Michael Torrie's Personal Wiki

Firewall Notes

This document contains some notes on the current firewall configuration. The running firewall configuration can be exported to admin.chem.byu.edu by doing the following on admin.chem.byu.edu:

touch /tftpboot/network/firewall
chmod a+rw /tftpboot/network/firewall

Then on the firewall, after running enable, enter:

write net 192.168.105.12:network/firewall

After the config is successfully written out, you will want to remove the excessive permissions on the file on admin.chem.byu.edu:

chmod go-rwx /tftpboot/network/firewall

If you want to reverse the process, you must make the file on admin.chem.byu.edu readable to the tftp server with chmod and then you can pull from it over tftp.

Firewall config and notes

: Saved
: Written by admin at 12:49:34.518 MDT Tue Aug 6 2013
!
ASA Version 8.2(3) 
!
hostname Chemfire
domain-name chem.byu.edu
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted

Since we need to pass multicast traffic for Campus IPTV, multicast routing must be enabled:

multicast-routing

Several host names are set to make the rules a bit easier to understand and write. However it appears there area some host names that are old and maybe obsolete:

no names
name 192.168.105.10 NS1
name 192.168.105.37 Celeborn
name 192.168.105.36 Galadriel
name 192.168.200.6 purgatory
name 192.168.103.0 net_103
name 192.168.200.50 www_ext
name 192.168.104.0 net_104
name 192.168.200.0 dmz_any
name 192.168.100.0 net_100
name 192.168.200.10 mail
name 192.168.105.0 net_105
name 192.168.105.18 SQL
name 192.168.101.0 net_101
name 192.168.105.12 Admin
name 192.168.102.0 net_102
name 192.168.200.100 camera
name 128.187.0.0 BYUnet_public
name 10.0.0.0 BYUNet_private
name 192.168.104.240 reg_240
name 192.168.101.240 reg_101
name 192.168.103.240 reg_103
name 192.168.100.240 reg_100
name 192.168.105.240 reg_105
name 192.168.100.51 nmrlab
name 192.168.102.240 reg_102
name 192.168.4.0 WirelessNet
name 192.168.105.16 ccs_int
name 192.168.200.51 ccs_ext
name 192.168.0.0 inside_any
name 192.168.200.53 chemmgmt_proxy
name 192.168.200.52 www_rhel5 description RHEL 5 external webserver.
name 192.168.105.43 secure_rhel5 description RHEL 5 internal webserver.
name 192.168.105.19 sql_rhel6 description RHEL 6 MySQL/Postgres server.
name 192.168.105.58 chemmgmt-server
name 192.168.105.75 pchem-server
name 192.168.200.56 archiver description Ubuntu server for grad student.
name 192.168.105.85 cortana
name 192.168.105.38 mail-int_rhel5 description RHEL 5 internal mail server.
name 192.168.200.12 mail-ext2
name 192.168.200.57 www_rhel6 description RHEL 6 external webserver.
!

Interfaces

Untrusted

The main, untrusted interface is Ethernet0/0. It is assigned an address that covers all the public IP addresses that we use in the department. The address is 128.187.3.3/25, which means it effectively has addresses 3 through 126. Some of these are NATed to DMZ addresses, and some are used in a pool for outbound communications.

interface Ethernet0/0
 nameif outside
 security-level 0
 ip address 128.187.3.3 255.255.255.128 standby 128.187.3.2 
!

Trusted

The following interface is used to carry all traffic from the inside, or trusted network, to the outside world, the DMZ, or VPN hosts. It is not a VLAN trunk; it's just a access port on the core's 106 VLAN (??). The core has the address 192.168.106.1, and the firewall has the address of 192.168.106.254 (with 192.168.106.253 as the backup, which becomes 106.254 when it comes into service).

interface Ethernet0/1
 nameif inside
 security-level 100
 ip address 192.168.106.254 255.255.255.0 standby 192.168.106.253 
!

DMZ

Although the DMZ is not an actual VLAN, the firewall defines a subnet for it and acts as a router for DMZ traffic.

interface Ethernet0/2
 nameif dmz
 security-level 50
 ip address 192.168.200.1 255.255.255.0 standby 192.168.200.2 
!
interface Ethernet0/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management0/0
 description LAN/STATE Failover Interface
!

Campus IPTV defines a multicast rendezvous point that the firewall needs to know of:

pim rp-address 10.3.3.199 
boot system disk0:/asa823-k8.bin
ftp mode passive
clock timezone MST -7
clock summer-time MDT recurring
dns server-group DefaultDNS
 domain-name chem.byu.edu
same-security-traffic permit intra-interface

Campus IPTV comes from several multicast addresses, which we group together to make the rules easier to write:

object-group network MULTICAST_GROUPS
 network-object host 239.226.16.1
 network-object host 239.226.16.2
 network-object host 239.226.16.4
 network-object host 239.226.16.7
 network-object host 239.226.16.8
 network-object host 239.226.16.5
 network-object host 239.226.16.16
 network-object host 239.226.16.6
 network-object host 239.226.16.17
 network-object host 239.226.16.21
 network-object host 239.226.16.22
 network-object host 239.226.16.3
 network-object host 239.226.16.12
 network-object host 239.226.16.13
 network-object host 239.226.16.9
 network-object host 239.226.16.14
 network-object host 239.226.16.19
 network-object host 239.226.16.18
 network-object host 239.226.16.10
 network-object host 239.226.16.11
 network-object host 239.226.16.15
 network-object host 239.226.16.20
 network-object host 239.226.16.23
 network-object host 239.226.16.24
 network-object host 239.226.16.25
 network-object host 239.226.16.26
 network-object host 239.226.16.27
 network-object host 239.226.16.28
 network-object host 239.226.16.29
 network-object host 239.226.16.30
 network-object host 239.226.16.31
 network-object host 239.226.16.32
 network-object host 239.226.16.33
 network-object host 239.226.16.34
 network-object host 239.226.16.37
 network-object host 239.226.16.35
 network-object host 239.226.16.36
 network-object host 239.226.16.38
 network-object host 239.226.16.39
 network-object host 239.226.16.40
 network-object host 239.226.16.41
 network-object host 239.226.16.42
 network-object host 239.226.16.43
 network-object host 239.226.16.44
 network-object host 239.226.16.45
 network-object host 239.226.16.46
 network-object host 239.226.255.0
 network-object host 239.226.255.1
 network-object host 239.226.255.2

For convenience, a protocol group is defined to let a rule be made for both a tcp and udp port in the same line.

object-group protocol TCPUDP
 protocol-object udp
 protocol-object tcp

Access Controls Rules

From the DMZ to the Trusted Network

The following lines appear to be obsolete. the ip addresses resolve to ns1 and ns2, but neither server hosts LDAP currently. And port 88 is a kerberos port. Kerberos is at kerberos.chem.byu.edu which is really on admin.chem.byu.edu. So it appears these lines can be removed:

access-list dmz_in extended permit tcp any host 192.168.105.36 eq 88 
access-list dmz_in extended permit tcp any host 192.168.105.36 eq ldap 
access-list dmz_in extended permit tcp any host 192.168.105.36 eq ldaps 
access-list dmz_in extended permit tcp any host 192.168.105.37 eq ldap 
access-list dmz_in extended permit tcp any host 192.168.105.37 eq ldaps 

DNS and time servers need to be accessible from the DMZ:

access-list dmz_in extended permit udp any host 192.168.105.10 eq domain 
access-list dmz_in extended permit udp any host 192.168.105.10 eq ntp 
access-list dmz_in extended permit tcp any host 192.168.105.10 eq domain 

Purgatory may ssh or telnet into any trusted host:

access-list dmz_in extended permit tcp host 192.168.200.6 192.168.0.0 255.255.128.0 eq ssh 
access-list dmz_in extended permit tcp host 192.168.200.6 192.168.0.0 255.255.128.0 eq telnet 

The following rule was to allow a sysadmin to ssh into purgatory and forward web connections so that the vpn concentrator could be controlled via its web interface. The VPN concentrator is now part of this firewall, so this code is useless:

access-list dmz_in extended permit tcp host 192.168.200.6 host 192.168.108.6 eq www 
access-list dmz_in extended permit tcp host 192.168.200.6 host 192.168.108.6 eq https 

The following rule is obsolete too. It allowed a sysadmin to tunnel vnc through purgatory to the old Mac OS X Server celeborn which was on port 5900:

access-list dmz_in extended permit tcp host 192.168.200.6 host 192.168.105.36 eq 5900 

The following code allowed the old web server to proxy information from trusted web servers (ports 80, 443, 8080, 8180), and access the SQL servers (port 3306 for mysql, 5432 for postgresql). This server was called www-old when the servers where changed to an split dmz/trusted arrangement, but is no longer in service. Hence these rules should be removed as 192.168.200.50 does not appear to be alive anymore:

access-list dmz_in extended permit tcp host 192.168.200.50 host 192.168.105.12 eq https 
access-list dmz_in extended permit tcp host 192.168.200.50 host 192.168.105.43 eq www 
access-list dmz_in extended permit tcp host 192.168.200.50 host 192.168.105.43 eq https 
access-list dmz_in extended permit tcp host 192.168.200.50 host 192.168.105.43 eq 8080 
access-list dmz_in extended permit tcp host 192.168.200.50 host 192.168.105.43 eq 8180 
access-list dmz_in extended permit tcp host 192.168.200.50 host 192.168.105.18 eq 3306 
access-list dmz_in remark New SQL
access-list dmz_in extended permit tcp host 192.168.200.50 host 192.168.105.19 eq 3306 
access-list dmz_in extended permit tcp host 192.168.200.50 host 192.168.105.18 eq 5432 
access-list dmz_in remark New SQL
access-list dmz_in extended permit tcp host 192.168.200.50 host 192.168.105.19 eq 5432 

The following rules allow any DMZ host to access LDAP on a backup LDAP server, which is no longer in service, as near as I can tell. So they can be removed as well:

access-list dmz_in extended permit tcp any host 192.168.105.18 eq ldap 
access-list dmz_in extended permit tcp any host 192.168.105.18 eq ldaps 

Since DMZ hosts are not allowed to access the internet (though I'm unclear as to how this block was accompished!), any updates with yum and redhat's update network have to be done through the squid http proxy on admin, so dmz hosts need access to squid. Note that this is a potential security problem, but at the time I deemed it an acceptable risk:

access-list dmz_in extended permit tcp any host 192.168.105.12 eq 3128 

mail-ext1 needs access to sql server(s). Currently only 192.168.105.19 is in use I think:

access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.18 eq 5432 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.19 eq 5432 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.18 eq 3306 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.19 eq 3306 

