<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is it standard proceedure to allow internal users to access DMZ servers? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/is-it-standard-proceedure-to-allow-internal-users-to-access-dmz/m-p/701230#M1009617</link>
    <description>&lt;P&gt;I have never allowed my internal users to access web based front end servers in my DMZ but it seems a lot of companies are doing this now. So the question is:&lt;/P&gt;&lt;P&gt;Is it standard proceedure to allow internal users to access DMZ servers?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:50:10 GMT</pubDate>
    <dc:creator>cclinton383</dc:creator>
    <dc:date>2019-03-11T09:50:10Z</dc:date>
    <item>
      <title>Is it standard proceedure to allow internal users to access DMZ servers?</title>
      <link>https://community.cisco.com/t5/network-security/is-it-standard-proceedure-to-allow-internal-users-to-access-dmz/m-p/701230#M1009617</link>
      <description>&lt;P&gt;I have never allowed my internal users to access web based front end servers in my DMZ but it seems a lot of companies are doing this now. So the question is:&lt;/P&gt;&lt;P&gt;Is it standard proceedure to allow internal users to access DMZ servers?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:50:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-standard-proceedure-to-allow-internal-users-to-access-dmz/m-p/701230#M1009617</guid>
      <dc:creator>cclinton383</dc:creator>
      <dc:date>2019-03-11T09:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: Is it standard proceedure to allow internal users to access</title>
      <link>https://community.cisco.com/t5/network-security/is-it-standard-proceedure-to-allow-internal-users-to-access-dmz/m-p/701231#M1009619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;well I guess you are the best person to decide that...moreoever if you really need it thana you can open port 80 by applying access-list on inside interface allowing only port 80 to dmz apart making sure the access-list doesnt block anything else...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2007 17:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-standard-proceedure-to-allow-internal-users-to-access-dmz/m-p/701231#M1009619</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2007-03-21T17:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: Is it standard proceedure to allow internal users to access</title>
      <link>https://community.cisco.com/t5/network-security/is-it-standard-proceedure-to-allow-internal-users-to-access-dmz/m-p/701232#M1009620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually I was hoping to get the Cisco veiw on if this is a good standard practice and are there any security reasons not to allow internal users direct access to the DMZ servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2007 17:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-standard-proceedure-to-allow-internal-users-to-access-dmz/m-p/701232#M1009620</guid>
      <dc:creator>cclinton383</dc:creator>
      <dc:date>2007-03-21T17:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: Is it standard proceedure to allow internal users to access</title>
      <link>https://community.cisco.com/t5/network-security/is-it-standard-proceedure-to-allow-internal-users-to-access-dmz/m-p/701233#M1009621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;well Cisco Tac recommends  as much narrowed down access-rules/permissions as possible, not a complete hole in the system....so try to narrow it down to specific hosts and specific services and ports using the access-lists&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l abc permit tcp any &lt;DMZ network=""&gt; eq 80&lt;/DMZ&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l abc deny ip any &lt;DMZ network=""&gt;&lt;/DMZ&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l abc permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-g abc in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the above should be good &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2007 17:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-standard-proceedure-to-allow-internal-users-to-access-dmz/m-p/701233#M1009621</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2007-03-21T17:54:44Z</dc:date>
    </item>
  </channel>
</rss>

