show run : Saved : ASA Version 8.0(2) ! hostname tarantula enable password vSPAF6p4XRWJXSaE encrypted names ! interface Ethernet0/0 nameif int_wan security-level 0 ip address 69.70.115.50 255.255.255.248 ! interface Ethernet0/1 nameif int_lan security-level 100 ip address 172.19.1.254 255.255.255.0 ! interface Ethernet0/2 nameif int_dmz security-level 50 ip address 192.168.10.254 255.255.255.0 ! interface Ethernet0/3 shutdown <--- More ---> no nameif no security-level no ip address ! interface Management0/0 nameif management security-level 100 ip address 192.168.1.1 255.255.255.0 management-only ! passwd 2KFQnbNIdI.2KYOU encrypted ftp mode passive object-group service svc_lan_to_wan_allowed service-object udp eq domain service-object tcp eq www service-object tcp eq ftp service-object tcp eq https service-object tcp eq 3389 access-list acl_lan_in extended permit object-group svc_lan_to_wan_allowed any any access-list lan_nat0_outbound extended permit ip 172.19.1.0 255.255.255.0 192.168.10.0 255.255.255.0 access-list lan_nat0_outbound extended permit ip 172.19.1.0 255.255.255.0 10.40.0.0 255.255.0.0 access-list acl_pwr_to_pti extended permit ip 172.19.1.0 255.255.255.0 10.40.0.0 255.255.0.0 pager lines 24 logging asdm informational <--- More ---> mtu int_wan 1500 mtu int_lan 1500 mtu int_dmz 1500 mtu management 1500 icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-602.bin no asdm history enable arp timeout 14400 nat-control global (int_wan) 1 interface nat (int_lan) 0 access-list lan_nat0_outbound nat (int_lan) 1 172.19.1.0 255.255.255.0 nat (int_dmz) 1 192.168.10.0 255.255.255.0 access-group acl_lan_in in interface int_lan route int_wan 0.0.0.0 0.0.0.0 69.70.115.49 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout uauth 0:05:00 absolute dynamic-access-policy-record DfltAccessPolicy http server enable http 192.168.1.0 255.255.255.0 management no snmp-server location <--- More ---> no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set trsf_set_1 esp-3des esp-md5-hmac crypto map pwr_pti 1 match address acl_pwr_to_pti crypto map pwr_pti 1 set peer 206.162.183.146 crypto map pwr_pti 1 set transform-set trsf_set_1 crypto map pwr_pti interface int_wan crypto isakmp enable int_wan crypto isakmp policy 1 authentication pre-share encryption 3des hash md5 group 2 lifetime 28800 no crypto isakmp nat-traversal telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd address 192.168.1.2-192.168.1.254 management dhcpd enable management ! threat-detection basic-threat threat-detection statistics access-list ! <--- More ---> class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp ! <--- More ---> service-policy global_policy global tunnel-group tun_1 type ipsec-l2l tunnel-group 206.162.183.146 type ipsec-l2l tunnel-group 206.162.183.146 ipsec-attributes pre-shared-key * prompt hostname context Cryptochecksum:20168aaf9352288f36b5d05aee92625e : end tarantula(config)#