Allow www.chem.byu.edu to access information on admin.chem.byu.edu via https (proxying), sql, the web server on the internal mail server (for the purpose of controlling the mailing list, spam stuff, etc). Any references to 192.168.105.18 (sql-old) can be removed. I notice that Garrett has already made some of them inactive, which is a good idea:

access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.12 eq https 
access-list dmz_in extended permit tcp host 192.168.200.57 host 192.168.105.12 eq https inactive 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.18 eq 3306 inactive 
access-list dmz_in remark New SQL
access-list dmz_in extended permit tcp host 192.168.200.57 host 192.168.105.19 eq 3306 
access-list dmz_in remark New SQL
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.19 eq 3306 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.18 eq 5432 inactive 
access-list dmz_in remark New SQL
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.19 eq 5432 
access-list dmz_in remark New SQL
access-list dmz_in extended permit tcp host 192.168.200.57 host 192.168.105.19 eq 5432 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.38 eq www 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.38 eq https 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.38 eq 8080 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.38 eq 8081 

Another obsolete line for www-old, which is dead:

access-list dmz_in extended permit tcp host 192.168.200.50 host 192.168.105.43 eq 8081 

Allow the DMZ hosts to ping anything in or out:

access-list dmz_in extended permit icmp any any

Allow mail-ext1 to reach any internal smtp server, DNS, the auth ident port (113) on any trusted computer:

 
access-list dmz_in extended permit tcp host 192.168.200.10 any eq smtp 
access-list dmz_in extended permit tcp host 192.168.200.10 any eq domain 
access-list dmz_in extended permit tcp host 192.168.200.10 any eq ident 
access-list dmz_in extended permit udp host 192.168.200.10 any eq 113 
access-list dmz_in extended permit udp host 192.168.200.10 any eq domain 

Allow purgatory to ssh, ftp into any BYU machine, on its private or public network. Not sure what port 8500 is:

access-list dmz_in extended permit tcp host 192.168.200.6 128.187.0.0 255.255.0.0 eq ssh 
access-list dmz_in extended permit tcp host 192.168.200.6 128.187.0.0 255.255.0.0 eq ftp 
access-list dmz_in extended permit tcp host 192.168.200.6 128.187.0.0 255.255.0.0 eq 8500 
access-list dmz_in extended permit tcp host 192.168.200.6 10.0.0.0 255.0.0.0 eq ssh 
access-list dmz_in extended permit tcp host 192.168.200.6 10.0.0.0 255.0.0.0 eq ftp 

Allow www.chem.byu.edu to proxy web data from secure.chem.byu.edu:

access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.43 eq www 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.43 eq https 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.43 eq 8080 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.43 eq 8180 

Allow any DMZ host to access LDAP:

access-list dmz_in extended permit tcp any host 192.168.105.12 eq ldap 
access-list dmz_in extended permit tcp any host 192.168.105.12 eq ldaps 

Allow www.chem.byu.edu to ssh into admin. Not sure about this rule. It's possible that the code that generates door cards for faculty requires an ssh connection into admin to run inkscape to generate the pdf:

access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.12 eq ssh 

Allow any dmz host access to ldap at a host that no longer exists. This line can be removed:

access-list dmz_in extended permit tcp any host 192.168.105.45 eq ldap 
access-list dmz_in extended permit tcp any host 192.168.105.45 eq ldaps

Allow any dmz host access to kerberos. However this ip address (an alias for ns1) does not run a kerberos server; it's on admin. So this rule can be removed:

 
access-list dmz_in extended permit udp any host 192.168.105.36 eq 88 

Allow www to access web servers on secure.chem.byu.edu and pchem-server

access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.43 eq 8081 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.43 eq 8009 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.75 eq www 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.43 eq 8010 

Allow DMZ hosts to access backup ldap server, which is on printqueue

access-list dmz_in extended permit tcp any host 192.168.105.13 eq ldap 
access-list dmz_in extended permit tcp any host 192.168.105.13 eq ldaps 

Allow DMZhosts to access LDAP on 101.150, which may have been the old n175-serv file server. In any case, this address is not pinging and I believe that these entries can be removed:

access-list dmz_in extended permit tcp any host 192.168.101.150 eq ldap 
access-list dmz_in extended permit tcp any host 192.168.101.150 eq ldaps 

Allow mail and www to access sql on 192.168.105.90 which is molecule.chem.byu.edu. I don't know anything about this host:

access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.90 eq 5432 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.90 eq 3306 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.90 eq 3306 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.90 eq 5432 

Allow mail-ext1 to access https on secure.chem.byu.edu:

access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.43 eq https 

DMZ allowed to access kerberos and ldap on an obsolete host I think (address is now diskarray3). Should be removed:

access-list dmz_in extended permit udp any host 192.168.105.50 eq 88 
access-list dmz_in extended permit tcp any host 192.168.105.50 eq 88 
access-list dmz_in extended permit tcp any host 192.168.105.50 eq ldap 
access-list dmz_in extended permit tcp any host 192.168.105.50 eq ldaps 

Allows mail-ext1 to access tcp port 2703 on any trusted host… not sure why:

access-list dmz_in extended permit tcp host 192.168.200.10 any eq 2703 

Obsolete entry for www-old and tomcat again:

access-list dmz_in extended permit tcp host 192.168.200.50 host 192.168.105.43 eq 8181 

Allow www.chem.byu.edu to access various web-related ports on secure (for proxying), mail-int (not sure?).

access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.38 eq 8181 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.43 eq 8181 

Allowed www to proxy various things from chemmgmt-server, which is no longer here. Remove:

access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.58 eq www 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.58 eq https 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.58 eq 8080 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.58 eq 8081 

Allow certain hosts to ssh into 192.168.0.0-192.168.127.0.0… No clue why this is in here. I'd say remove:

access-list dmz_in extended permit tcp host 192.168.200.60 192.168.0.0 255.255.128.0 eq ssh 
access-list dmz_in extended permit tcp host 192.168.200.62 192.168.0.0 255.255.128.0 eq ssh 
access-list dmz_in extended permit tcp host 192.168.200.61 192.168.0.0 255.255.128.0 eq ssh 

Remove reference to obsolete host:

access-list dmz_in extended permit tcp any host 192.168.105.54 eq 2222 

Allow mail-ext2 to access SQL (note that 105.18 is sql-old which is now obsolete and can be removed), and also the secure.chem.byu.edu https.

access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.18 eq 5432 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.19 eq 5432 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.18 eq 3306 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.19 eq 3306 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.43 eq https

Allow mail-ext1 to access mail-related ports on mail-int:

 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.38 eq imap4 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.38 eq pop3 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.38 eq 995 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.38 eq 993 

Allow www.chem.byu.edu to access mail-related ports on mail-int. This could be for web-based e-mail apps to work, or just for apps to be able to send e-mail.

access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.38 eq imap4 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.38 eq pop3 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.38 eq 995 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.38 eq 993 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.38 eq smtp

Allow www.chem.byu.edu to ssh into vm3? Might be an obsolete entry from before virtualization:

