4948 switch IOS upgrad

The curent ios of switch is :- cat4500-ipbase-mz.122-53.SG1.bin
I copied the new IOS on the 4948 into the bootflash directory. There is two files, the original and the new img.
OLD-HQ-TEMP-SW#show bootflash:
-#- ED ----type---- --crc--- -seek-- nlen -length- ---------date/time--------- name
1   .. image        51B30D28  EFE2FC   32 15458940 May 11 2010 01:37:15 +00:00 cat4500-ipbase-mz.122-53.SG1.bin
2   .. image        B9F04A7B 203FF78   33 18095100 Mar 30 2014 02:12:38 +00:00 cat4500-ipbasek9-mz.150-2.SG8.bin
Even though I put the command boot system flash bootflash:imgname it still boots the old ios.
When i changed the config register  to 0x2102 and boot with new image and  reloads. It going to rommon mode. so please help me to do this
I realy want to upgrade this to the latest release and I am having a hard time
OLD-HQ-TEMP-SW#show bootvar
BOOT variable = tftp:cat4500-ipbasek9-mz.150-2.SG8.bin 255.255.255.255,12;booflash:cat4500-ipbasek9-mz.150-2.SG8.bin,12;bootflash:cat4500-ipbasek9-mz.150-2.SG8.bin,1;
CONFIG_FILE variable does not exist
BOOTLDR variable does not exist
Configuration register is 0x2101

Apologies. My mistake the switch model you have is supported with this release.
Glen is exactly right here in that the boot statements you have look to be the cause of the problem. If you execute the command show runn | in ^boot you should see a number of statements which are reflected in your boot variable. You'll probably see a number of entries such as boot system bootflash:cat4500-ipbasek9-mz.150-2.SG8.bin, boot system tftp cat4500-ipbasek9-mz.150-2.SG8.bin 255.255.255.255 etc.
To remove those that you don't want you simply add the no keyword to the begining of each line that is not required. You also need to change the configuration register, and then save the configuration.
So the following configuration should be what you need:
no boot system tftp:cat4500-ipbasek9-mz.150-2.SG8.bin 255.255.255.255
no boot system booflash:cat4500-ipbasek9-mz.150-2.SG8.bin
config-register 0x2102
end
After you exit config mode, save the configuration and reload.
Regards

Similar Messages

  • Cisco switch ios upgradation

    how can I upgrade cisco 2960s switch's ios.
    what commands will be used for it

    Hello Anupam, 
    1. You need to copy the IOS from CCO. 
    2. The same IOS needs to copied on to the flash. 
    #copy tftp : flash
    #tftp ip address <x.x.x.x> 
    3. I would suggest before upgrading the IOS. Please verify the MD5 checksum and confirm with CCO that it matches. This confirms that while copying the image didnt get corrupt. 
    #verify /md5 Flash:<IOSimage>.bin
    4. Once you see the IOS in flash. Please configure below. 
    boot-start-marker
    boot system flash <IOS image name>.bin
    boot-end-marker
    5. Save the confguration. 
    #wr
    6. reload the router. Post reload you can run " show version" to check if device has come up with new IOS. 
    HTH,
    Nikhil 

  • Any possibility of upgrading 2950 switch IOS

    Hi,
    I would like to know if possible to upgrade my cisco 2950 switch IOS from Standard to Enhanced Image, As I notice from some one that it comes standard box with no uograde capabilities.
    Is that means as hardware upgrade or IOS Image Upgrade?
    Ankur : u have helped me before but I am still confused.
    thanks,

    The ability to run either the SI or EI features on the 2950 is hardware dependant. If you have a look at the release notes for the latest IOS there is a table about 2 pages in detailing the various 2950's available and whether they run the SI or EI features.
    The actual IOS software image is the same for both the EI & SI switches but only the EI features are available on the platforms that support it.
    The 2950-12, 2950-24, 2950SX-24, 2950SX-48-SI and 2950T-48-SI only have the SI features, it looks like all the others run the EI.
    HTH
    Andy

  • No valid license found after IOS upgrade on C3750x switch

    HI,
    Two switches below are working fine as a stack with IOS c3750e-universalk9-mz.122-55.SE5.bin & ipbase license.
    Switch#1 (Master, WS-C3750X-24P-S)
    Switch#2 (Member, WS-C3750X-24P-S)
    After IOS Upgrade to c3750e-universalk9-mz.150-2.SE7.bin, The stack was broken. Switch#2 didn’t recognise valid ipbase license with new IOS and came up with lanbase license instead. Therefore stack cannot be composed due to license mismatch between Switch#1 (ipbase) and switch#2(lanbase).
    I’m wondering why Switch#2 didn’t recognise ipbase license with new IOS even though IPASE is running well with previous IOS.
    Here is excerpt from “show version” with 15.x image on Switch#2.
    License Level: lanbase
    License Type: Default. No valid license found.
    Next reload license Level: lanbase
    Here is excerpt from “show version” with 12.x image on Switch Stack.
    License Level: ipbase
    License Type: Permanent
    Next reload license Level: ipbase
    Thanks
    Jeong

    Thanks guys,
    I have fixed the issue by configuring  'license boot level ipbase' on the member switch#2. The switch recognised IPBASE license well and joined the stack successfully.

