I've tried the suggestion and still isn't working. The log shows the following error when an outside request is attempted. "Inbound TCP connection denied... flags SYN on interface outside". I'm at a bit of a loss about why.
As a side note, you'll see that I'm NATing the inside interface through the firewall. Is this contributing to the problem?
Last, for the development exercise, the "outside" interface is connected to an internal LAN. This will change at deployment, but explains the non-routable addresses on the outside interface.
Tx,
Sam
Scrubbed config follows...
ASA Version 7.0(6)
!
hostname ...
domain-name ...
enable password ...
names
dns-guard
!
interface Ethernet0/0
nameif outside
security-level 10
ip address 192.168.5.241 255.255.255.248
!
interface Ethernet0/1
nameif dmz
security-level 25
ip address 192.168.20.1 255.255.255.0
!
interface Ethernet0/2
nameif inside
security-level 50
ip address 192.168.30.1 255.255.255.0
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif management
security-level 99
ip address 192.168.250.1 255.255.255.0
management-only
!
passwd ...
ftp mode passive
dns domain-lookup dmz
dns domain-lookup inside
dns name-server 192.168.55.1
access-list inside_access_in extended permit ip any any
access-list outside_in extended permit tcp any host 192.168.5.244 eq www
mtu outside 1500
mtu dmz 1500
mtu inside 1500
mtu management 1500
no failover
monitor-interface outside
monitor-interface dmz
monitor-interface inside
monitor-interface management
icmp permit any dmz
icmp permit any inside
asdm image disk0:/asdm506.bin
arp timeout 14400
nat-control
global (outside) 1 192.168.5.242
static (inside,outside) tcp 192.168.30.50 8080 192.168.5.244
255.255.255.255
static (inside,outside) 192.168.5.0 192.168.30.0 netmask 255.255.255.0
access-group outside_in in interface inside
route outside 0.0.0.0 0.0.0.0 192.168.5.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
snmp-server enable traps snmp authentication linkup linkdown coldstart
ssh 192.168.250.0 255.255.255.0 management
ssh timeout 5
console timeout 0
dhcpd address 192.168.30.50-192.168.30.250 inside
dhcpd address 192.168.250.2-192.168.250.254 management
dhcpd dns 192.168.55.1 ...
...
!
class-map inspection_default
match default-inspection-traffic
!
!