PIX Version 8.0(3) ! hostname FW-Main domain-name Task1.local enable password 8Ry2YjIyt7RRXU24 encrypted names ! interface Ethernet0 nameif IF_Outside security-level 0 ip address 10.10.1.2 255.255.255.252 ! interface Ethernet1 nameif IF_Inside security-level 100 ip address 192.168.1.1 255.255.255.0 ! interface Ethernet2 shutdown no nameif no security-level no ip address ! interface Ethernet3 shutdown no nameif no security-level no ip address ! interface Ethernet4 shutdown no nameif no security-level no ip address ! passwd 2KFQnbNIdI.2KYOU encrypted ftp mode passive dns server-group DefaultDNS domain-name Task1.local same-security-traffic permit intra-interface object-group network OBJ_VPN_Main network-object 192.168.1.0 255.255.255.0 object-group network OBJ_VPN_Customer_1 network-object 192.168.2.0 255.255.255.0 object-group network OBJ_VPN_Customer_2 network-object 192.168.3.0 255.255.255.0 object-group network OBJ_VPN_Customer group-object OBJ_VPN_Customer_1 group-object OBJ_VPN_Customer_2 access-list ACL_Cry_map_10 remark ### traffic for VPN to Customer 1 ### access-list ACL_Cry_map_10 extended permit ip object-group OBJ_VPN_Main object-group OBJ_VPN_Customer_1 access-list ACL_Cry_map_10 extended permit ip object-group OBJ_VPN_Customer_2 object-group OBJ_VPN_Customer_1 access-list ACL_Cry_map_20 remark ### traffic for VPN to Customer 2 ### access-list ACL_Cry_map_20 extended permit ip object-group OBJ_VPN_Main object-group OBJ_VPN_Customer_2 access-list ACL_Cry_map_20 extended permit ip object-group OBJ_VPN_Customer_1 object-group OBJ_VPN_Customer_2 access-list ACL_NAT_0 remark ### Nat ZERO ### access-list ACL_NAT_0 extended permit ip object-group OBJ_VPN_Main object-group OBJ_VPN_Customer access-list ACL_NAT_0 extended permit ip object-group OBJ_VPN_Customer_2 object-group OBJ_VPN_Customer_1 access-list ACL_NAT_0 extended permit ip object-group OBJ_VPN_Customer_1 object-group OBJ_VPN_Customer_2 pager lines 24 logging console debugging logging monitor debugging mtu IF_Outside 1500 mtu IF_Inside 1500 no failover icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 nat (IF_Outside) 0 access-list ACL_NAT_0 route IF_Outside 0.0.0.0 0.0.0.0 10.10.1.1 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout uauth 0:05:00 absolute dynamic-access-policy-record DfltAccessPolicy no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set TRANS_1 esp-aes-256 esp-sha-hmac crypto map MAP_Outside 10 match address ACL_Cry_map_10 crypto map MAP_Outside 10 set peer 10.10.1.6 crypto map MAP_Outside 10 set transform-set TRANS_1 crypto map MAP_Outside 20 match address ACL_Cry_map_20 crypto map MAP_Outside 20 set peer 10.10.1.10 crypto map MAP_Outside 20 set transform-set TRANS_1 crypto map MAP_Outside interface IF_Outside crypto isakmp enable IF_Outside crypto isakmp policy 100 authentication pre-share encryption aes-256 hash sha group 2 lifetime 86400 telnet timeout 5 ssh timeout 5 console timeout 0 threat-detection basic-threat threat-detection statistics access-list tunnel-group 10.10.1.6 type ipsec-l2l tunnel-group 10.10.1.6 ipsec-attributes pre-shared-key * tunnel-group 10.10.1.10 type ipsec-l2l tunnel-group 10.10.1.10 ipsec-attributes pre-shared-key * ! ! prompt hostname context Cryptochecksum:be758c0f28336e2e01f6c863f66d26e2 : end