PIX Version 8.0(3) ! hostname pixfirewall interface Ethernet0 nameif outside security-level 0 ip address 210.56.A.B 255.255.255.248 ! interface Ethernet1 nameif inside security-level 100 ip address 10.1.1.1 255.255.255.0 ! ftp mode passive access-list 100 extended permit icmp any any echo access-list 100 extended permit icmp any any echo-reply access-list 100 extended permit icmp any any time-exceeded access-list 100 extended permit icmp any any unreachable access-list 100 extended permit tcp any host 210.56.C.D eq www access-list 100 extended permit tcp any host 210.56.C.D eq smtp access-list 100 extended permit tcp any host 210.56.C.D eq pop3 access-list 100 extended permit tcp any host 210.56.x.y eq 808 mtu outside 1500 mtu inside 1500 icmp unreachable rate-limit 1 burst-size 1 asdm image flash:/asdm-603.bin nat-control global (outside) 1 210.56.G.H nat (inside) 1 10.2.1.0 255.255.255.0 static (inside,outside) 210.56.C.D 10.2.1.5 netmask 255.255.255.255 static (inside,outside) 210.56.x.y 10.2.1.10 netmask 255.255.255.255 access-group 100 in interface outside route outside 0.0.0.0 0.0.0.0 210.56.E.F 1 route inside 10.2.1.0 255.255.255.0 10.1.1.2 1 class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect netbios inspect rsh inspect rtsp inspect skinny inspect sqlnet inspect sunrpc inspect tftp inspect sip inspect xdmcp ! service-policy global_policy global prompt hostname context Cryptochecksum:656e301bac79679437f7a00c8d4e0d23 : end