 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.62 eq ssh 
access-list dmz_in extended permit tcp host 192.168.200.52 any eq domain 
access-list dmz_in extended permit tcp host 192.168.200.57 any eq domain 
access-list dmz_in extended permit udp host 192.168.200.52 any eq domain 
access-list dmz_in extended permit udp host 192.168.200.57 any eq domain 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.38 eq 993 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.38 eq 995 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.38 eq imap4 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.38 eq pop3 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.90 eq 3306 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.90 eq 5432 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.12 eq ssh 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.12 eq ssh 
access-list dmz_in extended permit tcp host 192.168.200.12 any eq 2703 
access-list dmz_in extended permit tcp host 192.168.200.12 any eq domain 
access-list dmz_in extended permit tcp host 192.168.200.12 any eq ident 
access-list dmz_in extended permit tcp host 192.168.200.12 any eq smtp 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.38 eq www 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.38 eq www 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.38 eq https 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.38 eq https 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.56 eq www 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.82 eq pop3 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.82 eq imap4 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.82 eq 993 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.82 eq 995 
access-list dmz_in extended permit tcp host 192.168.200.6 host 192.168.111.26 eq 9100 
access-list dmz_in extended permit tcp host 192.168.200.55 host 192.168.105.12 eq https 
access-list dmz_in extended permit tcp host 192.168.200.55 host 192.168.105.43 eq www 
access-list dmz_in extended permit tcp host 192.168.200.55 host 192.168.105.43 eq https 
access-list dmz_in extended permit tcp host 192.168.200.55 host 192.168.105.43 eq 8080 
access-list dmz_in extended permit tcp host 192.168.200.55 host 192.168.105.43 eq 8180 
access-list dmz_in extended permit tcp host 192.168.200.55 host 192.168.105.18 eq 3306 inactive 
access-list dmz_in extended permit tcp host 192.168.200.55 host 192.168.105.19 eq 3306 
access-list dmz_in extended permit tcp host 192.168.200.55 host 192.168.105.18 eq 5432 inactive 
access-list dmz_in extended permit tcp host 192.168.200.55 host 192.168.105.19 eq 5432 
access-list dmz_in extended permit tcp host 192.168.200.55 host 192.168.105.56 eq www 
access-list dmz_in extended permit tcp host 192.168.200.55 any eq www 
access-list dmz_in extended permit tcp host 192.168.200.55 host 192.168.105.12 eq ssh 
access-list dmz_in extended permit tcp host 192.168.200.52 any eq www 
access-list dmz_in extended permit tcp host 192.168.200.54 host 192.168.105.18 eq 3306 inactive 
access-list dmz_in extended permit tcp host 192.168.200.54 host 192.168.105.19 eq 3306 
access-list dmz_in extended permit udp any host 192.168.105.11 eq domain 
access-list dmz_in extended permit udp any host 192.168.105.65 eq domain 
access-list dmz_in extended permit udp any host 192.168.105.64 eq domain 
access-list dmz_in extended permit udp any host 192.168.105.63 eq domain 
access-list dmz_in extended permit udp any host 192.168.105.62 eq domain 
access-list dmz_in extended permit udp any host 192.168.105.61 eq domain 
access-list dmz_in extended permit udp any host 192.168.105.60 eq domain 
access-list dmz_in extended permit tcp host 192.168.200.13 host 192.168.105.12 eq ssh 
access-list dmz_in extended permit tcp host 192.168.200.13 host 192.168.105.38 eq 993 
access-list dmz_in extended permit tcp host 192.168.200.13 host 192.168.105.38 eq 995 
access-list dmz_in extended permit tcp host 192.168.200.13 host 192.168.105.38 eq imap4 
access-list dmz_in extended permit tcp host 192.168.200.13 host 192.168.105.38 eq pop3 
access-list dmz_in extended permit tcp host 192.168.200.60 host 192.168.105.18 eq 3306 inactive 
access-list dmz_in extended permit tcp host 192.168.200.60 host 192.168.105.19 eq 3306 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.83 eq imap4 
access-list dmz_in extended permit tcp host 192.168.200.10 host 192.168.105.83 eq pop3 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.83 eq imap4 
access-list dmz_in extended permit tcp host 192.168.200.12 host 192.168.105.83 eq pop3 
access-list dmz_in extended permit tcp any host 192.168.105.12 eq 88 
access-list dmz_in extended permit udp any host 192.168.105.12 eq 88 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.12 eq 8877 
access-list dmz_in extended permit tcp host 192.168.200.52 host 192.168.105.12 eq 8878 
access-list dmz_in extended permit tcp host 192.168.200.57 host 192.168.105.12 eq 8877 
access-list dmz_in extended permit tcp host 192.168.200.57 host 192.168.105.12 eq 8878 
access-list dmz_in extended permit tcp host 192.168.200.61 host 192.168.105.18 eq 3306 inactive 
access-list dmz_in extended permit tcp host 192.168.200.61 host 192.168.105.19 eq 3306 
access-list dmz_in extended permit tcp any host 192.168.105.85 eq ssh 
access-list dmz_in remark Rules for "archiver," a server for a graduate student in Dr. Prince's lab.
access-list dmz_in extended permit tcp host 192.168.200.56 any eq www 
access-list dmz_in remark Rules for "archiver," a server for a graduate student in Dr. Prince's lab.
access-list dmz_in extended permit tcp host 192.168.200.56 any eq https 
access-list dmz_in extended permit tcp host 192.168.200.57 any eq www 
access-list dmz_in extended permit tcp host 192.168.200.57 any eq https 
access-list inside_in extended permit icmp any any 
access-list inside_in extended permit ip any any 
access-list outside_in remark Block access From C&C Server
access-list outside_in extended deny ip host 208.73.210.29 any 
access-list outside_in remark Block access to a Trojan.VBCrypt's C&C server.
access-list outside_in extended deny ip host 50.17.199.47 any 
access-list outside_in remark Block access to a Trojan.Refroso's C&C server.
access-list outside_in extended deny ip host 121.14.231.53 any 
access-list outside_in remark Block access to a Trojan.Refroso's C&C server.
access-list outside_in extended deny ip host 121.14.231.54 any 
access-list outside_in remark Block access to a Trojan.Refroso's C&C server.
access-list outside_in extended deny ip host 121.14.231.55 any 
access-list outside_in remark Block access to a Trojan.Refroso's C&C server.
access-list outside_in extended deny ip host 121.14.231.72 any 
access-list outside_in remark Block access to a Trojan.Refroso's C&C server.
access-list outside_in extended deny object-group TCPUDP host 121.14.231.53 any 
access-list outside_in remark Block access to a Trojan.Refroso's C&C server.
access-list outside_in extended deny object-group TCPUDP host 121.14.231.54 any 
access-list outside_in remark Block access to a Trojan.Refroso's C&C server.
access-list outside_in extended deny object-group TCPUDP host 121.14.231.55 any 
access-list outside_in remark Block access to a Trojan.Refroso's C&C server.
access-list outside_in extended deny object-group TCPUDP host 121.14.231.72 any 
access-list outside_in remark Pass through for Life Sciences' webcam.
access-list outside_in extended permit tcp host 128.187.102.173 host 128.187.3.50 eq 8080 
access-list outside_in remark Pass through for Life Sciences' webcam.
access-list outside_in extended permit tcp host 128.187.102.173 host 128.187.3.50 eq 8888 
access-list outside_in remark Pass through from Garrett's home machine to Life Sciences' webcam.
access-list outside_in extended permit tcp host 69.169.159.33 host 128.187.3.50 eq 8080 
access-list outside_in remark Pass through from Garrett's home machine to Life Sciences' webcam.
access-list outside_in extended permit tcp host 69.169.159.33 host 128.187.3.50 eq 8888 
access-list outside_in extended permit tcp any host 128.187.3.6 eq ftp 
access-list outside_in extended permit tcp any host 128.187.3.6 eq ssh 
access-list outside_in extended permit tcp any host 128.187.3.6 eq telnet 
access-list outside_in extended permit tcp any host 128.187.3.5 eq smtp 
access-list outside_in extended permit tcp any host 128.187.3.5 eq domain 
access-list outside_in extended permit tcp any host 128.187.3.5 eq www 
access-list outside_in extended permit tcp any host 128.187.3.5 eq pop3 
access-list outside_in extended permit tcp any host 128.187.3.5 eq imap4 
access-list outside_in extended permit tcp any host 128.187.3.5 eq 993 
access-list outside_in extended permit tcp any host 128.187.3.5 eq 995 
access-list outside_in extended permit udp any host 128.187.3.5 eq domain 
access-list outside_in extended permit tcp any host 128.187.3.7 eq www 
access-list outside_in extended permit tcp any host 128.187.3.7 eq https 
access-list outside_in extended permit tcp any host 128.187.3.7 eq 8080 
access-list outside_in extended permit tcp any host 128.187.3.9 eq www 
