Hello. I have a weird situation. I have a pix 501 and have a few static assignments for some pc's behind the firewall. These people can access anything outside the firewall EXCEPT our mail server. Now, anyone behind the firewall getting a dhcp assignment from a server can access the mail server fine. Any ideas as to what would be causing this? I have a PIX 515 configured and running great for about 2 months now...the static assignments don't have this issue. Any insight is appreciated.
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password aLWqpVQyMGCjOo33 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname tepix
domain-name example.com
clock timezone CST -6
clock summer-time CDT recurring
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
access-list 101 permit ip 192.168.20.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list 101 permit ip any 192.168.1.0 255.255.255.192
access-list outside_access_in permit tcp any host x.x.x.88 eq ftp
pager lines 24
logging on
logging buffered warnings
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside x.x.x.249 255.255.255.0
ip address inside 192.168.20.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool pptp-pool 192.168.1.1-192.168.1.50
pdm location x.x.x.222 255.255.255.255 outside
pdm location 192.168.20.60 255.255.255.255 inside
pdm logging warnings 512
pdm history enable
arp timeout 60
global (outside) 1 interface
nat (inside) 0 access-list 101
nat (inside) 1 192.168.20.0 255.255.255.0 0 0
static (inside,outside) x.x.x TENA netmask 255.255.255.255 0 0
static (inside,outside) x.x.x.104 NAMO netmask 255.255.255.255 0 0
static (inside,outside) x.x.x.60 192.168.20.60 netmask 255.255.255.255 0 0
static (inside,outside) x.x.x.88 EUROPA dns netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 x.x.x.1 1
route inside EUROPA 255.255.255.255 192.168.20.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http x.x.x.0 255.255.255.0 outside
http 192.168.20.0 255.255.255.0 inside
http EUROPA 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
tftp-server inside EUROPA /c:/tftp/
floodguard enable
sysopt connection permit-pptp
sysopt noproxyarp inside
sysopt route dnat
telnet timeout 5
ssh timeout 5
vpdn group 1 accept dialin pptp
vpdn group 1 ppp authentication pap
vpdn group 1 ppp authentication chap
vpdn group 1 ppp authentication mschap
vpdn group 1 ppp encryption mppe 40
vpdn group 1 client configuration address local pptp-pool
vpdn group 1 client configuration dns x.x.x.31
vpdn group 1 pptp echo 60
vpdn group 1 client authentication local
vpdn username uname password *********
vpdn enable outside
vpdn enable inside
dhcpd address 192.168.20.100-192.168.20.131 inside
dhcpd lease 259200
dhcpd ping_timeout 750
dhcpd domain example.com
terminal width 80
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password aLWqpVQyMGCjOo33 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname tepix
domain-name example.com
clock timezone CST -6
clock summer-time CDT recurring
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
access-list 101 permit ip 192.168.20.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list 101 permit ip any 192.168.1.0 255.255.255.192
access-list outside_access_in permit tcp any host x.x.x.88 eq ftp
pager lines 24
logging on
logging buffered warnings
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside x.x.x.249 255.255.255.0
ip address inside 192.168.20.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool pptp-pool 192.168.1.1-192.168.1.50
pdm location x.x.x.222 255.255.255.255 outside
pdm location 192.168.20.60 255.255.255.255 inside
pdm logging warnings 512
pdm history enable
arp timeout 60
global (outside) 1 interface
nat (inside) 0 access-list 101
nat (inside) 1 192.168.20.0 255.255.255.0 0 0
static (inside,outside) x.x.x TENA netmask 255.255.255.255 0 0
static (inside,outside) x.x.x.104 NAMO netmask 255.255.255.255 0 0
static (inside,outside) x.x.x.60 192.168.20.60 netmask 255.255.255.255 0 0
static (inside,outside) x.x.x.88 EUROPA dns netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 x.x.x.1 1
route inside EUROPA 255.255.255.255 192.168.20.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http x.x.x.0 255.255.255.0 outside
http 192.168.20.0 255.255.255.0 inside
http EUROPA 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
tftp-server inside EUROPA /c:/tftp/
floodguard enable
sysopt connection permit-pptp
sysopt noproxyarp inside
sysopt route dnat
telnet timeout 5
ssh timeout 5
vpdn group 1 accept dialin pptp
vpdn group 1 ppp authentication pap
vpdn group 1 ppp authentication chap
vpdn group 1 ppp authentication mschap
vpdn group 1 ppp encryption mppe 40
vpdn group 1 client configuration address local pptp-pool
vpdn group 1 client configuration dns x.x.x.31
vpdn group 1 pptp echo 60
vpdn group 1 client authentication local
vpdn username uname password *********
vpdn enable outside
vpdn enable inside
dhcpd address 192.168.20.100-192.168.20.131 inside
dhcpd lease 259200
dhcpd ping_timeout 750
dhcpd domain example.com
terminal width 80