Port 8082

I hope not to get flamed here. I have a pix 515e ios 6.3(3). I have a machine that I need to access port 8082 from the outside. I created a access list for it but somehow think I need a nat for it which is totally confusing me. Here is most of my conf

PIX Version 6.3(3) interface ethernet0 100full interface ethernet1 auto interface ethernet2 auto shutdown interface ethernet3 auto shutdown interface ethernet4 auto shutdown interface ethernet5 auto shutdown nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif ethernet2 intf2 security4 nameif ethernet3 intf3 security6 nameif ethernet4 intf4 security8 nameif ethernet5 intf5 security10 enable password vOtpcIryL8coK1xI encrypted passwd ZSFSZ58TFmg2m3.3 encrypted hostname pixfirewall domain-name usaniagara.local clock timezone EST -5 clock summer-time EDT recurring fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 no fixup protocol rsh 514 fixup protocol rsh 3389-3390 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names name 10.10.40.12 RAIDUS name 10.10.40.10 server2 name 63.139.41.28 server object-group service rdp tcp description rdp port-object range 3389 3389 object-group service rdpboth tcp-udp port-object range 3389 3389 access-list inside_outbound_nat0_acl permit ip any 10.10.100.0

255.255.255.224 access-list inside_outbound_nat0_acl permit ip any 192.168.50.0 255.255.255.0 access-list inside_outbound_nat0_acl permit ip any 10.10.40.0 255.255.255.0 access-list outside_cryptomap_dyn_20 permit ip any 10.10.100.0 255.255.255.224 access-list acl permit tcp any host 63.139.41.26 eq 3389 access-list inside_authentication_LOCAL permit tcp any interface outside access-list outside_access_in permit tcp any object-group rdp host server object-group rdp access-list outside_access_in permit ip host server 63.139.41.0 255.255.255.0 access-list outside_access_in permit tcp any eq www host server eq www access-list outside_access_in permit icmp any any echo-reply access-list outside_access_in permit tcp any eq 8082 host server eq 8082 pager lines 24 mtu outside 1500 mtu inside 1500 mtu intf2 1500 mtu intf3 1500 mtu intf4 1500 mtu intf5 1500 ip address outside 63.139.41.26 255.255.255.248 ip address inside 10.10.40.5 255.255.255.0 no ip address intf2 no ip address intf3 no ip address intf4 no ip address intf5 ip audit info action alarm ip audit attack action alarm ip local pool remote 192.168.50.10-192.168.50.50 ip local pool remote2 10.10.100.10-10.10.100.50 no failover failover timeout 0:00:00 failover poll 15 no failover ip address outside no failover ip address inside no failover ip address intf2 no failover ip address intf3 no failover ip address intf4 no failover ip address intf5 pdm location 10.10.100.0 255.255.255.224 outside pdm location RAIDUS 255.255.255.255 inside pdm location 192.168.50.0 255.255.255.0 outside pdm location 10.10.40.0 255.255.255.0 outside pdm location 63.139.41.27 255.255.255.255 outside pdm location 63.139.41.0 255.255.255.0 outside pdm location 63.139.0.0 255.255.0.0 outside pdm location server2 255.255.255.255 inside pdm location server 255.255.255.255 outside pdm location 63.139.41.29 255.255.255.255 outside pdm location 10.10.40.70 255.255.255.255 inside pdm history enable arp timeout 14400 global (outside) 10 interface nat (inside) 0 access-list inside_outbound_nat0_acl nat (inside) 10 0.0.0.0 0.0.0.0 0 0 static (inside,outside) server server2 netmask 255.255.255.255 0 0 access-group outside_access_in in interface outside route outside 0.0.0.0 0.0.0.0 63.139.41.25 1 route outside server 255.255.255.255 63.139.41.25 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local aaa authentication match inside_authentication_LOCAL inside LOCAL http server enable http 0.0.0.0 0.0.0.0 outside http 0.0.0.0 0.0.0.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-pptp sysopt connection permit-l2tp crypto ipsec transform-set TRANS_ESP_3DES_MD5 esp-3des esp-md5-hmac crypto ipsec transform-set TRANS_ESP_3DES_MD5 mode transport crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20 crypto dynamic-map outside_dyn_map 20 set transform-set TRANS_ESP_3DES_MD5 crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map crypto map outside_map interface outside isakmp enable outside isakmp policy 20 authentication rsa-sig isakmp policy 20 encryption 3des isakmp policy 20 hash md5 isakmp policy 20 group 2 isakmp policy 20 lifetime 86400

Any help would be greatly appreciated.

-Sam

Reply to
samothyev
Loading thread data ...

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.