access-list outside_in extended permit tcp any host 128.187.3.9 eq https 
access-list outside_in extended permit tcp any host 128.187.3.9 eq 8080 
access-list outside_in extended permit tcp any host 128.187.3.10 eq www 
access-list outside_in extended permit tcp any host 128.187.3.10 eq 8080 
access-list outside_in extended permit tcp any host 128.187.3.10 eq https 
access-list outside_in extended permit tcp any host 128.187.3.11 eq www 
access-list outside_in extended permit tcp any host 128.187.3.11 eq 8080 
access-list outside_in extended permit tcp any host 128.187.3.11 eq https 
access-list outside_in extended permit tcp any host 128.187.3.12 eq www 
access-list outside_in extended permit tcp any host 128.187.3.12 eq 8080 
access-list outside_in extended permit tcp any host 128.187.3.12 eq https 
access-list outside_in extended permit tcp any host 128.187.3.8 eq www 
access-list outside_in extended permit tcp any host 128.187.3.8 eq https 
access-list outside_in extended permit icmp any host 128.187.3.6 
access-list outside_in extended permit icmp any host 128.187.3.5 
access-list outside_in extended permit icmp any host 128.187.3.7 
access-list outside_in extended permit icmp any host 128.187.3.8 
access-list outside_in extended permit icmp any host 128.187.3.9 
access-list outside_in extended permit icmp any host 128.187.3.10 
access-list outside_in extended permit icmp any host 128.187.3.11 
access-list outside_in extended permit icmp any host 128.187.3.12 
access-list outside_in extended permit icmp any host 128.187.3.13 
access-list outside_in extended permit icmp any any echo-reply 
access-list outside_in extended permit tcp any host 128.187.3.5 eq https 
access-list outside_in extended permit tcp any host 128.187.3.5 eq 465 
access-list outside_in extended permit icmp any host 128.187.3.14 
access-list outside_in extended permit tcp any host 128.187.3.14 eq www 
access-list outside_in extended permit tcp any host 128.187.3.14 eq ssh 
access-list outside_in extended permit icmp any host 128.187.3.4 
access-list outside_in extended permit tcp any host 128.187.3.4 eq 9999 
access-list outside_in extended permit tcp any host 128.187.3.14 eq 3389 
access-list outside_in extended permit icmp any any 
access-list outside_in extended permit tcp any host 128.187.3.9 eq smtp 
access-list outside_in extended permit tcp any host 128.187.3.9 eq 8181 
access-list outside_in extended permit tcp any host 128.187.3.4 eq 9002 
access-list outside_in extended permit tcp any host 128.187.3.4 eq 9003 
access-list outside_in extended permit tcp any host 128.187.3.4 eq 9005 
access-list outside_in extended permit tcp any host 128.187.3.9 eq pop3 
access-list outside_in extended permit tcp any host 128.187.3.9 eq imap4 
access-list outside_in extended permit tcp any host 128.187.3.9 eq 993 
access-list outside_in extended permit tcp any host 128.187.3.9 eq 995 
access-list outside_in extended permit tcp any host 128.187.3.15 eq 465 
access-list outside_in extended permit tcp any host 128.187.3.15 eq 993 
access-list outside_in extended permit tcp any host 128.187.3.15 eq 995 
access-list outside_in extended permit tcp any host 128.187.3.15 eq domain 
access-list outside_in extended permit tcp any host 128.187.3.15 eq imap4 
access-list outside_in extended permit tcp any host 128.187.3.15 eq pop3 
access-list outside_in extended permit tcp any host 128.187.3.15 eq smtp 
access-list outside_in extended permit tcp any host 128.187.3.15 eq www 
access-list outside_in extended permit tcp any host 128.187.3.15 eq https 
access-list outside_in extended permit udp any host 128.187.3.15 eq domain 
access-list outside_in extended permit ip any object-group MULTICAST_GROUPS 
access-list outside_in extended permit tcp any host 128.187.3.6 eq 5500 
access-list outside_in remark Xirrus Wireless Access Point to Radius Server
access-list outside_in extended permit udp host 10.3.92.253 host 128.187.3.5 eq 1812 
access-list outside_in remark Xirrus Wireless Access Point to Radius Server
access-list outside_in extended permit udp host 10.3.92.253 host 128.187.3.5 eq 1813 
access-list outside_in remark Xirrus Wireless Access Point to Radius Server
access-list outside_in extended permit udp host 10.3.92.253 host 128.187.3.15 eq 1812 
access-list outside_in remark Xirrus Wireless Access Point to Radius Server
access-list outside_in extended permit udp host 10.3.92.253 host 128.187.3.15 eq 1813 
access-list outside_in extended permit udp host 10.23.7.18 host 128.187.3.5 eq 1812 
access-list outside_in extended permit udp host 10.23.7.18 host 128.187.3.15 eq 1812 
access-list outside_in extended permit udp host 10.23.7.19 host 128.187.3.5 eq 1812 
access-list outside_in extended permit udp host 10.23.7.19 host 128.187.3.15 eq 1812 
access-list outside_in extended permit udp host 10.23.7.20 host 128.187.3.5 eq 1812 
access-list outside_in extended permit udp host 10.23.7.20 host 128.187.3.15 eq 1812 
access-list outside_in extended permit udp host 10.23.7.21 host 128.187.3.5 eq 1812 
access-list outside_in extended permit udp host 10.23.7.21 host 128.187.3.15 eq 1812 
access-list outside_in extended permit udp host 10.23.8.2 host 128.187.3.5 eq 1812 
access-list outside_in extended permit udp host 10.23.8.2 host 128.187.3.5 eq 1813 
access-list outside_in extended permit udp host 10.23.8.2 host 128.187.3.15 eq 1812 
access-list outside_in extended permit udp host 10.23.8.2 host 128.187.3.15 eq 1813 
access-list outside_in extended permit udp host 10.23.8.251 host 128.187.3.5 eq 1812 
access-list outside_in extended permit udp host 10.23.8.251 host 128.187.3.5 eq 1813 
access-list outside_in extended permit udp host 10.23.8.251 host 128.187.3.15 eq 1812 
access-list outside_in extended permit udp host 10.23.8.251 host 128.187.3.15 eq 1813 
access-list outside_in extended permit tcp 128.187.0.0 255.255.0.0 host 128.187.3.12 eq ssh 
access-list outside_in extended permit tcp 10.0.0.0 255.0.0.0 host 128.187.3.12 eq ssh 
access-list outside_in extended permit tcp any host 128.187.3.5 eq 3210 
access-list outside_in extended permit tcp any host 128.187.3.15 eq 3210 
access-list outside_in extended permit tcp any host 128.187.3.9 eq 1443 
access-list outside_in extended permit tcp any host 128.187.3.5 eq 587 
access-list outside_in extended permit tcp any host 128.187.3.115 eq 587 
access-list VPN-BYU-NETS-SPLIT extended permit ip 192.168.100.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list VPN-BYU-NETS-SPLIT extended permit ip 192.168.101.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list VPN-BYU-NETS-SPLIT extended permit ip 192.168.102.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list VPN-BYU-NETS-SPLIT extended permit ip 192.168.103.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list VPN-BYU-NETS-SPLIT extended permit ip 192.168.104.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list VPN-BYU-NETS-SPLIT extended permit ip 192.168.105.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list VPN-BYU-NETS-SPLIT extended permit ip 192.168.200.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list VPN-BYU-NETS-SPLIT extended permit ip 10.8.0.0 255.255.0.0 192.168.108.0 255.255.255.0 
access-list VPN-BYU-NETS-SPLIT extended permit ip 10.0.0.0 255.0.0.0 192.168.108.0 255.255.255.0 
access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list NO-NAT extended permit ip 192.168.101.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list NO-NAT extended permit ip 192.168.102.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list NO-NAT extended permit ip 192.168.103.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list NO-NAT extended permit ip 192.168.104.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list NO-NAT extended permit ip 192.168.105.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list NO-NAT extended permit ip 192.168.200.0 255.255.255.0 192.168.108.0 255.255.255.0 
access-list NO-NAT extended permit ip 10.8.0.0 255.255.0.0 192.168.108.0 255.255.255.0 
access-list NO-NAT extended permit ip 10.0.0.0 255.0.0.0 192.168.108.0 255.255.255.0 
access-list inside_access_in remark Posible compromised machine registered to Daniel Austin.
access-list inside_access_in extended deny ip host 192.168.102.81 any 
access-list inside_access_in remark Block access to C&C Server
access-list inside_access_in extended deny ip any host 208.73.210.29 
access-list inside_access_in remark Block access to a Trojan.VBCrypt's C&C server.
access-list inside_access_in extended deny ip any host 50.17.199.47 
access-list inside_access_in remark Block access to a Trojan.Refroso's C&C server.
access-list inside_access_in extended deny ip any host 121.14.231.53 
access-list inside_access_in remark Block access to a Trojan.Refroso's C&C server.
access-list inside_access_in extended deny ip any host 121.14.231.54 
access-list inside_access_in remark Block access to a Trojan.Refroso's C&C server.
access-list inside_access_in extended deny ip any host 121.14.231.55 
access-list inside_access_in remark Block access to a Trojan.Refroso's C&C server.
access-list inside_access_in extended deny ip any host 121.14.231.72 
