Hi Wendy, the default route will show up in routing table once the upstream router is reachable.
I meant also to repost my answer few minutes later thinking that you must have placed back the linksys router becuase connectivity to internet was not happening, my apologies for that, I would have done exactly the same.
When you connect back the firewall connections to inside and outside from firewall itself try pinging your defalt route to confirm you can reach that upstream router. The access from inside to outside by default is permited but you will need some dns configuration for the PC inside to DNS query weblinks.
you could try dhcp address for inside interfaces if you don't have dhcp server and use a public opened DNS servers 188.8.131.52,184.108.40.206
and have this be automatically given to inside hosts dynamically
dhcpd dns 220.127.116.11 18.104.22.168
dhcpd address 192.168.32.10-192.168.32.100 inside
dhcpd enable inside
for the acl to get access to inside mailserver I would try :
access-list inside_access_in extended permit tcp any interface outside object-group DM_INLINE_TCP_1
access-group inside_access_in in interface outside
but...I would recommend to change the acl name instead of the " inside_access_in " to sort of distinguish what comes from outside to inside within acl names, like outside_access_in gives clear picture for your outside interface acls.
access-list outside_access_in extended permit tcp any interface outside object-group DM_INLINE_TCP_1
access-group outside_access_in in interface outside
remove old one
no access-list inside_access_in extended permit tcp any host mailserver object-group DM_INLINE_TCP_1
so the mailserver is also serving as dhcp server for the inside clients, which is why i turned off DHCP on the router. i have decided that i need to work on this in person - it's difficult to truobleshoot something that isn't plugged in. :) so i'm trying to arrange to make the trek to my client's sit on monday. once I figure out what's wrong I will post it here for future reference. :)
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :