The access list you posted is for inbound traffic, from the internet to your network, right? And your problem is that when this ACL is applied to the outside interface it prevents outbound access, yes?
Remember that when you have outgoing traffic, ie. you open a web browser or an ftp session or mail etc, you connect to a remote server and then that server has to send traffic back to you! That return traffic is "inbound" to your network. So for example, if you have a host on IP address 212.50.x.y and it's going to a webserver at
the outgoing traffic will have a source address of 212.50.x.y and a source port of 1179 (just an example). The destination address will be the IP address of
and the destination port if it's a web server will be 80 (for http). Your outbound ACL that permits all TCP traffic will allow this out.
Now, the server at
will have to send data back to your client machine on your network. So, the source address will be the IP address of
and the source port will be 80. The destination address will be your machine at 212.50.x.y and the destination port will be 1179. When the first packet arrives at your router it will be checked against the incoming ACL, list 101. The question is, is TCP port 1179 allowed in to your host?
Looking at your ACL (list 101) we can see that TCP traffic to the inside network is allowed on ports 53, 80 and 25. 1179 is not allowed and so will be dropped by the implicit "deny ip any any" statement at the end. Therefore, your connection to the web server will timeout. The outgoing traffic is allowed but the reply traffic is not! Remember that ACL's on a router are not like rules on a firewall. If you had a firewall with stateful inspection, the outgoing connection would be placed in a state table. The reply from the web server would then be matched against this entry in the state table and therefore allowed through. However, your router is not providing stateful connections and all incoming traffic will be matched against the inbound ACL.
Your access-list 101 is only allowing connections in on ports 53, 80 and 25. Do, you have a web server on your network? You are only allowing incoming connections for DNS domain transfers, incoming HTTP requests (if you have a web server) and incoming mail to an SMTP server.
What is it that you want to allow in and what do you want to block access to?
Chris.
************************
Chris Andrew, CCNA
chrisac@gmx.co.uk
************************