access-list inside_access_in remark Block access to a Trojan.Refroso's C&C server.
access-list inside_access_in extended deny object-group TCPUDP any host 121.14.231.53 
access-list inside_access_in remark Block access to a Trojan.Refroso's C&C server.
access-list inside_access_in extended deny object-group TCPUDP any host 121.14.231.54 
access-list inside_access_in remark Block access to a Trojan.Refroso's C&C server.
access-list inside_access_in extended deny object-group TCPUDP any host 121.14.231.55 
access-list inside_access_in remark Block access to a Trojan.Refroso's C&C server.
access-list inside_access_in extended deny object-group TCPUDP any host 121.14.231.72 
access-list inside_access_in remark Allow CSR access to software.byu.edu.
access-list inside_access_in extended permit ip 192.168.105.0 255.255.255.0 host 128.187.16.167 inactive 
access-list inside_access_in remark Deny access to software.byu.edu.
access-list inside_access_in extended deny ip any host 128.187.16.167 inactive 
access-list inside_access_in extended permit ip any host 128.187.16.167 
access-list inside_access_in extended permit ip any 192.168.200.0 255.255.255.0 
access-list inside_access_in extended permit tcp any 192.168.200.0 255.255.255.0 eq ssh inactive 
access-list inside_access_in extended permit tcp any 192.168.200.0 255.255.255.0 eq www inactive 
access-list inside_access_in extended permit tcp any 192.168.200.0 255.255.255.0 eq https inactive 
access-list inside_access_in extended permit tcp any 128.187.0.0 255.255.0.0 eq hostname inactive 
access-list inside_access_in extended permit tcp host 192.168.105.10 10.8.0.0 255.255.0.0 inactive 
access-list inside_access_in extended permit ip any any 
access-list public_access_in extended permit object-group TCPUDP any any eq www 
access-list public_access_in extended permit tcp any any eq https 
pager lines 24
logging enable
logging timestamp
logging buffer-size 40960
logging monitor informational
logging buffered informational
logging history informational
logging asdm informational
logging host inside 192.168.105.12
mtu outside 1500
mtu inside 1500
mtu dmz 1500
ip local pool VPN-POOL 192.168.108.1-192.168.108.254
failover
failover lan unit primary
failover lan interface FAIL Management0/0
failover link FAIL Management0/0
failover interface ip FAIL 192.168.254.1 255.255.255.0 standby 192.168.254.2
icmp unreachable rate-limit 1 burst-size 1
icmp permit any outside
icmp permit any inside
icmp permit any dmz
asdm image disk0:/asdm-633.bin
no asdm history enable
arp timeout 14400
global (outside) 1 128.187.3.17-128.187.3.29
global (outside) 1 128.187.3.30
nat (outside) 0 access-list NO-NAT
nat (outside) 1 192.168.108.0 255.255.255.0
nat (inside) 0 access-list NO-NAT
nat (inside) 1 192.168.0.0 255.255.128.0
nat (dmz) 0 access-list NO-NAT
static (dmz,outside) 128.187.3.5 192.168.200.10 netmask 255.255.255.255 
static (dmz,outside) 128.187.3.4 192.168.200.100 netmask 255.255.255.255 
static (dmz,outside) 128.187.3.6 192.168.200.6 netmask 255.255.255.255 
static (dmz,outside) 128.187.3.8 192.168.200.51 netmask 255.255.255.255 
static (dmz,outside) 128.187.3.9 192.168.200.52 netmask 255.255.255.255 
static (dmz,outside) 128.187.3.10 192.168.200.53 netmask 255.255.255.255 
static (dmz,outside) 128.187.3.11 192.168.200.54 netmask 255.255.255.255 
static (dmz,outside) 128.187.3.12 192.168.200.55 netmask 255.255.255.255 
static (dmz,outside) 128.187.3.13 192.168.200.56 netmask 255.255.255.255 
static (inside,dmz) 192.168.105.0 192.168.105.0 netmask 255.255.255.0 
static (inside,dmz) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 
static (inside,dmz) 192.168.101.0 192.168.101.0 netmask 255.255.255.0 
static (inside,dmz) 192.168.102.0 192.168.102.0 netmask 255.255.255.0 
static (inside,dmz) 192.168.103.0 192.168.103.0 netmask 255.255.255.0 
static (inside,dmz) 192.168.104.0 192.168.104.0 netmask 255.255.255.0 
static (inside,dmz) 192.168.4.0 192.168.4.0 netmask 255.255.252.0 
static (inside,dmz) 192.168.122.0 192.168.122.0 netmask 255.255.255.0 
static (inside,dmz) 192.168.111.0 192.168.111.0 netmask 255.255.255.0 
static (inside,outside) 128.187.3.50 192.168.102.26 netmask 255.255.255.255 
static (dmz,outside) 128.187.3.14 192.168.200.57 netmask 255.255.255.255 
static (dmz,outside) 128.187.3.15 192.168.200.12 netmask 255.255.255.255 
access-group outside_in in interface outside
access-group inside_access_in in interface inside
access-group dmz_in in interface dmz
route outside 0.0.0.0 0.0.0.0 128.187.3.1 1
route inside 192.168.4.0 255.255.252.0 192.168.106.1 1
route inside 192.168.100.0 255.255.255.0 192.168.106.1 1
route inside 192.168.101.0 255.255.255.0 192.168.106.1 1
route inside 192.168.102.0 255.255.255.0 192.168.106.1 1
route inside 192.168.103.0 255.255.255.0 192.168.106.1 1
route inside 192.168.104.0 255.255.255.0 192.168.106.1 1
route inside 192.168.105.0 255.255.255.0 192.168.106.1 1
route inside 192.168.111.0 255.255.255.0 192.168.106.1 1
route inside 192.168.122.0 255.255.255.0 192.168.106.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server RADIUS-VPN protocol radius
aaa-server RADIUS-VPN (inside) host 192.168.105.12
 key chemistry
 authentication-port 1812
 accounting-port 1813
aaa authentication ssh console LOCAL 
aaa authentication enable console LOCAL 
aaa authentication telnet console LOCAL 
aaa authentication http console LOCAL 
aaa authentication serial console LOCAL 
aaa authentication secure-http-client
http server enable
http 192.168.106.0 255.255.255.0 inside
http 192.168.105.0 255.255.255.0 inside
http 174.52.36.203 255.255.255.255 outside
http redirect outside 80
snmp-server host inside 192.168.105.12 community chemistry
snmp-server location ServerRoom
snmp-server contact Chemistry CSRs
snmp-server community chemistry
snmp-server enable traps snmp authentication linkup linkdown coldstart
service resetoutside
crypto ipsec transform-set ESP-AES-SHA esp-aes esp-sha-hmac 
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac 
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map DYN-VPN-MAP 100 set transform-set ESP-AES-256-SHA ESP-AES-SHA ESP-3DES-SHA
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto ca trustpoint firewall_internal_digicert
 keypair firewall_internal_digicert
 no client-types
 crl configure
crypto ca trustpoint chemca
 enrollment terminal
 crl configure
crypto ca trustpoint testing
 subject-name CN=vpn.chem.byu.edu
 keypair testing
 crl configure
crypto ca trustpoint chemca_vpncert
 enrollment terminal
 subject-name CN=vpn.chem.byu.edu
 crl configure
crypto ca trustpoint DigiCertCA
 enrollment terminal
 crl configure
crypto ca trustpoint DigiCertCA-RGTest
 enrollment terminal
 no client-types
 crl configure
crypto ca trustpoint DigiCertCA2-RGTest
 enrollment terminal
 crl configure
crypto ca certificate chain firewall_internal_digicert
 certificate 0ea54a4ad3a54290a6ed9e79fc5e6697
    30820728 30820610 a0030201 0202100e a54a4ad3 a54290a6 ed9e79fc 5e669730 
    0d06092a 864886f7 0d010105 05003066 310b3009 06035504 06130255 53311530 
    13060355 040a130c 44696769 43657274 20496e63 31193017 06035504 0b131077 
    77772e64 69676963 6572742e 636f6d31 25302306 03550403 131c4469 67694365 
    72742048 69676820 41737375 72616e63 65204341 2d33301e 170d3130 31313039 
    30303030 30305a17 0d313331 31313232 33353935 395a3081 94310b30 09060355 
    04061302 5553310d 300b0603 55040813 04557461 68310e30 0c060355 04071305 
    50726f76 6f312130 1f060355 040a1318 42726967 68616d20 596f756e 6720556e 
    69766572 73697479 31233021 06035504 0b131a43 68656d69 73747279 20616e64 
    2042696f 6368656d 69737472 79311e30 1c060355 04031315 66697265 77616c6c 
    2e636865 6d2e6279 752e6564 75308201 22300d06 092a8648 86f70d01 01010500 
    0382010f 00308201 0a028201 0100aef1 20597d4f c3770e17 4d237999 09e88dec 
    696d03b4 e04e8599 c989ee09 dc51ced4 23631a49 fb3bed0b 5f594dcf 335be7f8 
    701a653f 033efba4 d84e308b 64cd1b6c 87cb0f98 d923786f 95dc9493 f8c31259 
    b3536e25 fbc0fc6f 1fdf2b51 849882ba 7ac67df8 3ad4ff63 cc46d218 19df7f7c 
    631d5e03 eb6e29bc 1d005aba 7d743521 0f6d97fa 576daffa 807ba925 997cc8e0 
    bf9e0c07 940819eb a5c7ed25 c7186243 1aaaa3e2 8b573fdb 3db615e5 0a472f7b 
    d15642b4 60b149bb 90969e49 d3e4a7e6 0ac745b6 e562812f e7220a31 849e6043 
    f61e328c 01364f9a 455c2605 44bd162f 6d8864e7 e91e18e3 c0b0b94b c99eb425 
    d7ca6cbb 0f992097 05825e40 7c830203 010001a3 8203a130 82039d30 1f060355 
    1d230418 30168014 50ea7389 db29fb10 8f9ee501 20d4de79 994883f7 301d0603 
    551d0e04 160414bc 47e4024f 223285e3 31c3c312 54ae4dae 93b17e30 70060355 
    1d110469 30678215 66697265 77616c6c 2e636865 6d2e6279 752e6564 75820866 
    69726577 616c6c82 16666972 6577616c 6c312e63 68656d2e 6279752e 65647582 
    16666972 6577616c 6c322e63 68656d2e 6279752e 65647582 09666972 6577616c 
    6c318209 66697265 77616c6c 32307b06 082b0601 05050701 01046f30 6d302406 
    082b0601 05050730 01861868 7474703a 2f2f6f63 73702e64 69676963 6572742e 
    636f6d30 4506082b 06010505 07300286 39687474 703a2f2f 63616365 7274732e 
    64696769 63657274 2e636f6d 2f446967 69436572 74486967 68417373 7572616e 
    63654341 2d332e63 7274300e 0603551d 0f0101ff 04040302 05a0300c 0603551d 