  • POE 3560 Issue after IOS upgrade

    Hello,
    I having issue where 6 WLAN AP's not coming back uo after reboot and IOS upgrade of 3560 POE swtiches - . Prior to changes here most if not all ALL the 23 Aps were mainly on one switch, Now after these changes they are now spread over three switches ( 3560's) - with 17 coming back on line
    I am sure its not the power limitation of the switch(s) as the one switch I am TS at present had a fairly large allocation of the aps attached prior to ios upgrade and reload. and the available power value now showing is applicable.for 8 AP's
    I have tried various TS steps to try and bring them back up - A couple of things I would like to try but I am restricted to do so is to check the APS physically or downgrade the ios!
    Any input on this matter would be truly appreciated.- (attached is the log buffer debug)
    res
    Paul

    c3560-ipbase-mz.122-25.SEE2.bin
    You upgraded the IOS to the switch?  I shudder at the thought of what old version did you upgrade FROM.  
    Available:370.0(w) Used:110.4(w) Remaining:259.6(w)
    You've got more than enough PoE left. 
    Only two things comes to my mind:  
    1.   Cable issue - Unfortunately, the 3560 is a non-GigabitEthernet and this particular sub-model does NOT support TDR.
    2.  Hardware failure - Read THIS.

  • WS-X6816-GBIC became PwrDown when IOS upgrade to 12.2(18)SXD7

    When IOS upgraded from 12.1(13)E8 to 12.2(18)SXD7, one of WS-X6816-GBIC module (in slot5) become PwrDown in show module output but another one (in slot 4) is ok. The only difference I can find is DFC hardware version. Is there any limitation about this ?
    IOS 12.2(18)SXD7
    ------------------ show module ------------------
    Mod Ports Card Type Model Serial No.
    1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-SUP2-2GE SAL0752RJBZ
    4 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC SAD05050HGC
    5 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC SAL08186B80
    6 0 Switching Fabric Module-136 (Active) WS-X6500-SFM2 SAL0708DF8W
    8 0 2 port adapter FlexWAN WS-X6182-2PA SAD073900JL
    Mod MAC addresses Hw Fw Sw Status
    1 0009.1246.eba8 to 0009.1246.eba9 5.0 7.1(1) 12.2(18)SXD7 Ok
    4 0030.f271.1972 to 0030.f271.1981 1.7 12.1(11r)E2 12.2(18)SXD7 Ok
    5 000f.f780.2420 to 000f.f780.242f 1.7 Unknown Unknown PwrDown
    6 0001.0002.0003 to 0001.0002.0003 1.4 6.1(3) 8.3(0.156)RO Ok
    8 000d.650a.15c0 to 000d.650a.15ff 1.6 12.2(18)SXD7 12.2(18)SXD7 Ok
    Mod Sub-Module Model Serial Hw Status
    1 Policy Feature Card 2 WS-F6K-PFC2 SAL0752RKWF 3.4 Ok
    1 Cat6k MSFC 2 daughterboard WS-F6K-MSFC2 SAL0752RB28 2.6 Ok
    4 Distributed Forwarding Card WS-F6K-DFC SAL08249SUD 2.5 Ok
    5 Distributed Forwarding Card WS-F6K-DFC SAL081971W0 2.7 PwrDown
    Mod Online Diag Status
    1 Pass
    4 Pass
    5 Unknown
    6 Pass
    8 Pass
    The early show module output;
    IOS 12.1(13)E8
    TANET_PTC_R6K#sh module
    Mod Ports Card Type Model Serial No.
    1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-SUP2-2GE SAL0752RJBZ
    4 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC SAD05050HGC
    5 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC SAL08186B80
    6 0 Switching Fabric Module-136 (Active) WS-X6500-SFM2 SAL0708DF8W
    8 0 2 port adapter FlexWAN WS-X6182-2PA SAD073900JL
    Mod MAC addresses Hw Fw Sw Status
    1 0009.1246.eba8 to 0009.1246.eba9 5.0 6.1(3) 7.5(0.6)HUB1 Ok
    4 0030.f271.1972 to 0030.f271.1981 1.7 12.1(11r)E2 12.1(13)E8, Ok
    5 000f.f780.2420 to 000f.f780.242f 1.7 12.1(11r)E2 12.1(13)E8, Ok
    6 0001.0002.0003 to 0001.0002.0003 1.4 6.1(3) 7.5(0.6)HUB1 Ok
    8 000d.650a.15c0 to 000d.650a.15ff 1.6 12.1(13)E8 12.1(13)E8 Other
    Mod Sub-Module Model Serial Hw Status
    1 Policy Feature Card 2 WS-F6K-PFC2 SAL0752RKWF 3.4 Ok
    1 Cat6k MSFC 2 daughterboard WS-F6K-MSFC2 SAL0752RB28 2.6 Ok
    4 Distributed Forwarding Card WS-F6K-DFC SAL08249SUD 2.5 Ok
    5 Distributed Forwarding Card WS-F6K-DFC SAL081971W0 2.7 Ok

    Watch the logs as it boots up , my guess there is a problem with the board . We had a brand new card for a 6500 with a problem and the box will power it off if it see's a problem. Ended up RMA'ing the card . Does it show anything when you do a "show diagnostic result all" command ?

  • Cisco 4500X IOS upgrade through ISSU

    Hi,
    I am having 2 number of cisco 4500x switch and configured with VSS
    so one switch is active and another switch is standby.
    I am panning to upgrade IOS through ISSU
    i read in document that it required auto boot enable in switch.
    My switch current Configuration register = 0x2101
    do i need to change config register or this will ok. If need to change then what will be auto boot and after IOS upgrade do i need to change it again.
    Please help....

