Thank you both for the advice. dx1 I do not have a router in front of the pix. I just gave the pix a public ip. Is this bad practice? With only one IP?
OK Here is what I have. The email server is 192.168.1.5 I want to allow pop3, smtp and http through the pix. Our server is also a DC, NDS,WINS,DHCP,OWA,NAV server so I want to protect this as much as I can with whats given. We currently only have a linksys firewall with port forwarding protecting it. I would feel more comfortable with a pix there instead of a linksys.
The global info is not present because im not for sure what to enter. can the global ip be the same as the external int? ex:
ip address outside x.x.230.30 255.255.255.0
global outside 1 x.x.230.30 255.255.255.0
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxx encrypted
passwd xxx encrypted
hostname PIX
domain-name PIX.COM
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list frominside permit tcp any any eq ftp
access-list frominside permit tcp any any eq pop3
access-list frominside permit udp any any eq domain
access-list frominside permit tcp any any eq https
access-list frominside permit tcp any any eq smtp
access-list frominside permit tcp any any eq www
logging timestamp
logging trap errors
logging history errors
logging host inside 192.168.1.5 6/1468
interface ethernet0 auto
interface ethernet1 auto
icmp deny any outside
mtu outside 1500
mtu inside 1500
ip address outside x.x.230.30 255.255.255.0
ip address inside 192.168.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.1.5 255.255.255.255 inside
pdm history enable
arp timeout 14400
nat (inside) 1 192.168.1.0 255.255.255.0 0 0
static (inside,outside) tcp interface smtp 192.168.1.5 smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp interface
255.255.255.255 0 0
static (inside,outside) tcp interface pop3 192.168.1.5 pop3 netmask 255.255.255.255 0 0
access-group frominside in interface inside
route outside 0.0.0.0 0.0.0.0 x.x.230.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
aaa-server partneruath protocol radius
http server enable
http 192.168.1.5 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
telnet timeout 5
ssh timeout 5
terminal width 80
Cryptochecksum:xxx
: end
[OK]