Question : I need help getting https 443 working on a pix firewall.

I have a pix firewall that stopped processing https request to my exchange server.  I am a novice at cisco IOS.  Here is the config of the firewall now.  I am sure it is something easy but this config is more than I understand.

PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 100full
interface ethernet2 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security55
enable password sS2NIQJHZsuuEb/H encrypted
passwd crt19A/j86x6y2Me encrypted
hostname GlowFW1
domain-name ciscopix.com
clock timezone MST -7
clock summer-time MDT recurring
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list 100 permit icmp any any echo-reply
access-list 100 permit icmp any any time-exceeded
access-list 100 permit icmp any any unreachable
access-list 100 permit tcp any host 65.105.243.197 eq smtp
access-list 100 permit tcp any host 65.105.243.197 eq https
access-list 100 permit tcp any host 65.105.243.198 eq www
access-list 100 permit tcp any host 65.105.243.198 eq ftp
access-list 100 permit tcp any host 65.105.243.199 eq www
access-list 100 permit tcp any host 65.105.243.199 eq https
access-list 100 permit tcp any host 65.105.243.197 eq www
access-list 100 permit tcp any host 65.105.243.198 eq https
access-list 100 permit tcp any any eq 3306
access-list 100 permit tcp any any eq 3307
access-list 100 permit udp any any eq 443
access-list 100 permit tcp any any eq https
access-list inside_outbound_nat0_acl permit ip any 192.168.3.208 255.255.255.248

