<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DMZ configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696762#M1009707</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;expect&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Mar 2007 13:58:22 GMT</pubDate>
    <dc:creator>lq01010101</dc:creator>
    <dc:date>2007-03-21T13:58:22Z</dc:date>
    <item>
      <title>DMZ configuration</title>
      <link>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696759#M1009704</link>
      <description>&lt;P&gt;I would like to find out on what is the best practice on setting up Windows Media Server on DMZ.  I am trying to setup a WMS server on the DMZ and would like this DMZ server to communicate with my SQL server on my internal network.  Below is my configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696759#M1009704</guid>
      <dc:creator>nocret808</dc:creator>
      <dc:date>2019-03-11T09:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ configuration</title>
      <link>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696760#M1009705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;forgot to attached config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2007 04:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696760#M1009705</guid>
      <dc:creator>nocret808</dc:creator>
      <dc:date>2007-03-21T04:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ configuration</title>
      <link>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696761#M1009706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Whats wrong with it? Looks ok to me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2007 13:14:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696761#M1009706</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-21T13:14:30Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ configuration</title>
      <link>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696762#M1009707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;expect&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2007 13:58:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696762#M1009707</guid>
      <dc:creator>lq01010101</dc:creator>
      <dc:date>2007-03-21T13:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ configuration</title>
      <link>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696763#M1009710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the DMZ server cant get to my SQL server on my internal network.  the other thing im concern is, is this a best practice in allowing DMZ traffic to my internal network?  i just want to get some idea.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2007 14:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696763#M1009710</guid>
      <dc:creator>nocret808</dc:creator>
      <dc:date>2007-03-21T14:00:33Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ configuration</title>
      <link>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696764#M1009712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yeah.the configuration is absolutely fine.&lt;/P&gt;&lt;P&gt;and you have followed the best practices. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static is there for the translation purpose between the inside and dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the dmz interface,there's an access-list which permits the sql data to inside,then there's a deny which denies the rest of the traffic to inside and then there's a permit ip any any for internet access in dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good approach.&lt;/P&gt;&lt;P&gt;let us know if there's any specific question/issue/concern that you might have&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;P&gt;Cisco TAC.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2007 14:00:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696764#M1009712</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2007-03-21T14:00:52Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ configuration</title>
      <link>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696765#M1009713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;could you please attach the syslogs generated while you attempt to connect to the sql server in inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the config. is ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;P&gt;Cisco TAC.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2007 14:02:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696765#M1009713</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2007-03-21T14:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ configuration</title>
      <link>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696766#M1009714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.  The question that was raised was: by allowing communication from dmz to the sql server, someone can potentially break or hack into my inside network via the dmz.  What they also want to do is to have this DMZ server have Internet capability for Windows patching.  i am not sure if im in favor in doing this.  please advise.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2007 23:53:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-configuration/m-p/696766#M1009714</guid>
      <dc:creator>nocret808</dc:creator>
      <dc:date>2007-04-12T23:53:05Z</dc:date>
    </item>
  </channel>
</rss>

