Not that i true care... but i did snip and changed Public ips, internals are actuals:
Cisco PIX Firewall Version 6.2(2)
Cisco PIX Device Manager Version 2.0(2)
Compiled on Fri 07-Jun-02 17:49 by morlee
becker up 2 days 2 hours
Hardware: PIX-515, 32 MB RAM, CPU Pentium 200 MHz
Flash i28F640J5 @ 0x300, 16MB
BIOS Flash AT29C257 @ 0xfffd8000, 32KB
0: ethernet0: address is 0050.54ff.7eec, irq 10
1: ethernet1: address is 0050.54ff.7eed, irq 7
Licensed Features:
Failover: Disabled
VPN-DES: Enabled
VPN-3DES: Disabled
Maximum Interfaces: 3
Cut-through Proxy: Enabled
Guards: Enabled
URL-filtering: Enabled
Inside Hosts: Unlimited
Throughput: Unlimited
IKE peers: Unlimited
Serial Number: 480211070 (0x1c9f707e)
Running Activation Key: 0x723141bc 0x56ed6aea 0x1b0deae2 0xef033fb4
Configuration last modified by enable_15 at 20:44:34.986 GMT Wed May 5 2004
------------------ show config (run time) ------------------
:
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname work
domain-name work.com
clock timezone GMT 0
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list 110 permit ip host 63.63.63.178 10.240.0.0 255.248.0.0
access-list 101 permit tcp any host 63.63.63.185
pager lines 24
logging on
logging trap emergencies
interface ethernet0 auto
interface ethernet1 auto
mtu outside 1500
mtu inside 1500
ip address outside 63.63.63.162 255.255.255.224
ip address inside 192.168.10.2 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.10.0 255.255.255.0 inside
pdm location 192.168.10.0 255.255.255.255 inside
pdm location 192.168.1.1 255.255.255.255 inside
pdm location 192.168.1.10 255.255.255.255 inside
pdm location 192.168.10.1 255.255.255.255 inside
pdm location 192.168.10.21 255.255.255.255 inside
pdm location 192.168.10.23 255.255.255.255 inside
pdm location 192.168.10.24 255.255.255.255 inside
pdm location 192.168.10.25 255.255.255.255 inside
pdm location 192.168.10.26 255.255.255.255 inside
pdm location 192.168.10.27 255.255.255.255 inside
pdm location 192.168.10.28 255.255.255.255 inside
pdm location 192.168.10.29 255.255.255.255 inside
pdm location 192.168.10.30 255.255.255.255 inside
pdm location 192.168.10.35 255.255.255.255 inside
pdm location 192.168.10.51 255.255.255.255 inside
pdm location 192.168.10.53 255.255.255.255 inside
pdm location 192.168.10.54 255.255.255.255 inside
pdm location 192.168.10.119 255.255.255.255 inside
pdm location 192.168.11.90 255.255.255.255 inside
pdm location 192.168.0.0 255.255.0.0 inside
pdm location 10.240.0.0 255.248.0.0 outside
pdm location 192.168.11.0 255.255.255.0 inside
pdm location 192.168.16.0 255.255.255.0 inside
pdm location 192.168.0.0 255.255.0.0 outside
pdm location 192.168.16.0 255.255.255.0 outside
pdm location 192.168.11.21 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 63.63.63.190 netmask 255.255.255.224
nat (inside) 1 192.168.0.0 255.255.0.0 0 0
static (inside,outside) 63.63.63.164 192.168.10.35 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.165 192.168.1.10 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.166 192.168.10.23 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.167 192.168.10.24 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.168 192.168.10.25 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.169 192.168.10.26 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.170 192.168.10.27 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.171 192.168.10.28 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.172 192.168.10.29 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.174 192.168.10.53 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.175 192.168.10.54 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.178 192.168.10.51 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.179 192.168.11.90 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.180 192.168.10.30 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.163 192.168.10.21 netmask 255.255.255.255 0 0
static (inside,outside) 63.63.63.185 192.168.11.21 netmask 255.255.255.255 0 0
access-group 101 in interface outside
conduit permit udp host 63.63.63.163 eq 3306 any
conduit permit tcp host 63.63.63.163 eq 3306 any
conduit permit tcp host 63.63.63.163 eq
conduit permit tcp host 63.63.63.163 eq https any
conduit permit tcp host 63.63.63.163 eq smtp any
conduit permit tcp host 63.63.63.163 eq pop3 any
conduit permit tcp host 63.63.63.165 eq telnet any
conduit permit tcp host 63.63.63.164 eq
conduit permit tcp host 63.63.63.164 eq https any
conduit permit tcp host 63.63.63.185 any
route outside 0.0.0.0 0.0.0.0 63.63.63.161 1
route inside 192.168.0.0 255.255.0.0 192.168.10.1 1
timeout xlate 1:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server 204.123.2.5 source outside prefer
ntp server 192.5.5.250 source outside
http server enable
http 192.168.10.0 255.255.255.0 inside
http 192.168.11.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
telnet 192.168.10.0 255.255.255.0 inside
telnet 192.168.1.10 255.255.255.255 inside
telnet 192.168.1.1 255.255.255.255 inside
telnet 192.168.10.1 255.255.255.255 inside
telnet timeout 30
ssh timeout 5
terminal width 80
Cryptochecksum:1453e13btrye4537f856efhb28b67c1ac016d
------------------ show blocks ------------------
SIZE MAX LOW CNT
4 1600 1598 1599
80 400 392 400
256 500 498 500
1550 932 580 674
2560 200 196 199
------------------ show interface ------------------
interface ethernet0 "outside" is up, line protocol is up
Hardware is i82559 ethernet, address is 0050.54ff.7eec
IP address 63.63.63.162, subnet mask 255.255.255.224
MTU 1500 bytes, BW 10000 Kbit half duplex
2657563 packets input, 1211152522 bytes, 0 no buffer
Received 16722 broadcasts, 0 runts, 0 giants
20 input errors, 0 CRC, 0 frame, 20 overrun, 0 ignored, 0 abort
2059352 packets output, 336105754 bytes, 0 underruns
0 output errors, 2860 collisions, 0 interface resets
0 babbles, 0 late collisions, 31640 deferred
0 lost carrier, 0 no carrier
input queue (curr/max blocks): hardware (128/128) software (0/3)
output queue (curr/max blocks): hardware (0/6) software (0/1)
interface ethernet1 "inside" is up, line protocol is up
Hardware is i82559 ethernet, address is 0050.54ff.7eed
IP address 192.168.10.2, subnet mask 255.255.255.0
MTU 1500 bytes, BW 100000 Kbit full duplex
2224895 packets input, 354581841 bytes, 0 no buffer
Received 97515 broadcasts, 0 runts, 0 giants
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
2627667 packets output, 1227620889 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 babbles, 0 late collisions, 0 deferred
0 lost carrier, 0 no carrier
input queue (curr/max blocks): hardware (128/128) software (0/3)
output queue (curr/max blocks): hardware (0/27) software (0/2)