    130101ff 04023000 30650603 551d1f04 5e305c30 2ca02aa0 28862668 7474703a 
    2f2f6372 6c332e64 69676963 6572742e 636f6d2f 6361332d 32303130 682e6372 
    6c302ca0 2aa02886 26687474 703a2f2f 63726c34 2e646967 69636572 742e636f 
    6d2f6361 332d3230 3130682e 63726c30 8201c606 03551d20 048201bd 308201b9 
    308201b5 060b6086 480186fd 6c010300 01308201 a4303a06 082b0601 05050702 
    01162e68 7474703a 2f2f7777 772e6469 67696365 72742e63 6f6d2f73 736c2d63 
    70732d72 65706f73 69746f72 792e6874 6d308201 6406082b 06010505 07020230 
    8201561e 82015200 41006e00 79002000 75007300 65002000 6f006600 20007400 
    68006900 73002000 43006500 72007400 69006600 69006300 61007400 65002000 
    63006f00 6e007300 74006900 74007500 74006500 73002000 61006300 63006500 
    70007400 61006e00 63006500 20006f00 66002000 74006800 65002000 44006900 
    67006900 43006500 72007400 20004300 50002f00 43005000 53002000 61006e00 
    64002000 74006800 65002000 52006500 6c007900 69006e00 67002000 50006100 
    72007400 79002000 41006700 72006500 65006d00 65006e00 74002000 77006800 
    69006300 68002000 6c006900 6d006900 74002000 6c006900 61006200 69006c00 
    69007400 79002000 61006e00 64002000 61007200 65002000 69006e00 63006f00 
    72007000 6f007200 61007400 65006400 20006800 65007200 65006900 6e002000 
    62007900 20007200 65006600 65007200 65006e00 63006500 2e301d06 03551d25 
    04163014 06082b06 01050507 03010608 2b060105 05070302 300d0609 2a864886 
    f70d0101 05050003 82010100 921cfbb6 825c8bbd 076e1652 7055d013 99dd54db 
    0e304aa7 e08711b7 9c807a22 5771baaf 71d1b1e1 52293baf f09d5142 1fbd2f48 
    b50dfd1f 9bd1e87a 6c8288d9 70c05500 91ce4740 6a64ea03 275a1d28 da8f6a35 
    8aa4f611 0b58b672 6017a9fa a17d529d b5f78a52 c5d2b85f c690feac 5adba33e 
    563f9adb 67c65797 4c578971 57218346 aa6a5cca ad7bf24e cb2a03a0 2404c1af 
    0c78e788 62236d24 f9dbeb96 8661874d 7b644ffa 9b6a5fbf 6b2b2f5c 7e7c2874 
    fb0ad034 23ae894f c60d8d4f 1950d24a d96ca6f2 db665944 56b58731 3972caf9 
    0fd420bb e0551390 85249d96 735e621f 49db6732 0fe91245 43530532 c0ee38d0 
    f69a527b 0df15265 59b47813
  quit
 certificate ca 0851f959814145cabde024e212c9c20e
    30820655 3082053d a0030201 02021008 51f95981 4145cabd e024e212 c9c20e30 
    0d06092a 864886f7 0d010105 0500306c 310b3009 06035504 06130255 53311530 
    13060355 040a130c 44696769 43657274 20496e63 31193017 06035504 0b131077 
    77772e64 69676963 6572742e 636f6d31 2b302906 03550403 13224469 67694365 
    72742048 69676820 41737375 72616e63 65204556 20526f6f 74204341 301e170d 
    30373034 30333030 30303030 5a170d32 32303430 33303030 3030305a 3066310b 
    30090603 55040613 02555331 15301306 0355040a 130c4469 67694365 72742049 
    6e633119 30170603 55040b13 10777777 2e646967 69636572 742e636f 6d312530 
    23060355 0403131c 44696769 43657274 20486967 68204173 73757261 6e636520 
    43412d33 30820122 300d0609 2a864886 f70d0101 01050003 82010f00 3082010a 
    02820101 00bf610a 29101f5e fe343751 08f81efb 22ed61be 0b0d704c 50632675 
    15b94188 97b6f0a0 15bb0860 e042e805 29108736 8a2865a8 ef310774 6d36972f 
    28466604 c72a7926 7a99d58e c36d4fa0 5eadbc3d 91c2597b 5e366cc0 53cf0008 
    323e1064 58101369 c70cee9c 425100f9 0544ee24 ce7a1fed 8c11bd12 a8f315f4 
    1c7a3169 011ba7e6 5dc09a6c 7e099ee7 52444a10 3a23e49b b603afa8 9cb45b9f 
    d44bad92 8cceb511 2aaa3718 8db4c2b8 d85c068c f8ff23bd 355ed47c 3e7e830e 
    91960598 c3b21fe3 c865eba9 7b5da02c ccfc3cd9 6dedccfa 4b438cc9 d4b8a561 
    1cb240b6 2812dfb9 f85ffed3 b2c9ef3d b41e4b7c 1c4c9936 9e3debec a7685e1d 
    df676e5e fb020301 0001a382 02f73082 02f3300e 0603551d 0f0101ff 04040302 
    01863082 01c60603 551d2004 8201bd30 8201b930 8201b506 0b608648 0186fd6c 
    01030002 308201a4 303a0608 2b060105 05070201 162e6874 74703a2f 2f777777 
    2e646967 69636572 742e636f 6d2f7373 6c2d6370 732d7265 706f7369 746f7279 
    2e68746d 30820164 06082b06 01050507 02023082 01561e82 01520041 006e0079 
    00200075 00730065 0020006f 00660020 00740068 00690073 00200043 00650072 
    00740069 00660069 00630061 00740065 00200063 006f006e 00730074 00690074 
    00750074 00650073 00200061 00630063 00650070 00740061 006e0063 00650020 
    006f0066 00200074 00680065 00200044 00690067 00690043 00650072 00740020 
    00430050 002f0043 00500053 00200061 006e0064 00200074 00680065 00200052 
    0065006c 00790069 006e0067 00200050 00610072 00740079 00200041 00670072 
    00650065 006d0065 006e0074 00200077 00680069 00630068 0020006c 0069006d 
    00690074 0020006c 00690061 00620069 006c0069 00740079 00200061 006e0064 
    00200061 00720065 00200069 006e0063 006f0072 0070006f 00720061 00740065 
    00640020 00680065 00720065 0069006e 00200062 00790020 00720065 00660065 
    00720065 006e0063 0065002e 300f0603 551d1301 01ff0405 30030101 ff303406 
    082b0601 05050701 01042830 26302406 082b0601 05050730 01861868 7474703a 
    2f2f6f63 73702e64 69676963 6572742e 636f6d30 818f0603 551d1f04 81873081 
    843040a0 3ea03c86 3a687474 703a2f2f 63726c33 2e646967 69636572 742e636f 
    6d2f4469 67694365 72744869 67684173 73757261 6e636545 56526f6f 7443412e 
    63726c30 40a03ea0 3c863a68 7474703a 2f2f6372 6c342e64 69676963 6572742e 
    636f6d2f 44696769 43657274 48696768 41737375 72616e63 65455652 6f6f7443 
    412e6372 6c301f06 03551d23 04183016 8014b13e c36903f8 bf4701d4 98261a08 
    02ef6364 2bc3301d 0603551d 0e041604 1450ea73 89db29fb 108f9ee5 0120d4de 
    79994883 f7300d06 092a8648 86f70d01 01050500 03820101 005d4f84 f1a888d3 
    a3b2bc9c 6de52949 77e1e7d6 dca9d835 aec971dc e5dbdc9d 242190a6 cfb7011c 
    9bd45797 91d77516 a512d7b9 3d2e893d 39698ad6 3537f9f1 21c45b40 ad59a92f 
    5f3a0029 43277103 e4bd3032 55a6fe84 0e0b9b38 192c437c ac43bf75 31e5231c 
    4555b769 0891b5cf d7d5b15e ee9f94e4 d67ab918 c3b8d652 631c10ba 8b2f6d5d 
    cc0538f4 56056def 9eece861 360c144b 85145a0c 834f225c 59cb8c8a 71dafac5 
    108458cf 07eee390 c2f5f929 c75a2371 f959b464 2b88b0a7 36c79a20 61ebfa4e 
    b5ae6b1b e4e3ece2 d93c4149 a820a454 f5928dbb c0552004 a6d8b017 16cce3d0 
    c8b43de5 d984c6d3 f66e6d78 c97943e8 7a37ff5c 3549bfa1 c5
  quit
crypto ca certificate chain chemca
 certificate ca 01
    30820514 3082047d a0030201 02020101 300d0609 2a864886 f70d0101 04050030 
    819d3128 30260603 55040313 1f436865 6d697374 72792043 65727469 66696361 
    74652041 7574686f 72697479 310b3009 06035504 06130255 53310e30 0c060355 
    04071305 50726f76 6f310d30 0b060355 04081304 55746168 31233021 06035504 
    0a131a43 68656d69 73747279 20616e64 2042696f 6368656d 69737472 79312030 
    1e06092a 864886f7 0d010901 16116373 72734063 68656d2e 6279752e 65647530 
    1e170d30 34303531 30313535 3831325a 170d3234 31323331 31353538 31325a30 
    819d3128 30260603 55040313 1f436865 6d697374 72792043 65727469 66696361 
    74652041 7574686f 72697479 310b3009 06035504 06130255 53310e30 0c060355 
    04071305 50726f76 6f310d30 0b060355 04081304 55746168 31233021 06035504 
    0a131a43 68656d69 73747279 20616e64 2042696f 6368656d 69737472 79312030 
    1e06092a 864886f7 0d010901 16116373 72734063 68656d2e 6279752e 65647530 
    819f300d 06092a86 4886f70d 01010105 0003818d 00308189 02818100 e08be81b 
    38d08b25 81bb3798 f6fb7a43 2dd5f173 8930d721 50220eb3 c758806e 83cd1f2d 
    324cb7b4 37de1959 999fd3ef 7affc138 0d660909 0b54d9a9 caa24445 e4023fa5 
    17e50a49 a13f6c99 9893c952 200fc984 f87b4c2a e335ceeb 1beb6066 f3b2fec4 
    c4639d19 e7e9a177 d32903fa 3cc4afd4 d04c5057 6773de60 8375e2e3 02030100 
    01a38202 60308202 5c300f06 03551d13 0101ff04 05300301 01ff301d 0603551d 
    0e041604 14f092d2 07b68654 c7ae189f c61303b0 37f25786 943081ca 0603551d 
    230481c2 3081bf80 14f092d2 07b68654 c7ae189f c61303b0 37f25786 94a181a3 
    a481a030 819d3128 30260603 55040313 1f436865 6d697374 72792043 65727469 
    66696361 74652041 7574686f 72697479 310b3009 06035504 06130255 53310e30 
    0c060355 04071305 50726f76 6f310d30 0b060355 04081304 55746168 31233021 
    06035504 0a131a43 68656d69 73747279 20616e64 2042696f 6368656d 69737472 
    79312030 1e06092a 864886f7 0d010901 16116373 72734063 68656d2e 6279752e 
    65647582 0101300b 0603551d 0f040403 02010630 11060960 86480186 f8420101 
    04040302 00073025 06096086 480186f8 42010204 18161668 7474703a 2f2f6361 
    2e636865 6d2e6279 752e6564 75303006 09608648 0186f842 01030423 16216874 
    74703a2f 2f63612e 6368656d 2e627975 2e656475 2f726576 6f636174 696f6e30 
    32060960 86480186 f8420104 04251623 68747470 3a2f2f63 612e6368 656d2e62 
    79752e65 64752f63 61726576 6f636174 696f6e30 31060960 86480186 f8420107 
    04241622 68747470 3a2f2f63 612e6368 656d2e62 79752e65 64752f63 65727472 
    656e6577 616c302e 06096086 480186f8 42010804 21161f68 7474703a 2f2f6361 
    2e636865 6d2e6279 752e6564 752f6361 706f6c69 6379302d 06096086 480186f8 
    42010c04 20161e68 74747073 3a2f2f73 65637572 652e6368 656d2e62 79752e65 
    64752f63 61301e06 09608648 0186f842 010d0411 160f7863 61206365 72746966 
    69636174 65300d06 092a8648 86f70d01 01040500 03818100 850c5176 067535c6 
    0b3b8562 a82bc5d4 807570d5 b50779d4 cdf28fd0 8addbe19 5594fc69 ac404dc6 
    21f72bd2 8048f2bc ed1bde18 cbfaa540 f33485cb c126de7c 5ac5b9b4 a5678c28 
    59581257 e9aff988 02859ad3 02920804 5d49adae c628b017 58a1c9ec b4b27b41 
