permit ip 192.168.30.0 255.255.255.0 192.168.20.0 255.255.255.0
access-list Outside_cryptomap_dyn_20 extended permit ip any 172.16.1.0 255.255.255.224
access-list Outside_cryptomap_dyn_20 extended permit ip 192.168.1.0 255.255.255.0 CorrieMichaud 255.255.255.0
access-list Outside_cryptomap_dyn_20 extended permit ip 192.168.1.0 255.255.255.0 JudyGillett 255.255.255.0
access-list 199 extended permit ip host 209.176.164.52 any
access-list 199 extended permit ip any host 209.176.164.52
pager lines 24
logging buffer-size 100000
logging trap informational
mtu Outside 1500
mtu Inside 1500
mtu DMZ 1500
mtu management 1500
ip local pool RegionalVPN 172.16.1.1-172.16.1.25 mask 255.255.255.0
monitor-interface Outside
monitor-interface Inside
monitor-interface DMZ
monitor-interface management
asdm image disk0:/asdm502.bin
asdm location 172.16.1.0 255.255.255.224 Outside
asdm location 192.168.20.0 255.255.255.0 Outside
asdm location 192.168.30.0 255.255.255.0 Outside
asdm location 192.168.60.0 255.255.255.0 Outside
asdm group CitrixServers_real Inside
asdm group CitrixServers DMZ reference CitrixServers_real
no asdm history enable
arp timeout 14400
global (Outside) 1 24.xx.xx.126
global (Outside) 100 24.xx.xx.124
nat (Inside) 0 access-list Inside_nat0_outbound
nat (Inside) 100 192.168.1.164 255.255.255.255
nat (Inside) 1 NELC 255.255.0.0
nat (DMZ) 1 DMZ 255.255.255.0
nat (management) 10 0.0.0.0 0.0.0.0
static (DMZ,Outside) 24.xx.xx.114 mail netmask 255.255.255.255
static (DMZ,Outside) 24.xx.xx.120 gateway netmask 255.255.255.255
static (DMZ,Outside) 24.xx.xx.115 intranet netmask 255.255.255.255
static (Inside,Outside) 24.xx.xx.118 POSEIDON netmask 255.255.255.255
static (Inside,DMZ) POSEIDON POSEIDON netmask 255.255.255.255
static (Inside,DMZ) 192.168.1.0 192.168.1.0 netmask 255.255.255.0
static (Inside,DMZ) 192.168.20.0 192.168.20.0 netmask 255.255.255.0
static (Inside,DMZ) 192.168.30.0 192.168.30.0 netmask 255.255.255.0
static (Inside,Outside) 24.xx.xx.117 PHAETON netmask 255.255.255.255
static (Inside,Outside) 24.xx.xx.122 tftp netmask 255.255.255.255
access-group Outside_access_in in interface Outside
access-group DMZ_access_in in interface DMZ
!
router ospf 100
network 192.168.1.0 255.255.255.0 area 0
area 0
log-adj-changes
!
route Outside 0.0.0.0 0.0.0.0 24.xx.xx.113 1
timeout xlate 1:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:10:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
url-list Admin "Help Center Tickets" url-list Admin "Company Directory" url-list Admin "Workstation List" url-list Admin "Private" cifs://private
aaa-server cypress protocol radius
aaa-server cypress host CYPRESS
timeout 5
key cbllps6558
aaa-server metis protocol radius
aaa-server metis host tftp
timeout 5
key cbllps6558
group-policy DfltGrpPolicy attributes
banner none
wins-server none
dns-server none
dhcp-network-scope none
vpn-access-hours none
vpn-simultaneous-logins 3
vpn-idle-timeout 30
vpn-session-timeout none
vpn-filter none
vpn-tunnel-protocol IPSec
password-storage disable
ip-comp disable
re-xauth disable
group-lock none
pfs enable
ipsec-udp disable
ipsec-udp-port 10000
split-tunnel-policy tunnelall
split-tunnel-network-list none
default-domain none
split-dns none
secure-unit-authentication disable
user-authentication disable
user-authentication-idle-timeout 30
ip-phone-bypass disable
leap-bypass disable
nem disable
backup-servers keep-client-config
client-firewall none
client-access-rule none
webvpn
functions url-entry
port-forward-name value Application Access
group-policy webvpn internal
group-policy webvpn attributes
vpn-tunnel-protocol webvpn
webvpn
functions url-entry file-access file-entry file-browsing
