Laylobrown
Technical User
Is this good so far? I would like to be able to route access from any outside host that uses port 2100 to a specific internal host.
pix(config)# sho access-list
access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 256)
alert-interval 300
access-list inside_outbound_nat0_acl; 3 elements
access-list inside_outbound_nat0_acl line 1 permit ip 192.168.1.0 255.255.255.0
rockhill 255.255.255.0 (hitcnt=0)
access-list inside_outbound_nat0_acl line 2 permit ip 192.168.1.0 255.255.255.0
spartanburg 255.255.255.0 (hitcnt=105)
access-list inside_outbound_nat0_acl line 3 permit ip 192.168.1.0 255.255.255.0
dispatch 255.255.255.0 (hitcnt=0)
access-list outside_cryptomap_20; 1 elements
access-list outside_cryptomap_20 line 1 permit ip 192.168.1.0 255.255.255.0 rock
hill 255.255.255.0 (hitcnt=0)
access-list outside_cryptomap_40; 1 elements
access-list outside_cryptomap_40 line 1 permit ip 192.168.1.0 255.255.255.0 spar
tanburg 255.255.255.0 (hitcnt=86)
access-list outside_cryptomap_60; 1 elements
access-list outside_cryptomap_60 line 1 permit ip 192.168.1.0 255.255.255.0 disp
atch 255.255.255.0 (hitcnt=0)
access-list outside_access_in; 1 elements
access-list outside_access_in line 1 permit tcp any host 70.43.148.82 eq 2100 (h
itcnt=0)
pix(config)#
pix(config)# sho access-list
access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 256)
alert-interval 300
access-list inside_outbound_nat0_acl; 3 elements
access-list inside_outbound_nat0_acl line 1 permit ip 192.168.1.0 255.255.255.0
rockhill 255.255.255.0 (hitcnt=0)
access-list inside_outbound_nat0_acl line 2 permit ip 192.168.1.0 255.255.255.0
spartanburg 255.255.255.0 (hitcnt=105)
access-list inside_outbound_nat0_acl line 3 permit ip 192.168.1.0 255.255.255.0
dispatch 255.255.255.0 (hitcnt=0)
access-list outside_cryptomap_20; 1 elements
access-list outside_cryptomap_20 line 1 permit ip 192.168.1.0 255.255.255.0 rock
hill 255.255.255.0 (hitcnt=0)
access-list outside_cryptomap_40; 1 elements
access-list outside_cryptomap_40 line 1 permit ip 192.168.1.0 255.255.255.0 spar
tanburg 255.255.255.0 (hitcnt=86)
access-list outside_cryptomap_60; 1 elements
access-list outside_cryptomap_60 line 1 permit ip 192.168.1.0 255.255.255.0 disp
atch 255.255.255.0 (hitcnt=0)
access-list outside_access_in; 1 elements
access-list outside_access_in line 1 permit tcp any host 70.43.148.82 eq 2100 (h
itcnt=0)
pix(config)#