    19c19230 1a666cb0 ae44f332 727a4df4 6fe8f683 d6696e64
  quit
crypto ca certificate chain testing
 certificate 0bbc6aa187164900bce4d1c645c3331a
    308206a8 30820590 a0030201 0202100b bc6aa187 164900bc e4d1c645 c3331a30 
    0d06092a 864886f7 0d010105 05003066 310b3009 06035504 06130255 53311530 
    13060355 040a130c 44696769 43657274 20496e63 31193017 06035504 0b131077 
    77772e64 69676963 6572742e 636f6d31 25302306 03550403 131c4469 67694365 
    72742048 69676820 41737375 72616e63 65204341 2d33301e 170d3130 31313035 
    30303030 30305a17 0d313331 31313232 33353935 395a306a 310b3009 06035504 
    06130275 73310d30 0b060355 04081304 55746168 310e300c 06035504 07130550 
    726f766f 3121301f 06035504 0a131842 72696768 616d2059 6f756e67 20556e69 
    76657273 69747931 19301706 03550403 13107670 6e2e6368 656d2e62 79752e65 
    64753082 0122300d 06092a86 4886f70d 01010105 00038201 0f003082 010a0282 
    010100e2 2057ca85 0abe9558 a549988d c30c919a cc0706e1 dcefe928 0a23a22a 
    2e1178d6 6d7cbbdb 402203c7 8fe6f784 ea61e76a 42d82bbc 2395e432 a547bd5f 
    892317ae 3f9fa2d1 72164697 9bfcdabd a13e18a3 ff195347 cb58cd0b d205f11c 
    fd11edb2 c12d2c1b ef557a86 e9d826a0 1b473c58 1a1d9fa6 ffc3df73 f0e4d027 
    38eb7c6b 5173b3a8 e09ddeaf 34d2a1af 299115c0 0cbe77f7 80ffc63b 0e448928 
    492193d1 b9dfdcac ce8c901c 2ce77b6d 593bc6d7 a00f24d9 a0779744 44a37f92 
    0be2c656 8da42a79 7c9fa916 e5072a2c 0715849a 1bee594a 7a1bd9b9 96954fbe 
    c64019ac 8bf926e0 fa483d25 02a37c4c d58475fe 155c668b b691f9f3 4a171b8e 
    ee34f302 03010001 a382034c 30820348 301f0603 551d2304 18301680 1450ea73 
    89db29fb 108f9ee5 0120d4de 79994883 f7301d06 03551d0e 04160414 a99572c9 
    99126d57 fe853d70 f24e6b39 14ac5ffa 301b0603 551d1104 14301282 1076706e 
    2e636865 6d2e6279 752e6564 75307b06 082b0601 05050701 01046f30 6d302406 
    082b0601 05050730 01861868 7474703a 2f2f6f63 73702e64 69676963 6572742e 
    636f6d30 4506082b 06010505 07300286 39687474 703a2f2f 63616365 7274732e 
    64696769 63657274 2e636f6d 2f446967 69436572 74486967 68417373 7572616e 
    63654341 2d332e63 7274300e 0603551d 0f0101ff 04040302 05a0300c 0603551d 
    130101ff 04023000 30650603 551d1f04 5e305c30 2ca02aa0 28862668 7474703a 
    2f2f6372 6c332e64 69676963 6572742e 636f6d2f 6361332d 32303130 682e6372 
    6c302ca0 2aa02886 26687474 703a2f2f 63726c34 2e646967 69636572 742e636f 
    6d2f6361 332d3230 3130682e 63726c30 8201c606 03551d20 048201bd 308201b9 
    308201b5 060b6086 480186fd 6c010300 01308201 a4303a06 082b0601 05050702 
    01162e68 7474703a 2f2f7777 772e6469 67696365 72742e63 6f6d2f73 736c2d63 
    70732d72 65706f73 69746f72 792e6874 6d308201 6406082b 06010505 07020230 
    8201561e 82015200 41006e00 79002000 75007300 65002000 6f006600 20007400 
    68006900 73002000 43006500 72007400 69006600 69006300 61007400 65002000 
    63006f00 6e007300 74006900 74007500 74006500 73002000 61006300 63006500 
    70007400 61006e00 63006500 20006f00 66002000 74006800 65002000 44006900 
    67006900 43006500 72007400 20004300 50002f00 43005000 53002000 61006e00 
    64002000 74006800 65002000 52006500 6c007900 69006e00 67002000 50006100 
    72007400 79002000 41006700 72006500 65006d00 65006e00 74002000 77006800 
    69006300 68002000 6c006900 6d006900 74002000 6c006900 61006200 69006c00 
    69007400 79002000 61006e00 64002000 61007200 65002000 69006e00 63006f00 
    72007000 6f007200 61007400 65006400 20006800 65007200 65006900 6e002000 
    62007900 20007200 65006600 65007200 65006e00 63006500 2e301d06 03551d25 
    04163014 06082b06 01050507 03010608 2b060105 05070302 300d0609 2a864886 
    f70d0101 05050003 82010100 98d034cd 65852025 954a3fd8 f1803b4c 0239f372 
    ebda784d a510f8c3 dc9d798e b433c43e ff2515d4 fed359e4 7536e0c4 3d82c2d5 
    9b74be13 7d09f752 c0fc9868 42ca1f99 a302c568 277903b0 dda05b02 2d8552d9 
    7bb989a1 0846c0fd c271098b 4fec7091 70161d00 d056f6c3 ef18d287 6598f7b5 
    e6e5c137 570206e5 24b08086 1adcf224 2359b396 520793f1 79d4d95b 97e9c5ec 
    08b09bbd 7732462b 716d17d7 3144f35e 67726523 540d37af 7772e140 f166988e 
    83743979 a283f1f7 f262edd7 0b8dd467 b4fea5ab d1b372b0 40453df0 87aac19f 
    347b9b4e d99cf3bc 4a3642dd f3b76228 171698ac 0d696e16 da0875ab dfa7cda1 
    d3cd82fd ed9995f6 4bd124fc
  quit
crypto ca certificate chain DigiCertCA
 certificate ca 0851f959814145cabde024e212c9c20e
    30820655 3082053d a0030201 02021008 51f95981 4145cabd e024e212 c9c20e30 
    0d06092a 864886f7 0d010105 0500306c 310b3009 06035504 06130255 53311530 
    13060355 040a130c 44696769 43657274 20496e63 31193017 06035504 0b131077 
    77772e64 69676963 6572742e 636f6d31 2b302906 03550403 13224469 67694365 
    72742048 69676820 41737375 72616e63 65204556 20526f6f 74204341 301e170d 
    30373034 30333030 30303030 5a170d32 32303430 33303030 3030305a 3066310b 
    30090603 55040613 02555331 15301306 0355040a 130c4469 67694365 72742049 
    6e633119 30170603 55040b13 10777777 2e646967 69636572 742e636f 6d312530 
    23060355 0403131c 44696769 43657274 20486967 68204173 73757261 6e636520 
    43412d33 30820122 300d0609 2a864886 f70d0101 01050003 82010f00 3082010a 
    02820101 00bf610a 29101f5e fe343751 08f81efb 22ed61be 0b0d704c 50632675 
    15b94188 97b6f0a0 15bb0860 e042e805 29108736 8a2865a8 ef310774 6d36972f 
    28466604 c72a7926 7a99d58e c36d4fa0 5eadbc3d 91c2597b 5e366cc0 53cf0008 
    323e1064 58101369 c70cee9c 425100f9 0544ee24 ce7a1fed 8c11bd12 a8f315f4 
    1c7a3169 011ba7e6 5dc09a6c 7e099ee7 52444a10 3a23e49b b603afa8 9cb45b9f 
    d44bad92 8cceb511 2aaa3718 8db4c2b8 d85c068c f8ff23bd 355ed47c 3e7e830e 
    91960598 c3b21fe3 c865eba9 7b5da02c ccfc3cd9 6dedccfa 4b438cc9 d4b8a561 
    1cb240b6 2812dfb9 f85ffed3 b2c9ef3d b41e4b7c 1c4c9936 9e3debec a7685e1d 
    df676e5e fb020301 0001a382 02f73082 02f3300e 0603551d 0f0101ff 04040302 
    01863082 01c60603 551d2004 8201bd30 8201b930 8201b506 0b608648 0186fd6c 
    01030002 308201a4 303a0608 2b060105 05070201 162e6874 74703a2f 2f777777 
    2e646967 69636572 742e636f 6d2f7373 6c2d6370 732d7265 706f7369 746f7279 
    2e68746d 30820164 06082b06 01050507 02023082 01561e82 01520041 006e0079 
    00200075 00730065 0020006f 00660020 00740068 00690073 00200043 00650072 
    00740069 00660069 00630061 00740065 00200063 006f006e 00730074 00690074 
    00750074 00650073 00200061 00630063 00650070 00740061 006e0063 00650020 
    006f0066 00200074 00680065 00200044 00690067 00690043 00650072 00740020 
    00430050 002f0043 00500053 00200061 006e0064 00200074 00680065 00200052 
    0065006c 00790069 006e0067 00200050 00610072 00740079 00200041 00670072 
    00650065 006d0065 006e0074 00200077 00680069 00630068 0020006c 0069006d 
    00690074 0020006c 00690061 00620069 006c0069 00740079 00200061 006e0064 
    00200061 00720065 00200069 006e0063 006f0072 0070006f 00720061 00740065 
    00640020 00680065 00720065 0069006e 00200062 00790020 00720065 00660065 
    00720065 006e0063 0065002e 300f0603 551d1301 01ff0405 30030101 ff303406 
    082b0601 05050701 01042830 26302406 082b0601 05050730 01861868 7474703a 
    2f2f6f63 73702e64 69676963 6572742e 636f6d30 818f0603 551d1f04 81873081 
    843040a0 3ea03c86 3a687474 703a2f2f 63726c33 2e646967 69636572 742e636f 
    6d2f4469 67694365 72744869 67684173 73757261 6e636545 56526f6f 7443412e 
    63726c30 40a03ea0 3c863a68 7474703a 2f2f6372 6c342e64 69676963 6572742e 
    636f6d2f 44696769 43657274 48696768 41737375 72616e63 65455652 6f6f7443 
    412e6372 6c301f06 03551d23 04183016 8014b13e c36903f8 bf4701d4 98261a08 
    02ef6364 2bc3301d 0603551d 0e041604 1450ea73 89db29fb 108f9ee5 0120d4de 
    79994883 f7300d06 092a8648 86f70d01 01050500 03820101 005d4f84 f1a888d3 
    a3b2bc9c 6de52949 77e1e7d6 dca9d835 aec971dc e5dbdc9d 242190a6 cfb7011c 
    9bd45797 91d77516 a512d7b9 3d2e893d 39698ad6 3537f9f1 21c45b40 ad59a92f 
    5f3a0029 43277103 e4bd3032 55a6fe84 0e0b9b38 192c437c ac43bf75 31e5231c 
    4555b769 0891b5cf d7d5b15e ee9f94e4 d67ab918 c3b8d652 631c10ba 8b2f6d5d 
    cc0538f4 56056def 9eece861 360c144b 85145a0c 834f225c 59cb8c8a 71dafac5 
    108458cf 07eee390 c2f5f929 c75a2371 f959b464 2b88b0a7 36c79a20 61ebfa4e 
    b5ae6b1b e4e3ece2 d93c4149 a820a454 f5928dbb c0552004 a6d8b017 16cce3d0 
    c8b43de5 d984c6d3 f66e6d78 c97943e8 7a37ff5c 3549bfa1 c5
  quit
crypto ca certificate chain DigiCertCA-RGTest
 certificate ca 0851f959814145cabde024e212c9c20e
    30820655 3082053d a0030201 02021008 51f95981 4145cabd e024e212 c9c20e30 
    0d06092a 864886f7 0d010105 0500306c 310b3009 06035504 06130255 53311530 
    13060355 040a130c 44696769 43657274 20496e63 31193017 06035504 0b131077 
    77772e64 69676963 6572742e 636f6d31 2b302906 03550403 13224469 67694365 
    72742048 69676820 41737375 72616e63 65204556 20526f6f 74204341 301e170d 
    30373034 30333030 30303030 5a170d32 32303430 33303030 3030305a 3066310b 
    30090603 55040613 02555331 15301306 0355040a 130c4469 67694365 72742049 
    6e633119 30170603 55040b13 10777777 2e646967 69636572 742e636f 6d312530 
    23060355 0403131c 44696769 43657274 20486967 68204173 73757261 6e636520 
    43412d33 30820122 300d0609 2a864886 f70d0101 01050003 82010f00 3082010a 
    02820101 00bf610a 29101f5e fe343751 08f81efb 22ed61be 0b0d704c 50632675 
    15b94188 97b6f0a0 15bb0860 e042e805 29108736 8a2865a8 ef310774 6d36972f 
    28466604 c72a7926 7a99d58e c36d4fa0 5eadbc3d 91c2597b 5e366cc0 53cf0008 
    323e1064 58101369 c70cee9c 425100f9 0544ee24 ce7a1fed 8c11bd12 a8f315f4 
    1c7a3169 011ba7e6 5dc09a6c 7e099ee7 52444a10 3a23e49b b603afa8 9cb45b9f 
    d44bad92 8cceb511 2aaa3718 8db4c2b8 d85c068c f8ff23bd 355ed47c 3e7e830e 
    91960598 c3b21fe3 c865eba9 7b5da02c ccfc3cd9 6dedccfa 4b438cc9 d4b8a561 
    1cb240b6 2812dfb9 f85ffed3 b2c9ef3d b41e4b7c 1c4c9936 9e3debec a7685e1d 
    df676e5e fb020301 0001a382 02f73082 02f3300e 0603551d 0f0101ff 04040302 
    01863082 01c60603 551d2004 8201bd30 8201b930 8201b506 0b608648 0186fd6c 
    01030002 308201a4 303a0608 2b060105 05070201 162e6874 74703a2f 2f777777 
    2e646967 69636572 742e636f 6d2f7373 6c2d6370 732d7265 706f7369 746f7279 
    2e68746d 30820164 06082b06 01050507 02023082 01561e82 01520041 006e0079 
    00200075 00730065 0020006f 00660020 00740068 00690073 00200043 00650072 
    00740069 00660069 00630061 00740065 00200063 006f006e 00730074 00690074 
    00750074 00650073 00200061 00630063 00650070 00740061 006e0063 00650020 
    006f0066 00200074 00680065 00200044 00690067 00690043 00650072 00740020 
    00430050 002f0043 00500053 00200061 006e0064 00200074 00680065 00200052 
    0065006c 00790069 006e0067 00200050 00610072 00740079 00200041 00670072 
    00650065 006d0065 006e0074 00200077 00680069 00630068 0020006c 0069006d 
    00690074 0020006c 00690061 00620069 006c0069 00740079 00200061 006e0064 
    00200061 00720065 00200069 006e0063 006f0072 0070006f 00720061 00740065 
    00640020 00680065 00720065 0069006e 00200062 00790020 00720065 00660065 
    00720065 006e0063 0065002e 300f0603 551d1301 01ff0405 30030101 ff303406 
    082b0601 05050701 01042830 26302406 082b0601 05050730 01861868 7474703a 
    2f2f6f63 73702e64 69676963 6572742e 636f6d30 818f0603 551d1f04 81873081 
    843040a0 3ea03c86 3a687474 703a2f2f 63726c33 2e646967 69636572 742e636f 
    6d2f4469 67694365 72744869 67684173 73757261 6e636545 56526f6f 7443412e 
    63726c30 40a03ea0 3c863a68 7474703a 2f2f6372 6c342e64 69676963 6572742e 
    636f6d2f 44696769 43657274 48696768 41737375 72616e63 65455652 6f6f7443 
    412e6372 6c301f06 03551d23 04183016 8014b13e c36903f8 bf4701d4 98261a08 
    02ef6364 2bc3301d 0603551d 0e041604 1450ea73 89db29fb 108f9ee5 0120d4de 
    79994883 f7300d06 092a8648 86f70d01 01050500 03820101 005d4f84 f1a888d3 
    a3b2bc9c 6de52949 77e1e7d6 dca9d835 aec971dc e5dbdc9d 242190a6 cfb7011c 
    9bd45797 91d77516 a512d7b9 3d2e893d 39698ad6 3537f9f1 21c45b40 ad59a92f 
    5f3a0029 43277103 e4bd3032 55a6fe84 0e0b9b38 192c437c ac43bf75 31e5231c 
    4555b769 0891b5cf d7d5b15e ee9f94e4 d67ab918 c3b8d652 631c10ba 8b2f6d5d 
    cc0538f4 56056def 9eece861 360c144b 85145a0c 834f225c 59cb8c8a 71dafac5 
    108458cf 07eee390 c2f5f929 c75a2371 f959b464 2b88b0a7 36c79a20 61ebfa4e 
    b5ae6b1b e4e3ece2 d93c4149 a820a454 f5928dbb c0552004 a6d8b017 16cce3d0 
    c8b43de5 d984c6d3 f66e6d78 c97943e8 7a37ff5c 3549bfa1 c5
  quit
crypto ca certificate chain DigiCertCA2-RGTest
 certificate ca 428740a5
    30820442 308203ab a0030201 02020442 8740a530 0d06092a 864886f7 0d010105 
    05003081 c3310b30 09060355 04061302 55533114 30120603 55040a13 0b456e74 
    72757374 2e6e6574 313b3039 06035504 0b133277 77772e65 6e747275 73742e6e 
    65742f43 50532069 6e636f72 702e2062 79207265 662e2028 6c696d69 7473206c 
    6961622e 29312530 23060355 040b131c 28632920 31393939 20456e74 72757374 
    2e6e6574 204c696d 69746564 313a3038 06035504 03133145 6e747275 73742e6e 
    65742053 65637572 65205365 72766572 20436572 74696669 63617469 6f6e2041 
    7574686f 72697479 301e170d 30363130 30313035 30303030 5a170d31 34303732 
    36313831 3531355a 306c310b 30090603 55040613 02555331 15301306 0355040a 
    130c4469 67694365 72742049 6e633119 30170603 55040b13 10777777 2e646967 
    69636572 742e636f 6d312b30 29060355 04031322 44696769 43657274 20486967 
    68204173 73757261 6e636520 45562052 6f6f7420 43413082 0122300d 06092a86 
    4886f70d 01010105 00038201 0f003082 010a0282 010100c6 cce573e6 fbd4bbe5 
    2d2d32a6 dfe5813f c9cd2549 b6712ac3 d5943467 a20a1cb0 5f69a640 b1c4b7b2 
    8fd098a4 a941593a d3dc94d6 3cdb7438 a44acc4d 2582f74a a5531238 eef3496d 
    71917e63 b6aba65f c3a484f8 4f6251be f8c5ecdb 3892e306 e508910c c4284155 
    fbcb5a89 157e71e8 35bf4d72 093dbe3a 38505b77 311b8db3 c724459a a7ac6d00 
    145a04b7 ba13eb51 0a984141 224e6561 87814150 a6795c89 de194a57 d52ee65d 
    1c532c7e 98cd1a06 16a46873 d0340413 5ca171d3 5a7c55db 5e64e137 87305604 
    e511b429 8012f179 3988a202 117c2766 b788b778 f2ca0aa8 38ab0a64 c2bf665d 
    9584c1a1 251e875d 1a500b20 12cc41bb 6e0b5138 b84bcb02 03010001 a3820113 
    3082010f 30120603 551d1301 01ff0408 30060101 ff020101 30270603 551d2504 
    20301e06 082b0601 05050703 0106082b 06010505 07030206 082b0601 05050703 
    04303306 082b0601 05050701 01042730 25302306 082b0601 05050730 01861768 
    7474703a 2f2f6f63 73702e65 6e747275 73742e6e 65743033 0603551d 1f042c30 
    2a3028a0 26a02486 22687474 703a2f2f 63726c2e 656e7472 7573742e 6e65742f 
    73657276 6572312e 63726c30 1d060355 1d0e0416 0414b13e c36903f8 bf4701d4 
    98261a08 02ef6364 2bc3300b 0603551d 0f040403 02010630 1f060355 1d230418 
    30168014 f0176213 553db3ff 0a006bfb 508497f3 ed62d01a 30190609 2a864886 
    f67d0741 00040c30 0a1b0456 372e3103 02008130 0d06092a 864886f7 0d010105 
    05000381 8100480e 2b6f2062 4c2893a3 243d58ab 21cf80f8 9a97906a 22ed5a7c 
    473699e7 798475ab 248f920a d56104ae c36a5cb2 ccd9e444 876fdb8f 3862f744 
    369dbabc 6e07c4d4 8de81fd1 0b60a3b5 9cce63be ed67dcf8 bade6ec9 25cb5bb5 
    9d76700b df4272f8 4f411164 a5d2eafc d5af11f4 1538679c 20a84b77 5a913242 
    32e785b3 df36
  quit
crypto isakmp enable outside
crypto isakmp policy 15
 authentication pre-share
 encryption aes-256
 hash sha
 group 2
 lifetime 86400
crypto isakmp policy 20
 authentication pre-share
 encryption aes-192
 hash sha
 group 5
 lifetime 86400
crypto isakmp policy 30
 authentication pre-share
 encryption aes
 hash sha
 group 5
 lifetime 86400
crypto isakmp policy 40
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
vpn-addr-assign local reuse-delay 5
remote-access threshold session-threshold-exceeded 25
telnet 192.168.105.0 255.255.255.0 inside
telnet 192.168.106.0 255.255.255.0 inside
telnet timeout 5
ssh scopy enable
ssh 174.52.36.203 255.255.255.255 outside
ssh 192.168.105.0 255.255.255.0 inside
ssh 192.168.106.0 255.255.255.0 inside
ssh 0.0.0.0 0.0.0.0 inside
ssh timeout 5
console timeout 0
management-access inside
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 192.168.105.10
ntp server 192.43.244.18
ssl encryption aes256-sha1 aes128-sha1 3des-sha1
ssl trust-point DigiCertCA
ssl trust-point testing outside
ssl trust-point firewall_internal_digicert inside
webvpn
 enable outside
 anyconnect-essentials
 svc image disk0:/anyconnect-wince-ARMv4I-2.5.0217-k9.pkg 1 regex "Windows CE"
 svc image disk0:/anyconnect-win-2.5.0217-k9.pkg 2 regex "Windows NT"
 svc image disk0:/anyconnect-macosx-i386-2.5.0217-k9.pkg 3 regex "Intel Mac OS X"
 svc image disk0:/anyconnect-linux-2.5.0217-k9.pkg 4 regex "Linux"
 svc enable
group-policy DfltGrpPolicy attributes
 wins-server value 192.168.105.10
 dns-server value 192.168.105.10 192.168.105.11
 vpn-tunnel-protocol IPSec svc 
 ipsec-udp enable
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value VPN-BYU-NETS-SPLIT
 default-domain value chem.byu.edu
 address-pools value VPN-POOL
username admin password FgibczyVGBcddWL6 encrypted privilege 15
username rgardner password VUYUqAgt9MbginSm encrypted privilege 15
username sivco password ppoI03NdjneYjuGd encrypted
username sivco attributes
 service-type remote-access
username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15
tunnel-group DefaultRAGroup general-attributes
 authentication-server-group RADIUS-VPN LOCAL
tunnel-group DefaultWEBVPNGroup general-attributes
 authentication-server-group RADIUS-VPN LOCAL
tunnel-group Faculty type remote-access
tunnel-group Faculty general-attributes
 authentication-server-group RADIUS-VPN
tunnel-group Faculty ipsec-attributes
 pre-shared-key facadmin
tunnel-group admin type remote-access
tunnel-group admin general-attributes
 authentication-server-group RADIUS-VPN
tunnel-group admin ipsec-attributes
 pre-shared-key cH3mAdM1n
tunnel-group cpmsdo type remote-access
tunnel-group cpmsdo general-attributes
 authentication-server-group RADIUS-VPN
tunnel-group cpmsdo ipsec-attributes
 pre-shared-key "An apple a day"
!
class-map inspection_default
 match default-inspection-traffic
class-map class_snmp
 match port udp eq snmp
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 4096
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect pptp 
  inspect ip-options 
  inspect icmp 
 class class_snmp
  inspect snmp 
!
service-policy global_policy global
prompt hostname priority state 
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:7c2abb046ce98aebff24c2e08a006762
: end

QR Code
QR Code computer_stuff:chem_firewall (generated for current page)