i've got a working config but now need to port forward HTTPS / PPTP / SMTP to a server on our network, we've got four IP addresses assigned 2 of which are usable - 1 for the router and the 2nd for the firewall.
whenever i add this command it all goes wrong and i can no longer get internet access
static (inside,outside) interface 10.0.0.200 netmask 255.255.255.255 0
0Any help would be appreciated
Regards
Paul
the current config is below:
interface ethernet0 auto interface ethernet1 auto nameif ethernet0 outside security0 nameif ethernet1 inside security100 fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol ils 389 fixup protocol pptp 1723 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names access-list out-acl permit icmp any any echo-reply access-list out-acl permit icmp any any unreachable access-list out-acl permit icmp any any time-exceeded access-list out-acl permit icmp any any source-quench access-list out-acl permit icmp any any parameter-problem access-list out-acl permit tcp any any eq ssh access-list out-acl permit tcp any any eq pptp access-list out-acl permit tcp any any eq smtp access-list out-acl permit gre any any access-list out-acl permit icmp any any access-list acl100 permit udp 10.0.0.0 255.255.255.0 any eq 5903 access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq 5904 access-list acl100 permit udp 10.0.0.0 255.255.255.0 any eq 5904 access-list acl100 permit gre 10.0.0.0 255.255.255.0 any access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq pop3 access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq www access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq https access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq ftp-data access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq ftp access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq smtp access-list acl100 permit icmp 10.0.0.0 255.255.255.0 any access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq domain access-list acl100 permit udp 10.0.0.0 255.255.255.0 any eq domain access-list acl100 permit udp 10.0.0.0 255.255.255.0 any eq ntp access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq ssh access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq 5900 access-list acl100 permit udp 10.0.0.0 255.255.255.0 any eq 5900 access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq 5901 access-list acl100 permit udp 10.0.0.0 255.255.255.0 any eq 5901 access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq 5902 access-list acl100 permit udp 10.0.0.0 255.255.255.0 any eq 5902 access-list acl100 permit tcp 10.0.0.0 255.255.255.0 any eq 5903 pager lines 24 logging on logging timestamp logging trap debugging logging facility 22 mtu outside 1500 mtu inside 1500 ip address outside xxx.xxx.xxx.14 255.255.255.252 ip address inside 10.0.0.200 255.255.255.0 ip audit info action alarm ip audit attack action alarm ip local pool pool1 192.168.128.1-192.168.128.63 pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 0.0.0.0 0.0.0.0 0 0 access-group out-acl in interface outside access-group acl100 in interface inside route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.13 1 timeout xlate 1193:00:00 timeout conn 1193:00:00 half-closed 1193:00:00 udp 2:00:00 rpc 1:20:00 h225 1:00:00 timeout h323 0:40:00 mgcp 0:05:00 sip 4:00:00 sip_media 0:16:00 timeout sip-disconnect 0:02:00 sip-invite 0:03:00 timeout uauth 0:40:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local http server enable http 10.0.0.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable telnet 0.0.0.0 0.0.0.0 inside telnet timeout 5 ssh 0.0.0.0 0.0.0.0 outside ssh timeout 5 console timeout 0 vpdn group 1 accept dialin pptp vpdn group 1 ppp authentication pap vpdn group 1 ppp authentication chap vpdn group 1 ppp authentication mschap vpdn group 1 client configuration address local pool1 vpdn group 1 pptp echo 60 vpdn group 1 client authentication local vpdn username administrator password ******** vpdn enable outside terminal width 80