<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTP DMZ creation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608899#M1023892</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you purchases a DMZ bundle chassis, you will have a extra NIC card, which can be used as a DMZ interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you purchases a simple chassis, with only 2 interfaces and "Restricted" license, then you can install a 1-port FE card and use this new FE interface as the DMZ interface. "Restricted" license allows use of maximum 3 interfaces, including inside and outside interface. However, if you have "Unrestricted" license, you can even use a 4-port FE card and create 4 different DMZ interfaces !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Mar 2007 23:27:00 GMT</pubDate>
    <dc:creator>vitripat</dc:creator>
    <dc:date>2007-03-06T23:27:00Z</dc:date>
    <item>
      <title>FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608896#M1023889</link>
      <description>&lt;P&gt;I have a PIX 515E set up with statefull failover.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I have to have a DMZ bundle in order to configure a DMZ for an FTP server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is all that is needed is to set up an interface on one of the 3 remaining available and configure the security for it?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:42:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608896#M1023889</guid>
      <dc:creator>richmorrow624</dc:creator>
      <dc:date>2019-03-11T09:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608897#M1023890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could just place the FTP server on the existing inside interface and map it to a public IP using the static command. This wont be a recommended setup though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recommended setup would be to use a separate interface altogether for publically accessible servers and map them to public IPs from there. Heres a link which shows placing a mail server in dmz network and allowing access to it-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a00800941c8.shtml" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a00800941c8.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a00806745b8.shtml" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a00806745b8.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can just replace the ports from smtp to ftp and "inspect esmtp" with "inspect ftp" in 7.x code and "fixup protocol smtp 25" with "fixup protocol ftp 21" in 6.x code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2007 22:15:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608897#M1023890</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-03-06T22:15:37Z</dc:date>
    </item>
    <item>
      <title>Re: FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608898#M1023891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What about "interface DMZ"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this only available in DMZ bundles?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2007 23:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608898#M1023891</guid>
      <dc:creator>richmorrow624</dc:creator>
      <dc:date>2007-03-06T23:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608899#M1023892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you purchases a DMZ bundle chassis, you will have a extra NIC card, which can be used as a DMZ interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you purchases a simple chassis, with only 2 interfaces and "Restricted" license, then you can install a 1-port FE card and use this new FE interface as the DMZ interface. "Restricted" license allows use of maximum 3 interfaces, including inside and outside interface. However, if you have "Unrestricted" license, you can even use a 4-port FE card and create 4 different DMZ interfaces !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2007 23:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608899#M1023892</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-03-06T23:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608900#M1023893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;we have a total of five interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Three are used with IP addresses and one is used as a failover interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can i tell if "unrestricted license?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2007 00:24:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608900#M1023893</guid>
      <dc:creator>richmorrow624</dc:creator>
      <dc:date>2007-03-07T00:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608901#M1023894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do a "sh ver" on your firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is taken from one of our Pix515E firewalls. &lt;/P&gt;&lt;P&gt;=============================================&lt;/P&gt;&lt;P&gt;sh ver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco PIX Firewall Version 6.3(3)&lt;/P&gt;&lt;P&gt;Cisco PIX Device Manager Version 3.0(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Compiled on Wed 13-Aug-03 13:55 by morlee&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MD-DESC-F01-FW01 up 173 days 19 hours&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hardware:   PIX-515E, 64 MB RAM, CPU Pentium II 433 MHz&lt;/P&gt;&lt;P&gt;Flash E28F128J3 @ 0x300, 16MB&lt;/P&gt;&lt;P&gt;BIOS Flash AM29F400B @ 0xfffd8000, 32KB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Encryption hardware device : Crypto5823 (revision 0x1)&lt;/P&gt;&lt;P&gt;0: ethernet0: address is 0011.5cc3.7133, irq 10&lt;/P&gt;&lt;P&gt;1: ethernet1: address is 0011.5cc3.7134, irq 11&lt;/P&gt;&lt;P&gt;2: ethernet2: address is 000d.88ef.0300, irq 11&lt;/P&gt;&lt;P&gt;3: ethernet3: address is 000d.88ef.0301, irq 10&lt;/P&gt;&lt;P&gt;4: ethernet4: address is 000d.88ef.0302, irq 9&lt;/P&gt;&lt;P&gt;5: ethernet5: address is 000d.88ef.0303, irq 5&lt;/P&gt;&lt;P&gt;Licensed Features:&lt;/P&gt;&lt;P&gt;Failover:                    Enabled&lt;/P&gt;&lt;P&gt;VPN-DES:                     Enabled&lt;/P&gt;&lt;P&gt;VPN-3DES-AES:                Enabled&lt;/P&gt;&lt;P&gt;Maximum Physical Interfaces: 6&lt;/P&gt;&lt;P&gt;Maximum Interfaces:          