group-policy nelifevpn internal
group-policy nelifevpn attributes
vpn-tunnel-protocol IPSec
webvpn
group-policy Laptops internal
group-policy Laptops attributes
vpn-tunnel-protocol IPSec
webvpn
http server enable
http 0.0.0.0 0.0.0.0 Inside
snmp-server host Outside 192.168.1.15 community xxxxxxxx
snmp-server host Inside 192.168.1.15 community xxxxxxxxx
snmp-server host DMZ 192.168.1.15 community xxxxxxxxxxx
no snmp-server location
no snmp-server contact
snmp-server community xxxxxxxxxx
no snmp-server enable traps all
sysopt noproxyarp Inside
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map Outside_dyn_map 20 match address Outside_cryptomap_dyn_20
crypto dynamic-map Outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto map Outside_map 20 match address Outside_cryptomap_20
crypto map Outside_map 20 set peer 216.xx.xx.157
crypto map Outside_map 20 set transform-set ESP-3DES-MD5
crypto map Outside_map 40 match address Outside_cryptomap_40
crypto map Outside_map 40 set peer 64.xx.xx.254
crypto map Outside_map 40 set transform-set ESP-3DES-MD5
crypto map Outside_map 60 match address Outside_cryptomap_60
crypto map Outside_map 60 set peer 24.xx.xx.210
crypto map Outside_map 60 set transform-set ESP-3DES-MD5
crypto map Outside_map 65535 ipsec-isakmp dynamic Outside_dyn_map
crypto map Outside_map interface Outside
isakmp identity auto
isakmp enable Outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
telnet 0.0.0.0 0.0.0.0 Inside
telnet timeout 5
ssh 24.xx.xx.214 255.255.255.255 Outside
ssh 64.xx.xx.253 255.255.255.255 Outside
ssh 216.xx.xx.157 255.255.255.255 Outside
ssh 0.0.0.0 0.0.0.0 Inside
ssh NELC 255.255.0.0 Inside
ssh 192.168.1.0 255.255.255.0 Inside
ssh 192.168.1.176 255.255.255.255 Inside
ssh timeout 15
console timeout 30
dhcpd lease 3600
dhcpd ping_timeout 50
tunnel-group DefaultL2LGroup type ipsec-l2l
tunnel-group DefaultL2LGroup ipsec-attributes
pre-shared-key xxxxxxxxxxx
tunnel-group 216.xx.xx.157 type ipsec-l2l
tunnel-group 216.xx.xx.157 ipsec-attributes
pre-shared-key xxxxxxxxxxxxx
tunnel-group Laptops type ipsec-ra
tunnel-group Laptops general-attributes
address-pool RegionalVPN
authentication-server-group metis
default-group-policy Laptops
tunnel-group Laptops ipsec-attributes
pre-shared-key xxxxxxxxxx
tunnel-group 24.xx.xx.210 type ipsec-l2l
tunnel-group 24.xx.xx.210 ipsec-attributes
pre-shared-key xxxxxxxxxx
tunnel-group nelifevpn type ipsec-ra
tunnel-group nelifevpn general-attributes
address-pool RegionalVPN
authentication-server-group metis
default-group-policy nelifevpn
tunnel-group nelifevpn ipsec-attributes
pre-shared-key xxxxxxxxxx
tunnel-group 0.0.0.0 type ipsec-l2l
tunnel-group 0.0.0.0 ipsec-attributes
pre-shared-key xxxxxxxxxxx
tunnel-group 64.xx.xx.254 type ipsec-l2l
tunnel-group 64.xx.xx.254 ipsec-attributes
pre-shared-key xxxxxxxxxxx
tunnel-group-map default-group DefaultL2LGroup
!
class-map class_ftp
match port tcp range 1024 65535
class-map sip-port
match port tcp eq sip
class-map class_ftp1
match port tcp range 1 1023
class-map inspection_default
match default-inspection-traffic
!
!
policy-map sip_policy
class sip-port
inspect sip
class inspection_default
inspect dns maximum-length 1500
class class_ftp
inspect ftp
class class_ftp1
inspect ftp
!
terminal width 200
service-policy sip_policy global
ntp server ODYSSEUS source Inside
tftp-server Inside tftp ZEUS/
webvpn
enable Outside
logo file disk0:/header.jpg
title-color 0,102,204
nbns-server ODYSSEUS master timeout 2 retry 2
nbns-server CYPRESS timeout 2 retry 2
authentication-server-group metis
default-group-policy webvpn
smtp-server 192.168.1.27
management-access Inside
Cryptochecksum:4417771cc89fc7cfd5eac1f226ccf6a1
: end