    Hello Tarun,
    Please find below the steps to perform the ISSU:
    ISSU Prerequisites
    Before one can perform an ISSU, there are a few prerequisites one must verify for a successful ISSU. The following list explains what is initially required.
    • Must be using a redundant Cisco Catalyst 4500 switch with symmetric hardware (that is, supervisors, memory, rommon, NFL daughter card, and so on).
    • Both new and old Cisco IOS Software images must be preloaded to the file system on both supervisors.
    • SSO must be configured and working properly.
    • Config register must be configured to autoboot (that is, the value should have a "2" in the lowest byte).
    45010R-203# sh bootvar | i register
    Configuration register is 0x2102
    Standby Configuration register is 0x2102
    Several commands are available to verify if SSO is enabled:
    4510R-203# sh module | b Redundancy
    Mod  Redundancy role     Operating mode      Redundancy status
    ----+-------------------+-------------------+-------------------
     1   Standby Supervisor   SSO                  Standby hot        
     2   Active Supervisor    SSO                 Active
    45010R-203# sh redundancy states 
           my state = 13 -ACTIVE 
         peer state = 8   -STANDBY HOT 
               Mode = Duplex
               Unit = Secondary
            Unit ID = 2
    Redundancy Mode (Operational) =  Stateful Switchover
    Redundancy Mode (Configured)  =  Stateful Switchover
    Redundancy State              =  Stateful Switchover
                 <snip>
    4507R-ISSU# sh run | b redundancy
    redundancy
     mode  sso
    As a step prior to the beginning of the ISSU process, the new version of the Cisco IOS Software image needs to be loaded into both the active and standby supervisors' file systems. Both active and standby supervisor need to contain both the new and old images in the file system. In order to store both new and old images, the supervisors should be upgraded to contain sufficient amounts of flash memory prior to the ISSU process.
    The new images can be downloaded into both supervisors using commands such as:
    copy tftp: bootflash:
    copy tftp: slavebootflash: 
    The example below illustrates this verification:
    4510R-203#dir
    Directory of bootflash:/
    1  -rwx 13636500 Sep 6 2006 03:18:58 -08:00 cat4500-entservices-mz.122-31.SGA
    2  -rwx 13747611 Sep 9 2006 03:19:58 -08:00 cat4500-entservices-mz.122-31.SGA1
    4510R-203#dir slavebootflash:
    Directory of slavebootflash:/
    1  -rwx 13636500 Sep 6 2006 03:18:58 -08:00 cat4500-entservices-mz.122-31.SGA
    2  -rwx 13747611 Sep 9 2006 03:19:58 -08:00 cat4500-entservices-mz.122-31.SGA1 
    Once this check is verified, one can now proceed with the ISSU process.
    The ISSU process is started by typing the "issu loadversion" command on the active supervisor. This command directs the active supervisor to begin the ISSU process. The active supervisor, through intersupervisor communications, checks that the requested image has been downloaded into both the active and standby supervisors' file systems. If the required images are not present, the command is rejected, and an appropriate warning is generated.
    If the "issu loadversion" command is successful, the switch transitions into the "Load Version" ISSU state. The standby supervisor will reset and boot with the new version of the Cisco IOS Software image loaded into the file system.
    The following actions take place when the command is implemented:
    1. The standby supervisor (B) is reset.
    2. The standby supervisor (B) is booted with the new Cisco IOS Software image: Release 12.2(31)SGA1.
    3. If both Cisco IOS Software images are declared as compatible, the standby supervisor moves into SSO mode and is fully stateful for all compatible clients and applications. Compatibility allows for in-service software upgrade or downgrade between two versions to succeed with minimal service effect.
    4. If both Cisco IOS Software images are incompatible, the system moves into RPR mode, and the ISSU process is terminated with an appropriate message to the user. Images are declared incompatible when "required" clients or applications are not interoperable between two Cisco IOS Software releases.
    5. Standby "B" reaches the standby HOT state.
    6. The user has an option to abort the ISSU process by issuing the "issu abortversion" command.
    7. The "issu loadversion" command also supports a "forced" option that allows the operator to force the system into entering RPR mode when incompatibility is detected.
    Note: When performing an ISSU, disable manual switchovers. Performing manual switchovers during the issu process is strongly discouraged. The current implementation does not prevent it, but it does display a warning to the user.
    An example of the CLI for implementing the issu loadversion command is displayed below.
    On the active supervisor, one would issue the following command:
    4510R-203#issu loadversion 1 bootflash:cat4500-entservices-mz.122-31.SGA1 2 slavebootflash: cat4500-entservices-mz.122-31.SGA1
    Syntax - issu loadversion active-slot active-image-new standby-slot standby-image-new
    The second step of the ISSU process is to perform the issu runversion CLI.
    The user can issue the " issu runversion" command when:
    1. The ISSU state is "Load Version"; this can be verified with the "show issu state detail" CLI.
    2. The standby supervisor is running the new version of the software.
    3. The standby supervisor has moved into the "Standby Hot " state.
    The following actions take place when the " issu runversion" command is executed:
    1. A switchover occurs; that is, the standby (B) becomes the new active, and the old active (A) is rebooted and comes up as a standby.
    2. A timer called "Rollback Timer" is started with a previously configured value.
    3. Move both supervisors to "Run Version" state.
    4. If the command "issu acceptversion" is not issued before the "Rollback timer" fires, then the entire ISSU process is aborted via the automatic rollback.
    5. If the active supervisor console connectivity is established and the "issu acceptversion" command is issued, then the rollback timer is stopped.
    6. The user has an option to abort the ISSU process by issuing the "issu abortversion" command.
    An example of the CLI for implementing the issu runversion command is displayed below:
    On the active supervisor, one would issue the following command:
    4510R-203#issu runversion 2 slavebootflash:cat4500-entservices-mz.122-31.SGA1
    Syntax - issu runversion standby-slot [standby-image-new]
    Prior to issuing the `issu acceptversion' command the system will be counting down the rollback timer. If `issu acceptversion' is not completed before rollback timer expires an automatic abort will occur. This command stops the "Rollback Timer." This command serves as a feedback mechanism. This is an optional command and can be skipped in the ISSU process with the "issu commitversion" CLI.
    If this command is not issued within 45 minutes (default) from the time the standby supervisor moves into the "Standby Hot" state, it is assumed that the new active supervisor is not reachable and the entire ISSU process is rolled back to the previous version of the software. The acceptversion is not intended for long-term network operation. It is also important to note that none of the features available on the new version will work yet.
    The following actions take place when the command is implemented:
    1. The "Rollback Timer" is terminated. This means that the rollback timer is not looked at anymore. Therefore, the system can run in this state for an extended period.
    2. The user has an option to abort the ISSU process by issuing the command "issu abortversion."
    Aborting the ISSU process now causes the newly active supervisor (B) to fail over to the standby supervisor (A) running the old image and will also cause the rebooting supervisor (B) to load the original image. The issu acceptversion halts the rollback timer and helps ensure the ISSU process is not automatically aborted during the process.
    An example of the CLI for implementing the issu acceptversion command is displayed below:
    On the "New" active supervisor, one would issue the following command:
    4510R-203#issu acceptversion 2
    % Rollback timer stopped. Please issue the commitversion command.
    Syntax - issu acceptversion active-slot-number
    This is the last stage of the ISSU procedure. Once the user is satisfied with the new version of software, this must be committed by issuing the "issu commitversion" command. This command resets the standby supervisor and boots it with a new version of the software (same as the active supervisor). This concludes the ISSU process, and the new version of software is permanently committed on both supervisors. Since this is the conclusion of the ISSU process, the system can not be reverted back to the previous version of the software from this point onward as a part of this upgrade cycle. However, if for any reason users wish to go back to the previous version of the software, they can do so by starting a new upgrade/downgrade process.
    The following actions take place if the command is implemented:
    1. The standby supervisor (A) is reset and booted with the new version of Cisco IOS Software image.
    2. The standby supervisor (A) moves into the "Standby Hot" state in SSO mode and is fully stateful for all clients/applications that are compatible.
    3. Both supervisors are moved into "Final State," which is the same as "Initial State."
    4. Users can initiate switchovers from this point onward.
    An example of the CLI for implementing the issu commitversion command is displayed below:
    4510R-203#issu commitversion 1
    Syntax - issu commitversion standby-slot-number
    ISSU Process: issu abortversion
    One can abort the ISSU process at any stage manually (prior to issuing the issu commitversion command) by issuing the exec-level issu abortversion command. The ISSU process also aborts on its own if the software detects a failure.
    If a user aborts the process after issuing the issu loadversion command, then the standby supervisor engine is reset and reloaded with the original software.
    If the process is aborted after a user enters either the issu runversion or issu acceptversion command, then a second switchover is performed to the new standby supervisor engine that is still running the original software version.
    The supervisor engine that had been running the new software is reset and reloaded with the original software version. The command is accepted only in "Load Version" or "Run Version" states. In "Load Version" state, the active supervisor is running an old image and the standby supervisor is running new image.
    Syntax - issu abortversion active-slot [active-image-new]
    Let me know if you have any questions.

