Well, if you're using NAT and you only have one public IP, you need to tell the packet what internal address to go to according to the port it is seeking (such as 25, 80, etc).
Such as:
pretend internal subnet is 10.1.1.0 /24
Single public address is 205.45.8.130
ip nat inside source tcp 10.1.1.5 80 205.45.6.130 80 extendable
and
ip nat inside source tcp 10.1.1.7 25 205.45.6.130 25 extendable
Port 80 traffic goes to 10.1.1.5 and port 25 traffic goes to 10.1.1.7 although they both share the same public IP.
This can also be useful even if you have multiple public IP address, but only want to allow specific ports through instead of just assigning a fully opened static public ip to a server.
Such as...instead of:
ip nat inside source 10.1.1.8 205.45.6.130 (which opens that server up completely to the outside world)
You can use the above extendable format to only permit specific ports.
Firewalls, ACLs, etc should still be used for stronger security.