<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX DMZ Design Help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-dmz-design-help/m-p/654130#M1030218</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ...  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;according to your requirements you got it 90+ right  ..  I would suggest  the following changes though&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ permit ip host 172.28.2.196 host 172.16.0.17 (to talk with server A on inside)&lt;/P&gt;&lt;P&gt;access-list DMZ permit ip host 172.28.2.196 host 172.16.0.16 (to talk with server B on inside) &lt;/P&gt;&lt;P&gt;access-list DMZ permit icmp host 172.28.2.196 172.16.0.0 255.255.0.0 (allow ICMP to inside) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you don't need the other entries from the DMZ access-list &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit ip any 172.28.2.0 255.255.255.XX (allow inside into DMZ) &lt;/P&gt;&lt;P&gt;NOTE: this allows all outbound access to the We servers and so you might want to lock it down to the access you required only .. i.e icmp, 80, 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appart from that  ..  you should be OK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Dec 2006 06:45:37 GMT</pubDate>
    <dc:creator>Fernando_Meza</dc:creator>
    <dc:date>2006-12-28T06:45:37Z</dc:date>
    <item>
      <title>PIX DMZ Design Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-design-help/m-p/654129#M1030216</link>
      <description>&lt;P&gt;I am trying to design a new DMZ.  I have two internal subnets 172.16.0.0/16 and 192.168.9.0/24.  My DMZ is going to be 172.28.2.192/28.   For now I will have 1 web server in the DMZ with ports 80 and 443 needed in.  I also want to allow the server in the DMZ to talk to two internal servers as well as respond to pings.  I do have an ACL restricting outbound traffic from the inside, so I will need to allow the inside to talk to the DMZ as well.  Here is what I have built thus far for config (on paper).  Any advice or recommendations would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 172.16.0.0 172.16.0.0&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.9.0 192.168.9.0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 12.34.44.XX 172.28.2.196&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ permit host 172.28.2.196 host 172.16.0.17 (to talk with server A on inside)&lt;/P&gt;&lt;P&gt;access-list DMZ permit host 172.28.2.196 host 172.16.0.16 (to talk with server B on inside)&lt;/P&gt;&lt;P&gt;access-list DMZ permit icmp host 172.28.2.196 172.16.0.0 255.255.0.0 (allow ICMP to inside)&lt;/P&gt;&lt;P&gt;access-list DMZ permit 172.16.0.0 255.255.0.0 any (allow inside to talk with DMZ?)&lt;/P&gt;&lt;P&gt;access-list DMZ permit tcp any 172.28.2.196 eq 80 (allow port 80 from inside and outside?)&lt;/P&gt;&lt;P&gt;access-list DMZ permit tcp any 172.28.2.196 eq 443 (allow port 443 from inside and outside?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any 12.34.44.X eq 80 (allow outside world into nat'd address for DMZ server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any 12.34.44.X eq 443 (allow outside world into nat'd address for DMZ server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit any 172.28.2.0 255.255.255.XX (allow inside into DMZ)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-groups XXXXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this look it will work?  What am I missing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks alot.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:13:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-design-help/m-p/654129#M1030216</guid>
      <dc:creator>boshardy1</dc:creator>
      <dc:date>2019-03-11T09:13:22Z</dc:date>
    </item>
    <item>
      <title>Re: PIX DMZ Design Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-design-help/m-p/654130#M1030218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ...  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;according to your requirements you got it 90+ right  ..  I would suggest  the following changes though&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ permit ip host 172.28.2.196 host 172.16.0.17 (to talk with server A on inside)&lt;/P&gt;&lt;P&gt;access-list DMZ permit ip host 172.28.2.196 host 172.16.0.16 (to talk with server B on inside) &lt;/P&gt;&lt;P&gt;access-list DMZ permit icmp host 172.28.2.196 172.16.0.0 255.255.0.0 (allow ICMP to inside) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you don't need the other entries from the DMZ access-list &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit ip any 172.28.2.0 255.255.255.XX (allow inside into DMZ) &lt;/P&gt;&lt;P&gt;NOTE: this allows all outbound access to the We servers and so you might want to lock it down to the access you required only .. i.e icmp, 80, 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appart from that  ..  you should be OK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Dec 2006 06:45:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-design-help/m-p/654130#M1030218</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2006-12-28T06:45:37Z</dc:date>
    </item>
  </channel>
</rss>

