I have configured a Cisco 1841 IOS firewall. All works well except for PoP3 traffic. If I take out the inspect rule applied outbound on the outside interface and the access list applied inbound to the outside interface PoP3 works.
So i know for sure my config is wrong.
Can someone help pls..
Here is my config:
ip inspect name firewall ftp
ip inspect name firewall http
ip inspect name firewall dns
ip inspect name firewall tcp router-traffic
ip inspect name firewall udp router-traffic
ip inspect name firewall https
ip inspect name firewall smtp
ip inspect name firewall ssh
ip inspect name firewall telnet
ip inspect name firewall pop3
ip address 192.168.0.1 255.255.255.0
ip nat inside
no ip address
encapsulation frame-relay IETF
no ip route-cache cef
no ip route-cache
frame-relay lmi-type ansi
interface Serial0/0/0.1 point-to-point
ip address 126.96.36.199 255.255.252
ip access-group 100 in
no ip redirects
no ip proxy-arp
ip inspect firewall out
ip nat outside
ip nat inside source list 101 interface Serial0/0/0.1 overload
access-list 100 deny ip host 255.255.255.255 any
access-list 100 deny ip 192.168.0.0 0.0.0.255 any
access-list 100 permit icmp any any echo-reply
access-list 100 permit icmp any 192.168.0.0 0.0.0.255 time-exceeded
access-list 100 permit icmp any 192.168.0.0 0.0.0.255 packet-too-big
access-list 100 permit icmp any 192.168.0.0 0.0.0.255 traceroute
access-list 100 permit icmp any 192.168.0.0 0.0.0.255 unreachable
access-list 101 permit ip 192.168.0.0 0.0.0.255 any
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...