This is a well worn problem, but I am not picking up the tricks which allow traffic to the dmz. I want to allow
primary allow
1) www/https from anything outside to the dmz 2) ssh from the inside to the webserver 3) 53/udp from webserver to known external dns hosts 4) 123/udp from webserver to known external ntp hostssecondary allow
1) ssh from a defined source to the webserver 2) ssh from a defined source to a specific internal host, 192.168.0.21here's my current config : Saved PIX Version 6.3(3) interface ethernet0 auto interface ethernet1 100full interface ethernet2 auto nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif ethernet2 dmz security30 enable password 7HdMXPMNkRbJ1zyt encrypted passwd XOqQSgghqw/XrF5S encrypted hostname ***name*** domain-name r3g.net fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol pptp 1723 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names name 192.168.0.15 **insidehost** name xx.xx.239.23 firewall name 192.168.10.1 service name 192.168.10.3 webserver access-list service permit tcp any host firewall eq www access-list service permit tcp any host firewall eq https access-list service permit icmp any interface dmz access-list outside permit udp host 10.100.192.1 host firewall eq bootpc access-list outside permit tcp any host webserver eq www access-list outside permit tcp any host webserver eq https access-list outside permit icmp any any echo-reply access-list outside permit icmp any any unreachable access-list outside permit icmp any any time-exceeded pager lines 24 logging on logging timestamp logging standby logging buffered debugging logging trap notifications logging facility 19 logging host inside **iinsidehost** icmp permit any echo-reply outside icmp permit any time-exceeded outside icmp permit any unreachable outside icmp permit any inside mtu outside 1500 mtu inside 1500 mtu dmz 1500 ip address outside firewall 255.255.255.192 ip address inside network 255.255.255.0 ip address dmz service 255.255.255.0 ip audit info action alarm ip audit attack action alarm no pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 192.168.0.0 255.255.255.0 0 0 access-group outside in interface outside route outside 0.0.0.0 0.0.0.0 xx.xx.239.1 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225
1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local http server enable http 192.168.0.0 255.255.255.0 inside snmp-server host inside **insidehost** snmp-server location ccna_closet snmp-server enable traps tftp-server inside **insidehost** /pix floodguard enable telnet timeout 5 ssh 192.168.0.0 255.255.255.0 inside ssh timeout 60 console timeout 0terminal width 80 Cryptochecksum:ff291fef2f248d7dd0ae1e442a17df6c : end