10&lt;/P&gt;&lt;P&gt;Cut-through Proxy:           Enabled&lt;/P&gt;&lt;P&gt;Guards:                      Enabled&lt;/P&gt;&lt;P&gt;URL-filtering:               Enabled&lt;/P&gt;&lt;P&gt;Inside Hosts:                Unlimited&lt;/P&gt;&lt;P&gt;Throughput:                  Unlimited&lt;/P&gt;&lt;P&gt;IKE peers:                   Unlimited&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This PIX has an Unrestricted (UR) license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Serial Number: 808252051 (0x302cf293)&lt;/P&gt;&lt;P&gt;Running Activation Key: 0xb62825e8 0x0c995dfa 0x80855127 0x9d6215c3&lt;/P&gt;&lt;P&gt;Configuration last modified by enable_15 at 08:24:17.335 GMT Wed Mar 7 2007&lt;/P&gt;&lt;P&gt;=============================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Key things to look at &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maximum number of physical interfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;+ obviously at the bottom of the output it tells you which license it is running. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2007 08:26:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608901#M1023894</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-03-07T08:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608902#M1023896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the replys guys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One last question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have one of the interfaces being used by a customer and the two failover PIX firewalls are connected to a cisco 12 port switch on his DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it acceptable practice to VLAN the switch and use some of the ports for another DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or best to physically isolate them with another switch?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2007 12:23:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608902#M1023896</guid>
      <dc:creator>richmorrow624</dc:creator>
      <dc:date>2007-03-07T12:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608903#M1023897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A lot depends on the level of security you need. I have seen both separate switches used and a combined switch with all the vlans on that one switch. &lt;/P&gt;&lt;P&gt;The key concerns with using the same switch for multiple DMZ's are &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) a configuration mistake could lead to a security risk&lt;/P&gt;&lt;P&gt;2) Vlan hopping ie. begin able to jump across vlans&lt;/P&gt;&lt;P&gt;3) Vlan 1 which should not be used on a DMZ switch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you will be fine with what you propose as long as you understand the issues with multiple vlans on a switch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is a paper on vlan security from Cisco. It's about 6500 switches but a lot of the information applies to all switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/switches/ps708/products_white_paper09186a008013159f.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/switches/ps708/products_white_paper09186a008013159f.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2007 12:35:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608903#M1023897</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-03-07T12:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608904#M1023898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I just create a new VLAN on the firewall for the DMZ, then uplink to the appropriate switchports on the switch?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2007 13:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608904#M1023898</guid>
      <dc:creator>richmorrow624</dc:creator>
      <dc:date>2007-03-07T13:24:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608905#M1023899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rich &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your'e using one of your spare interfaces then you don't need to create a vlan on your firewall, you just use one of the spare interfaces. Allocate the ports on the switch to a new vlan and then connect the pix interface into one of those ports. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The pix firewall would only need to know about vlans if you were going to run 802.1q trunking on one of the pix interfaces and i don't believe this is what you are trying to do. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i have misunderstood please let me know &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2007 13:28:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608905#M1023899</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-03-07T13:28:20Z</dc:date>
    </item>
    <item>
      <title>Re: FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608906#M1023900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are spot on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry but another question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What about FTP, I am unsure about passive mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the best way to set that up?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2007 13:47:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608906#M1023900</guid>
      <dc:creator>richmorrow624</dc:creator>
      <dc:date>2007-03-07T13:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: FTP DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608907#M1023901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rich &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are going to run passive ftp you generally do not want to have the fixup ftp command on. &lt;/P&gt;&lt;P&gt;The fixup ftp was primarily designed for active ftp. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as the rule base goes if you are allowing all traffic out from the inside and you are talking about ftp to the outside then you should be fine with passive ftp as both the data and control connection are initiated by the client. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Mar 2007 08:40:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-dmz-creation/m-p/608907#M1023901</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-03-08T08:40:34Z</dc:date>
    </item>
  </channel>
</rss>

