Home > other >  SOS urgent for CISCO AS NAT why cannot access
SOS urgent for CISCO AS NAT why cannot access

Time:10-05

The Result of the command: "show the conf"

: Saved
: Written by cisco at 08:02:57. 539 UTC Mon Sep 8 2008
!
ASA Version 8.2 (1)
!
The hostname yingte
Domain - name yingte
The enable password, "eight ry2yjiyt7rrxu24 encrypted
Passwd 2 kfqnbnidi. 2 kyou encrypted
Names
The name 10.18.4.203 outsideip203
The name 10.18.4.204 outsideip204
The name 10.18.4.205 outsideip205
The name 192.168.1.4 serverip4
The name 192.168.1.5 serverip5
The name 192.168.1.8 serverip8
!
Interface Vlan1
Nameif inside
Security - level 100
IP address 192.168.1.1 255.255.255.0
!
Interface Vlan4
Nameif DMZ
Security - level 50
IP address DHCP
!
Interface Vlan11
No forward interface Vlan1
Nameif outside
Security - level 0
IP address outsideip203 255.255.255.0
!
Interface Ethernet0/0
Switchport access vlan 11
!
Interface Ethernet0/1
!
Interface Ethernet0/2
!
Interface Ethernet0/3
!
Interface Ethernet0/4
!
Interface Ethernet0/5
!
Interface Ethernet0/6
!
Interface Ethernet0/7
!
FTP mode passive
The DNS server - group DefaultDNS
Domain - name yingte
Object - group service 3389 TCP
The description of 3389
Port - the object range, 3389, 3389
Object - group service mytcp
Service - 1433
object TCP eqService - 3389
object TCP eqIP access - the list inside_access_in extended permit any any
Access to the list inside_access_in extended permit TCP any any
Access to the list inside_access_in extended permit icmp any any
Access to the list inside_access_in extended permit esp any any
Any access to the list inside_access_in extended permit gre any
Access to the list outside_access_in extended permit object - group mytcp any any
IP access - the list outside_access_in extended permit any any
Access to the list outside_access_in extended permit TCP any any
Access to the list outside_access_in extended permit icmp any any
Access to the list outside_access_in extended permit esp any any
Any access to the list outside_access_in extended permit gre any
Pager lines 24
Logging the enable
Logging asdm informational
Mtu inside 1500
Mtu outside 1500
The DMZ mtu 1500
Ipv6 access - the list inside_access_ipv6_in permit any IP any
Ipv6 access - the list outside_access_ipv6_in permit any IP any
The icmp unreachable rate - limit 1 burst - size 1
No asdm history enable
Arp 14400
the timeoutGlobal 101 interface (outside)
NAT (inside) 101 0.0.0.0 0.0.0.0
The static (inside, outside) TCP outsideip205 3389 serverip4 3389 netmask 255.255.255.255
The static (inside, outside) TCP outsideip204 3389 serverip8 3389 netmask 255.255.255.255
The static (inside, outside) TCP interface 3389 serverip5 3389 netmask 255.255.255.255
Access - group inside_access_in interface in inside
Access - group inside_access_ipv6_in interface in inside
Access - group outside_access_in interface in outside
Access - group outside_access_ipv6_in interface in outside
The route outside 0.0.0.0 0.0.0.0 10.18.4.254 1
The timeout xlate 3:00:00
The timeout conn 1:00:00 half - closed 0:10:00 udp 0:02:00 icmp 0:00:02
The timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 MGCP 0:05:00 MGCP - pat 0:05:00
The timeout sip 0:30:00 sip_media 0:02:00 sip - invite 0:03:00 sip - disconnect 0:02:00
The timeout sip - provisional - media 0:02:00 uauth 0:05:00 absolute
The timeout TCP proxy - reassembly 0:01:00
Dynamic - access - policy - record DfltAccessPolicy
The HTTP server enable
HTTP 172.16.1.0 255.255.255.0 inside
HTTP 192.168.1.0 255.255.255.0 inside
HTTP 0.0.0.0 0.0.0.0 outside
No SNMP - server location
No SNMP - server contact
- server enable SNMP traps SNMP authentication linkup linkdown coldstart
Crypto ipsec security association - lifetime seconds 28800
Crypto ipsec security association - lifetime kilobytes 4608000
Telnet timeout 5
SSH timeout 5
The console timeout 0

-- -- kyoui -- kyoui - detection, basic
-- kyoui - detection statistics access - list
No -- kyoui - detection statistics TCP - intercept
Webvpn
The username cisco password cDLHFrA2Yf9NyAfr encrypted
!
Class - the map inspection_default
Match the default ws-inspection - traffic
!
!
The policy - the map type inspect DNS preset_dns_map
The parameters
The message - length, maximum 512
The policy - map global_policy
The class inspection_default
Inspect the DNS preset_dns_map
Inspect the FTP
Inspect h323 h225
Inspect h323 ras
Inspect netbios
Inspect RSH
Inspect RTSP
Inspect skinny
Inspect esmtp
Inspect sqlnet
Inspect sunrpc
Inspect TFTP
Inspect the sip
Inspect XDMCP
!
Service - the policy global_policy global
Prompt the hostname context
733 dd748dfd073ab0533879a0655e6fb Cryptochecksum:


null
  • Related