If you have an external IP for every internal machine you could use static nat statements for one to one correlation. Typically though you would use static statements for your servers which need constant outside connectivity and PAT for your standard user machines.
means that any system on the internet can connect to X.X.X.44 on port 80. The PIX will redirect this traffic to 192.168.0.10 ( your internal system ). The access is allowed by the access list you have applied to the outside interface which is correct.
Now .. if you wan to allow your inside users access to the Internet then you have to create a combination of nat and global instructions. so ..
global (outside) 1 interface
nat (inside) 1 access-list 120
access-list 120 permit ip any any
Will allow your users access to the Internet. As the packet traverses from inside to outside, the combination of nat<->global commands will transalte the source internal Ip to the IP address of the outside interface of your PIX.
in regards to your routes .. you only need
route outside 0.0.0.0 0.0.0.0
this command .. is not correct so .. you don't need this one.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :