Cisco 501 port forward PDM


I've just upgraded to a PIX 501 (6.2)for my home network. I've been trying to configure a port forward to an internal web server ( from the external interface which is DHCP from my ISP.

From reading various posts it appears this can not be done by the PDM alone..?? I'm juts learning the command line so have been using the PDM as much as possible and the command line.

So from the cli I've added;

static (inside,outside) tcp interface www www netmask

The problem is traffic is dropped (error message = deny tcp src outside: x.x.x.x/port dst inside: ip/80 by access group "outside_access_in") when using the config below.

I can however make this work by changing the access rule to any / on the PDM - but I guess this is not advisable..

Any help would be much appreciated


Building configuration... : Saved : PIX Version 6.2(2) nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted hostname pixfirewall domain-name fixup protocol ftp 21 fixup protocol http 80 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol ils 389 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol sip 5060 fixup protocol skinny 2000 names access-list outside_access_in permit tcp any host eq www pager lines 24 logging on logging timestamp logging trap informational logging host inside interface ethernet0 10baset interface ethernet1 10full mtu outside 1500 mtu inside 1500 ip address outside dhcp setroute ip address inside ip audit info action alarm ip audit attack action alarm pdm location inside pdm location outside pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 0 0 static (inside,outside) tcp interface www www netmask 0 0 static (outside,inside) tcp interface www www netmask 0 0 access-group outside_access_in in interface outside timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local http server enable http inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable no sysopt route dnat telnet timeout 5 ssh timeout 5 dhcpd address inside dhcpd lease 3600 dhcpd ping_timeout 750 dhcpd auto_config outside dhcpd enable inside terminal width 80 Cryptochecksum:65e69a93df50a3c1755f556a31ea4a43 : end [OK]
Reply to
William Bain
Loading thread data ...

Change access-list outside_access_in permit tcp any host eq www

to access-list outside_access_in permit tcp any any eq www

Reply to
oTTo Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.