access-list inside_outbound_nat0_acl permit ip any 192.168.3.216 255.255.255.254

access-list outside_cryptomap_dyn_20 permit ip any 192.168.3.208 255.255.255.248

access-list outside_cryptomap_dyn_40 permit ip any 192.168.3.216 255.255.255.254

access-list inside_out permit ip any any
access-list dmz_out permit tcp 192.168.10.0 255.255.255.0 host 192.168.3.17 eq d
omain
access-list dmz_out permit tcp any host 65.105.243.199 eq www
access-list dmz_out permit tcp any host 65.105.243.199 eq https
access-list dmz_out permit ip any any
access-list dmz_out permit tcp any any eq https
access-list dmz_out permit tcp any any eq www
access-list inside_outbound_nat1_acl permit ip any 192.168.10.208 255.255.255.24
8
access-list inside_outbound_nat1_acl permit ip 192.168.10.0 255.255.255.0 64.119
.175.208 255.255.255.240
access-list outside_cryptomap_dyn_25 permit ip any 192.168.10.208 255.255.255.24
8
access-list 90 permit ip 192.168.10.0 255.255.255.0 64.119.175.208 255.255.255.2
40
pager lines 15
logging timestamp
logging console alerts
logging monitor alerts
logging trap warnings
logging history critical
logging host inside 192.168.3.11
mtu outside 1500
mtu inside 1500
mtu dmz 1500
ip address outside 65.105.243.195 255.255.255.240
ip address inside 192.168.3.1 255.255.255.0
ip address dmz 192.168.10.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool VPN-Pool 192.168.3.210-192.168.3.215
ip local pool VPN-Users 192.168.3.216-192.168.3.217
ip local pool VPN-USER-1 192.168.10.208-192.168.10.215
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 65.105.243.196
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 192.168.3.0 255.255.255.0 0 0
nat (dmz) 0 access-list inside_outbound_nat1_acl
nat (dmz) 1 192.168.10.0 255.255.255.0 0 0
static (inside,outside) tcp 65.105.243.199 https 192.168.3.24 https netmask 255.
255.255.255 0 0
static (inside,outside) tcp 65.105.243.199 www 192.168.3.24 www netmask 255.255.
255.255 0 0
static (dmz,outside) tcp 65.105.243.198 ftp 192.168.10.30 ftp netmask 255.255.25
5.255 0 0
static (dmz,outside) tcp 65.105.243.197 www 192.168.10.30 www netmask 255.255.25
5.255 0 0
static (dmz,outside) tcp 65.105.243.197 https 192.168.10.20 https netmask 255.25
5.255.255 0 0
static (dmz,outside) tcp 65.105.243.197 smtp 192.168.10.20 smtp netmask 255.255.
255.255 0 0
static (dmz,outside) tcp 65.105.243.198 www 192.168.10.56 www netmask 255.255.25
5.255 0 0
static (dmz,outside) tcp 65.105.243.198 https 192.168.10.56 https netmask 255.25
5.255.255 0 0
static (inside,dmz) 192.168.3.0 192.168.3.0 netmask 255.255.255.0 0 0
static (dmz,inside) 192.168.10.0 192.168.10.0 netmask 255.255.255.0 0 0
access-group dmz_out in interface dmz
route outside 0.0.0.0 0.0.0.0 65.105.243.193 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.3.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto dynamic-map outside_dyn_map 25 match address outside_cryptomap_dyn_25
crypto dynamic-map outside_dyn_map 25 set transform-set ESP-3DES-MD5
crypto dynamic-map outside_dyn_map 40 match address outside_cryptomap_dyn_40
crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-MD5
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address 90
crypto map outside_map 20 set peer 208.42.224.68
crypto map outside_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address 208.42.224.68 netmask 255.255.255.255
isakmp nat-traversal 20
isakmp policy 9 authentication rsa-sig
isakmp policy 9 encryption des
isakmp policy 9 hash sha
isakmp policy 9 group 1
isakmp policy 9 lifetime 86400
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup users address-pool VPN-Pool
vpngroup users dns-server 192.168.3.17 192.168.3.11
vpngroup users default-domain glow-tek
vpngroup users idle-time 1800
vpngroup users password ********
vpngroup Users address-pool VPN-Users
vpngroup Users dns-server 192.168.3.17
vpngroup Users wins-server 192.168.3.17
vpngroup Users default-domain glow-tek.com
vpngroup Users idle-time 1800
vpngroup Users password ********
vpngroup Glowtek address-pool VPN-USER-1
vpngroup Glowtek dns-server 192.168.10.10
vpngroup Glowtek wins-server 192.168.10.10
vpngroup Glowtek default-domain glow-tek.com
vpngroup Glowtek idle-time 1800
vpngroup Glowtek password ********
telnet 192.168.3.0 255.255.255.0 inside
telnet 192.168.10.0 255.255.255.0 dmz
telnet timeout 5
ssh timeout 5
console timeout 0
vpdn enable outside
dhcpd address 192.168.3.100-192.168.3.150 inside
dhcpd dns 192.168.3.17
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain glow-tek.com
dhcpd auto_config outside
dhcpd enable inside
username mike.castaldo password OevTQP6dn7/J8DCm encrypted privilege 2
username qeh2 nopassword privilege 3
username wayne.edwards password XS4SkiWHaej.DuBK encrypted privilege 2
username fabbas password NcFoEe8KGWek8aZt encrypted privilege 3
username fazal.abbas password VBkR/kro7NRrtH63 encrypted privilege 2
username muhammad.ali password dhN8950c.n/P1oqs encrypted privilege 2
username bj.mcilnay password zR6G7.IgI3Wmawjh encrypted privilege 2
username tmetzger password NcFoEe8KGWek8aZt encrypted privilege 3
username chris.west password cMJ8lcudzcT7ycB. encrypted privilege 2
username jacquie.marrott password HbkQXzCM2wanl.7G encrypted privilege 2
username sheeraz.fazal password 6dpaIkKHgGPKF7vq encrypted privilege 3
username bill.ennis password PK8Vf2ZhMTY0mlRo encrypted privilege 2
username sheeraz password v.Oy0f195d5qQXUn encrypted privilege 2
username mali password NcFoEe8KGWek8aZt encrypted privilege 3
username amarrott password NcFoEe8KGWek8aZt encrypted privilege 3
username matkins password LJLCARieO6hCWsEJ encrypted privilege 15
username alan.marrott password a4XJnjKvIzl5gr8E encrypted privilege 2
username alatif password Dn3AcN2OklQ4lIEU encrypted privilege 3
username al.latif password r3.gaMWYiWw0mDAo encrypted privilege 2
username tim.metzger password fF5ZCaTqFPY740xu encrypted privilege 2
username mcastaldo password NcFoEe8KGWek8aZt encrypted privilege 3
username jeremy.searle password U.aauQNm3AAEknMw encrypted privilege 2
terminal width 80
Cryptochecksum:3fb8a94fb4e7ec39ff91f814c23485b3
: end

Answer : I need help getting https 443 working on a pix firewall.

rng.Name = "myname"
Random Solutions  
 
programming4us programming4us