  • Apple iPad 3. BT email not working. Cannot send emails from btconnect SMTP after iOS upgrade. This is the only difference I am aware of. Can anyone help me please.

    BT email not working. Cannot send emails from btconnect SMTP after iOS upgrade. This is the only difference I am aware of. Apple iPad 3. Can anyone help me please.

    All resolved at last
    Deleted the SMTP setting
    Recreated the SMTP using the same settings
    Able to send emails now
    No logic - as usual - just a bug!

  • Since an ios upgrade on my ipod, my device no longer appears in itunes or my computer

    Since a recent ios upgrade, I can not locate my Ipod touch 5th generation in iTunes nor in My Computer. I am working with Windows 7. I have uninstalled and reinstalled itunes, quicktime and Apple Mobile Device Support software programs. I have also gone through the on line Apple Trouble shooting support for this problem with no success.
    I did have WiFi syncing turned on before the upgrade and now when I go into settings on my iPod, the sync now option is greyed out.
    Any other ideas please...

    OK, never mind. After all that, a restart of the iPhone fixed it. That should have been the first thing I tried, of course, before posting. Sorry about that!

  • I bought a Sandisk Connect Media Drive, downloaded the app from iTunes.  Before iOS 8, movies played fine.  After iOS upgrade I can no longer play movies downloaded from iTunes to the media drive.  Anyone else have a similar issue?

    I bought a Sandisk Connect Media Drive, downloaded the app from iTunes.  Before iOS 8, movies played fine.  After iOS upgrade I can no longer play movies downloaded from iTunes to the media drive.  Anyone else have a similar issue?

    I checked with SanDisk's own online support and they indicate that they have notified Apple of the issue.
    According to SanDisk, the problem lies with Apple not having the iOS 8 version of the Safari browser having DRM decoding enabled that the Media Drive relies upon to decode and play iTunes DRM titles. Non DRM encoded videos will play in the browser.
    DRM audio is not effected as this is handled by the native iOS music app.
    As of the date of this post SanDisk have not been given a timeframe by Apple for this issue to be resolved.
    I hope that Apple resolves this issue quickly as I have a large collection of DRM video titles on a 128Mb memory card installed in the Media Drive that I am unable to view.

  • IPAD Mini Locked after iOS upgrade, tried reset on iPAD did not work, plugged in and device not appearing in iTUNEs for reset/restore

    PAD Mini Locked after iOS upgrade, tried reset on iPAD did not work, plugged in and device not appearing in iTUNEs for reset/restore.  Just get an Apple Logo then a flashing blue screen as if it is caught booting up.   This has happened twice before and iTunes restore fixed it.  But this time device not appearing in iTunes.
    Running iTunes for PC.  But as stated restore has worked before!  Any help greatly appreciated!!

    Place the device in DFU mode and let iTunes restore the device to factory condition.

  • Why are the calendars on my Mac no longer syncing with my iPhone and/or my iPad since the last IOS upgrade?

    Since installing the IOS upgrade, it seems impossible to sync the calendar(s) on my iMac (via the cloud OR via cable) with my iPhone 4 or my iPad (last generation).
    Any thoughts?

    What happens when you try to sync? Error messages?

  • Ios upgrade stopped my external hard drives and keep changing my laptop keyboards

    Latest ios upgrade stopped my computers from contacting and saving in my external hard drives and keeps changing my laptop keyboards everytime I turn it on. Please Apple solve this because I know that many people suffer from this. If you do not I will stop my almost 30 year old use of Apples.

    iOS has nothing to do with devices connected to your computer.  It also has nothing to do with your keyboard.  What have you done and when?
    Barry

  • ASA 5585 IOS upgradation from 8.2(5) to 9.0(2)

    Hi,
    I am getting below warning messages when i am doing IOS upgradation of ASA5585.The current version of IOS is 8.2(5) and the converted version is 9.0(2). I would like to know whether i can ignore the warnings and move on with new version or need to do any manual changes in configuration.
    This is my internet firewall which has DMZ  as well.
    WARNING: MIGRATION: ACE converted to real IP/port values based on
    dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing policy NAT ACL
    Thanks
    Soumya

    Hi ,
    Sorry, I forgot to mention that we have upgraded from  8.2->8.4.6>9.02.
    We have multiple warning messages like below. A huge number of inbound access rules have been created in new version and we are worried whether this will creat a security loop.
    WARNING: MIGRATION: ACE converted to real IP/port values based on
    dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing policy NAT ACL
    216.163.252.25
    8.2(5)
    access-list outside extended permit udp host 216.163.252.25 host 203.99.194.163
    access-list outside extended permit esp host 216.163.252.25 host 203.99.194.163
    access-list Metlife-VPN extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.237.164.0 255.255.254.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.237.241.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.230.107.128 255.255.255.224 host 216.163.252.25
    access-list inside1 extended permit udp 10.237.164.0 255.255.254.0 host 216.163.252.25
    access-list inside1 extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list inside1 extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit ip host 10.239.23.177 host 216.163.252.25
    access-list outside extended permit ip any host 203.99.194.163
    9.0(2)
    object network obj-216.163.252.25
    host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.237.164.0 255.255.254.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.237.241.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.230.107.128 255.255.255.224 host 216.163.252.25
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.56
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.72
    access-list outside extended permit udp host 216.163.252.25 10.239.24.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.15
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.94
    access-list outside extended permit udp host 216.163.252.25 host 10.239.24.138
    access-list outside extended permit udp host 216.163.252.25 10.239.23.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.101
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.208
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.20
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.78
    access-list outside extended permit udp host 216.163.252.25 10.239.48.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.73
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.204
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.178
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.187
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.28
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.144
    access-list outside extended permit udp host 216.163.252.25 host 10.239.48.105
    access-list outside extended permit udp host 216.163.252.25 10.237.23.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.179
    access-list outside extended permit udp host 216.163.252.25 10.237.164.0 255.255.254.0
    access-list outside extended permit udp host 216.163.252.25 10.239.50.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.46
    access-list outside extended permit udp host 216.163.252.25 host 10.237.165.120
    access-list outside extended permit udp host 216.163.252.25 10.239.50.0 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.11
    access-list outside extended permit udp host 216.163.252.25 host 10.239.48.142
    access-list outside extended permit udp host 216.163.252.25 host 10.239.48.12
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.45
    access-list outside extended permit udp host 216.163.252.25 host 10.237.173.12
    access-list outside extended permit udp host 216.163.252.25 host 10.237.164.72
    access-list outside extended permit udp host 216.163.252.25 host 10.237.173.13
    access-list outside extended permit udp host 216.163.252.25 host 10.239.20.145
    access-list outside extended permit udp host 216.163.252.25 host 10.239.41.23
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.128
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.146
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.137
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.144
    access-list outside extended permit udp host 216.163.252.25 10.230.144.64 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.229.32.0 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.242.50.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.153
    access-list outside extended permit udp host 216.163.252.25 host 10.242.50.68
    access-list outside extended permit udp host 216.163.252.25 host 10.232.8.176
    access-list outside extended permit udp host 216.163.252.25 10.242.0.128 255.255.255.128
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.198
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.199
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.201
    access-list outside extended permit udp host 216.163.252.25 10.230.107.192 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.202
    access-list outside extended permit udp host 216.163.252.25 10.237.226.0 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 10.242.146.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.197
    access-list outside extended permit udp host 216.163.252.25 host 10.229.59.109
    access-list outside extended permit udp host 216.163.252.25 10.242.97.128 255.255.255.128
    access-list outside extended permit udp host 216.163.252.25 10.242.36.64 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.237.241.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.237.241.14
    access-list outside extended permit udp host 216.163.252.25 host 10.237.241.68
    access-list outside extended permit udp host 216.163.252.25 host 10.237.241.94
    access-list outside extended permit udp host 216.163.252.25 host 10.237.173.15
    access-list outside extended permit udp host 216.163.252.25 10.242.212.0 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.242.51.128 255.255.255.128
    access-list outside extended permit udp host 216.163.252.25 10.242.210.192 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 host 10.242.146.18
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.168
    access-list outside extended permit udp host 216.163.252.25 host 10.239.48.31
    access-list outside extended permit udp host 216.163.252.25 host 10.242.195.204
    access-list outside extended permit udp host 216.163.252.25 10.242.195.192 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.230.241.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 10.230.103.128 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.144
    access-list outside extended permit udp host 216.163.252.25 10.230.107.128 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 10.211.202.224 255.255.255.240
    access-list outside extended permit udp host 216.163.252.25 host 10.211.211.221
    access-list outside extended permit udp host 216.163.252.25 host 10.229.34.43
    access-list outside extended permit udp host 216.163.252.25 host 10.229.34.49
    access-list outside extended permit udp host 216.163.252.25 host 10.232.38.160
    access-list outside extended permit udp host 216.163.252.25 host 10.232.130.93
    access-list outside extended permit udp host 216.163.252.25 host 10.233.38.151
    access-list outside extended permit udp host 216.163.252.25 host 10.236.147.50
    access-list outside extended permit udp host 216.163.252.25 host 10.236.147.71
    access-list outside extended permit udp host 216.163.252.25 host 10.236.147.83
    access-list outside extended permit udp host 216.163.252.25 host 10.236.180.4
    access-list outside extended permit udp host 216.163.252.25 host 10.237.9.83
    access-list outside extended permit udp host 216.163.252.25 host 10.237.9.93
    access-list outside extended permit udp host 216.163.252.25 host 10.237.77.39
    access-list outside extended permit udp host 216.163.252.25 host 10.237.77.74
    access-list outside extended permit udp host 216.163.252.25 host 10.237.77.76
    access-list outside extended permit udp host 216.163.252.25 host 10.237.173.8
    access-list outside extended permit udp host 216.163.252.25 host 10.237.241.24
    access-list outside extended permit udp host 216.163.252.25 host 10.237.241.183
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.13
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.71
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.108
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.109
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.120
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.170
    access-list outside extended permit udp host 216.163.252.25 host 10.239.24.26
    access-list outside extended permit udp host 216.163.252.25 host 10.239.24.158
    access-list outside extended permit udp host 216.163.252.25 host 10.239.24.222
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.20
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.34
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.41
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.42
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.52
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.60
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.64
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.73
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.81
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.82
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.90
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.114
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.141
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.151
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.155
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.205
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.224
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.233
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.238
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.239
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.251
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.26
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.52
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.57
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.72
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.90
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.93
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.107
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.161
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.171
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.184
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.185
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.196
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.208
    access-list outside extended permit udp host 216.163.252.25 host 10.239.38.17
    access-list outside extended permit udp host 216.163.252.25 host 10.239.41.34
    access-list outside extended permit udp host 216.163.252.25 host 10.239.41.68
    access-list outside extended permit udp host 216.163.252.25 host 10.239.41.72
    access-list outside extended permit udp host 216.163.252.25 host 10.239.41.78
    access-list outside extended permit udp host 216.163.252.25 host 10.239.48.143
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.10
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.15
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.31
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.35
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.52
    access-list outside extended permit udp host 216.163.252.25 host 10.239.60.100
    access-list outside extended permit udp host 216.163.252.25 host 10.239.67.18
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.17
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.23
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.34
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.42
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.53
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.75
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.76
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.77
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.114
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.117
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.118
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.120
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.136
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.143
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.15
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.17
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.35
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.48
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.90
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.116
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.140
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.168
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.183
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.26
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.53
    access-list outside extended permit udp host 216.163.252.25 host 10.242.11.29
    access-list outside extended permit udp host 216.163.252.25 host 10.242.11.31
    access-list outside extended permit udp host 216.163.252.25 host 10.242.11.80
    access-list outside extended permit udp host 216.163.252.25 host 10.242.11.81
    access-list outside extended permit udp host 216.163.252.25 host 10.242.22.133
    access-list outside extended permit udp host 216.163.252.25 host 10.242.22.134
    access-list outside extended permit udp host 216.163.252.25 host 10.242.22.154
    access-list outside extended permit udp host 216.163.252.25 host 10.242.36.76
    access-list outside extended permit udp host 216.163.252.25 host 10.242.36.79
    access-list outside extended permit udp host 216.163.252.25 host 10.242.36.118
    access-list outside extended permit udp host 216.163.252.25 host 10.242.146.29
    access-list outside extended permit udp host 216.163.252.25 host 10.242.158.227
    access-list outside extended permit udp host 216.163.252.25 host 10.242.195.197
    access-list outside extended permit udp host 216.163.252.25 host 207.41.226.145
    access-list outside extended permit udp host 216.163.252.25 10.233.38.144 255.255.255.248
    access-list outside extended permit udp host 216.163.252.25 10.230.132.160 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 10.230.134.0 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 10.242.68.160 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 10.233.38.150 255.255.255.222
    access-list outside extended permit udp host 216.163.252.25 10.229.144.0 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.236.84.64 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.237.84.128 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.239.47.192 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.242.90.64 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.230.137.128 255.255.255.128
    access-list outside extended permit udp host 216.163.252.25 10.239.56.0 255.255.255.128
    access-list outside extended permit udp host 216.163.252.25 10.237.22.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.56
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.72
    access-list outside extended permit esp host 216.163.252.25 10.239.24.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.15
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.94
    access-list outside extended permit esp host 216.163.252.25 host 10.239.24.138
    access-list outside extended permit esp host 216.163.252.25 10.239.23.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.101
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.208
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.20
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.78
    access-list outside extended permit esp host 216.163.252.25 10.239.48.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.73
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.204
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.178
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.187
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.28
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.144
    access-list outside extended permit esp host 216.163.252.25 host 10.239.48.105
    access-list outside extended permit esp host 216.163.252.25 10.237.23.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.179
    access-list outside extended permit esp host 216.163.252.25 10.237.164.0 255.255.254.0
    access-list outside extended permit esp host 216.163.252.25 10.239.50.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.46
    access-list outside extended permit esp host 216.163.252.25 host 10.237.165.120
    access-list outside extended permit esp host 216.163.252.25 10.239.50.0 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.11
    access-list outside extended permit esp host 216.163.252.25 host 10.239.48.142
    access-list outside extended permit esp host 216.163.252.25 host 10.239.48.12
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.45
    access-list outside extended permit esp host 216.163.252.25 host 10.237.173.12
    access-list outside extended permit esp host 216.163.252.25 host 10.237.164.72
    access-list outside extended permit esp host 216.163.252.25 host 10.237.173.13
    access-list outside extended permit esp host 216.163.252.25 host 10.239.20.145
    access-list outside extended permit esp host 216.163.252.25 host 10.239.41.23
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.128
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.146
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.137
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.144
    access-list outside extended permit esp host 216.163.252.25 10.230.144.64 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.229.32.0 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.242.50.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.153
    access-list outside extended permit esp host 216.163.252.25 host 10.242.50.68
    access-list outside extended permit esp host 216.163.252.25 host 10.232.8.176
    access-list outside extended permit esp host 216.163.252.25 10.242.0.128 255.255.255.128
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.198
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.199
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.201
    access-list outside extended permit esp host 216.163.252.25 10.230.107.192 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.202
    access-list outside extended permit esp host 216.163.252.25 10.237.226.0 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 10.242.146.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.197
    access-list outside extended permit esp host 216.163.252.25 host 10.229.59.109
    access-list outside extended permit esp host 216.163.252.25 10.242.97.128 255.255.255.128
    access-list outside extended permit esp host 216.163.252.25 10.242.36.64 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.237.241.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.237.241.14
    access-list outside extended permit esp host 216.163.252.25 host 10.237.241.68
    access-list outside extended permit esp host 216.163.252.25 host 10.237.241.94
    access-list outside extended permit esp host 216.163.252.25 host 10.237.173.15
    access-list outside extended permit esp host 216.163.252.25 10.242.212.0 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.242.51.128 255.255.255.128
    access-list outside extended permit esp host 216.163.252.25 10.242.210.192 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 host 10.242.146.18
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.168
    access-list outside extended permit esp host 216.163.252.25 host 10.239.48.31
    access-list outside extended permit esp host 216.163.252.25 host 10.242.195.204
    access-list outside extended permit esp host 216.163.252.25 10.242.195.192 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.230.241.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 10.230.103.128 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.144
    access-list outside extended permit esp host 216.163.252.25 10.230.107.128 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 10.211.202.224 255.255.255.240
    access-list outside extended permit esp host 216.163.252.25 host 10.211.211.221
    access-list outside extended permit esp host 216.163.252.25 host 10.229.34.43
    access-list outside extended permit esp host 216.163.252.25 host 10.229.34.49
    access-list outside extended permit esp host 216.163.252.25 host 10.232.38.160
    access-list outside extended permit esp host 216.163.252.25 host 10.232.130.93
    access-list outside extended permit esp host 216.163.252.25 host 10.233.38.151
    access-list outside extended permit esp host 216.163.252.25 host 10.236.147.50
    access-list outside extended permit esp host 216.163.252.25 host 10.236.147.71
    access-list outside extended permit esp host 216.163.252.25 host 10.236.147.83
    access-list outside extended permit esp host 216.163.252.25 host 10.236.180.4
    access-list outside extended permit esp host 216.163.252.25 host 10.237.9.83
    access-list outside extended permit esp host 216.163.252.25 host 10.237.9.93
    access-list outside extended permit esp host 216.163.252.25 host 10.237.77.39
    access-list outside extended permit esp host 216.163.252.25 host 10.237.77.74
    access-list outside extended permit esp host 216.163.252.25 host 10.237.77.76
    access-list outside extended permit esp host 216.163.252.25 host 10.237.173.8
    access-list outside extended permit esp host 216.163.252.25 host 10.237.241.24
    access-list outside extended permit esp host 216.163.252.25 host 10.237.241.183
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.13
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.71
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.108
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.109
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.120
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.170
    access-list outside extended permit esp host 216.163.252.25 host 10.239.24.26
    access-list outside extended permit esp host 216.163.252.25 host 10.239.24.158
    access-list outside extended permit esp host 216.163.252.25 host 10.239.24.222
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.20
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.34
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.41
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.42
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.52
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.60
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.64
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.73
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.81
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.82
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.90
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.114
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.141
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.151
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.155
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.205
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.224
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.233
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.238
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.239
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.251
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.26
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.52
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.57
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.72
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.90
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.93
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.107
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.161
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.171
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.184
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.185
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.196
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.208
    access-list outside extended permit esp host 216.163.252.25 host 10.239.38.17
    access-list outside extended permit esp host 216.163.252.25 host 10.239.41.34
    access-list outside extended permit esp host 216.163.252.25 host 10.239.41.68
    access-list outside extended permit esp host 216.163.252.25 host 10.239.41.72
    access-list outside extended permit esp host 216.163.252.25 host 10.239.41.78
    access-list outside extended permit esp host 216.163.252.25 host 10.239.48.143
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.10
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.15
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.31
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.35
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.52
    access-list outside extended permit esp host 216.163.252.25 host 10.239.60.100
    access-list outside extended permit esp host 216.163.252.25 host 10.239.67.18
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.17
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.23
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.34
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.42
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.53
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.75
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.76
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.77
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.114
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.117
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.118
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.120
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.136
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.143
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.15
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.17
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.35
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.48
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.90
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.116
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.140
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.168
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.183
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.26
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.53
    access-list outside extended permit esp host 216.163.252.25 host 10.242.11.29
    access-list outside extended permit esp host 216.163.252.25 host 10.242.11.31
    access-list outside extended permit esp host 216.163.252.25 host 10.242.11.80
    access-list outside extended permit esp host 216.163.252.25 host 10.242.11.81
    access-list outside extended permit esp host 216.163.252.25 host 10.242.22.133
    access-list outside extended permit esp host 216.163.252.25 host 10.242.22.134
    access-list outside extended permit esp host 216.163.252.25 host 10.242.22.154
    access-list outside extended permit esp host 216.163.252.25 host 10.242.36.76
    access-list outside extended permit esp host 216.163.252.25 host 10.242.36.79
    access-list outside extended permit esp host 216.163.252.25 host 10.242.36.118
    access-list outside extended permit esp host 216.163.252.25 host 10.242.146.29
    access-list outside extended permit esp host 216.163.252.25 host 10.242.158.227
    access-list outside extended permit esp host 216.163.252.25 host 10.242.195.197
    access-list outside extended permit esp host 216.163.252.25 host 207.41.226.145
    access-list outside extended permit esp host 216.163.252.25 10.233.38.144 255.255.255.248
    access-list outside extended permit esp host 216.163.252.25 10.230.132.160 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 10.230.134.0 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 10.242.68.160 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 10.233.38.150 255.255.255.222
    access-list outside extended permit esp host 216.163.252.25 10.229.144.0 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.236.84.64 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.237.84.128 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.239.47.192 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.242.90.64 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.230.137.128 255.255.255.128
    access-list outside extended permit esp host 216.163.252.25 10.239.56.0 255.255.255.128
    access-list outside extended permit esp host 216.163.252.25 10.237.22.0 255.255.255.0
    access-list inside1 extended permit udp 10.237.164.0 255.255.254.0 host 216.163.252.25
    access-list inside1 extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list inside1 extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit ip host 10.239.23.177 host 216.163.252.25
    nat (inside,outside) source dynamic obj-10.239.48.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
    nat (inside,outside) source dynamic obj-10.237.164.0-01 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
    nat (inside,outside) source dynamic obj-10.229.32.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
    nat (inside,outside) source dynamic obj-10.242.146.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
    nat (inside,outside) source dynamic obj-10.237.241.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
    nat (inside,outside) source dynamic obj-10.230.107.128 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25

  • Is it possible to install an iOS upgrade from a computer other than your sync computer?

    Hello,
    Is it possible to install an iOS upgrade from a computer other than your sync computer? I usually sync to my tower at home, but only have access to my laptop now. My laptop is authorized to the same iTunes account as the tower. If I do a software update for the iPhone on the laptop's copy of iTunes, will it wipe away my music that isn't from the iTunes store, etc?
    Thanks,
    Will

    Yes, but all your data will be replaced by whatever is on this other computer. So if you don't want that to happen wait and install on the computer with which the device is normally synced.

Maybe you are looking for

  • Error during VM container communication between ABAB and Java

    Hi All Once in a while we get this error while creating shopping cart. 'Error during VM container communication between ABAB and Java" Why ?  only one user has thos problem SAP SRM 5 .0 what could be the reason ? It is not happening always. any help

  • How to start TOOLSProcessManager  in linux R12

    Hi, We are using Oracle Apps R12 windows and Linux. i have start in windows OracleSIT_sitartha_TOOLSProcessManager from services.msc but how to start in linux ? i have check in linux [applmgr@r12 ~]$ /ora/oracle/VIS/apps/tech_st/10.1.2/opmn/bin/opmnc

  • Project Special stock indicator PROJ-KZBWS

    Hi, I created a project with TCODE CJ20N. The project's valuation indicator(KZBWS) is assuming "M" and this field was not visible at moment of creation, Is there any config  to define "A" ? Regards, Menoita

  • PIN via e-mail

    I'm now in Germany, I bought a Prepaidcard "Gophone" in July, I would like to create a account via Internet, I enter the pin and next step is to choose a new pin, send now to my cellphone-number, in germany I get no At+t service, can I get the new pi

  • Ampache configuration

    Hello friends, I want to use ampache ( A web frontend for mpd) with arch linux. when I configured httpd  and pointed the browser towards the ampache directory I am getting the index.php files as a text file. I added; <IfModule dir_module> DirectoryIn