<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access Through PIX Between DMZ and Inside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648808#M1033345</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming your inside segment is 10.0.0.0/24, you can use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.0 10.0.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow the inside segment to talk to DMZ, and vice-versa via their respective IP Addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 04 Dec 2006 15:25:25 GMT</pubDate>
    <dc:creator>a.kiprawih</dc:creator>
    <dc:date>2006-12-04T15:25:25Z</dc:date>
    <item>
      <title>Access Through PIX Between DMZ and Inside</title>
      <link>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648807#M1033344</link>
      <description>&lt;P&gt;Hi Everyone, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A quick question in relation to allowing two DMZ servers communicate with an Inside server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand that to enable the DMZ servers to initiate comms with the Inside server I need to put in the following commands: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT(INSIDE) 1 10.0.0.52 255.255.255.255 (address of the Inside server) &lt;/P&gt;&lt;P&gt;GLOBAL(DMZ) 1 10.1.0.100 255.255.255.255 (address to be translated to on the DMZ) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But how do I permit the Inside server to communicate with the DMZ servers, or will this happen automatically due to it being sourced on a higher security interface? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648807#M1033344</guid>
      <dc:creator>daniel.bowen</dc:creator>
      <dc:date>2019-03-11T09:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: Access Through PIX Between DMZ and Inside</title>
      <link>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648808#M1033345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming your inside segment is 10.0.0.0/24, you can use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.0 10.0.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow the inside segment to talk to DMZ, and vice-versa via their respective IP Addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Dec 2006 15:25:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648808#M1033345</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-04T15:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: Access Through PIX Between DMZ and Inside</title>
      <link>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648809#M1033346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for you reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only want to allow comms between 2 servers on the DMZ (10.1.0.27 and 31) and 1 inside server (10.0.0.52).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I allow these two to communicate on all ports but not any other servers on the DMZ or inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Dec 2006 15:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648809#M1033346</guid>
      <dc:creator>daniel.bowen</dc:creator>
      <dc:date>2006-12-04T15:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Access Through PIX Between DMZ and Inside</title>
      <link>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648810#M1033347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maintain the previous "static (inside,dmz) ..." command, and use access-list (ACL) to nail the two. Apply the ACL on both DMZ and Inside interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example - add to existing. or add new:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit ip host 10.0.0.52 host 10.1.0.27  --&amp;gt; permitted to talk to dmz's 10.1.0.27&lt;/P&gt;&lt;P&gt;access-list inside permit ip host 10.0.0.52 host 10.1.0.31  --&amp;gt; permitted to talk to dmz's 10.1.0.27&lt;/P&gt;&lt;P&gt;access-list inside deny ip 10.0.0.0 255.255.255.0 10.1.0.0 255.255.255.0 --&amp;gt; deny inside to talk to any dmz, except the above&lt;/P&gt;&lt;P&gt;access-list inside permit ip 10.0.0.0 255.255.255.0 any  --&amp;gt; permit inside to talk to other subnet/address, i.e internet (with nat/global config)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside in interface inside --&amp;gt; bind acl to inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz permit ip host 10.1.0.27 host 10.0.0.52   --&amp;gt; permit dmz's 10.1.0.27 talking to inside's 10.0.0.52 via any ports&lt;/P&gt;&lt;P&gt;access-list dmz permit ip host 10.1.0.31 host 10.0.0.52   --&amp;gt; permit dmz's 10.1.0.31 talking to inside's 10.0.0.52 via any ports &lt;/P&gt;&lt;P&gt;access-list dmz deny ip 10.1.0.0 255.255.255.0 10.0.0.0 255.255.255.0 --&amp;gt; deny other dmz talking to inside, except the above&lt;/P&gt;&lt;P&gt;access-list dmz permit ip 10.1.0.0 255.255.255.0 any --&amp;gt; allow dmz talking to other subnet, excpet specific subnet on inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group dmz in interface dmz --&amp;gt; bind acl 'dmz' to dmz interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Dec 2006 16:16:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648810#M1033347</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-04T16:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: Access Through PIX Between DMZ and Inside</title>
      <link>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648811#M1033348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure this is all that is required for NATting between subnets? I have limited knowledge of NAT on a PIX but it would seem to me that we would need a static going in both directions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you possibly elobarate?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Dec 2006 11:57:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648811#M1033348</guid>
      <dc:creator>daniel.bowen</dc:creator>
      <dc:date>2006-12-05T11:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: Access Through PIX Between DMZ and Inside</title>
      <link>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648812#M1033350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this is the most common you can use. It works between higher security to lower security level subnet natting/mapping, i.e inside-outside, or dmz-outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The - static (inside,dmz) 10.0.0.0 10.0.0.0 netmask 255.255.255.0 - command allows your inside and dmz segment to access each other via their original IP. DMZ can access inside servers via inside server's original IP of 10.0.0.xx, while inside can access DMZ original IP of 10.1.0.xx. Use ACL on both end to control which hosts can access across and vice-versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apart from the above subnet mapping, you can also use the following method to map inside servers with DMZ IP address, as follow:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.1.0.100 10.0.0.52 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow your DMZ hosts (10.1.0.27 &amp;amp; 10.1.0.31) to access the Inside server using DMZ's NATted IP of 10.1.0.100 instead of Inside server original IP of 10.0.0.52 (opposite to the above static command). Logically, this make inside server like sitting in DMZ segment as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow Inside host 10.0.0.52 access both DMZ servers (10.1.0.27 &amp;amp; 10.1.0.31), just define nat (inside)/global (dmz) pair with ACL to control the access:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 3 10.0.0.52&lt;/P&gt;&lt;P&gt;global (dmz) 3 10.1.0.101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit ip host 10.0.0.52 host 10.1.0.27&lt;/P&gt;&lt;P&gt;access-list inside permit ip host 10.0.0.52 host 10.1.0.31&lt;/P&gt;&lt;P&gt;access-list inside deny ip 10.0.0.0 255.255.255.0 10.1.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside permit ip 10.0.0.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above will allow only 10.0.0.52 to access dmz's 10.1.0.27 &amp;amp; 10.1.0.31&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172786.html#wp1112345" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172786.html#wp1112345&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a008017278e.html#wp1069973" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a008017278e.html#wp1069973&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094aad.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094aad.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Dec 2006 12:23:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648812#M1033350</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-05T12:23:51Z</dc:date>
    </item>
    <item>
      <title>Re: Access Through PIX Between DMZ and Inside</title>
      <link>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648813#M1033352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry to bother you again with this, but I have a quick question regarding your config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You said that "static (inside,dmz) 10.1.0.100 10.0.0.52 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow your DMZ hosts (10.1.0.27 &amp;amp; 10.1.0.31) to access the Inside server using DMZ's NATted IP of 10.1.0.100 instead of Inside server original IP of 10.0.0.52 "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the 10.1.0.100 Natted address is on the same subnet as the DMZ hosts, shouldnt it be on the inside LAN of 10.0.0.0?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also said&lt;/P&gt;&lt;P&gt;nat (inside) 3 10.0.0.52 &lt;/P&gt;&lt;P&gt;global (dmz) 3 10.1.0.101 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldnt the 10.1.0.101 address on the global pool be 10.1.0.100 ie the address from the earlier static (inside,dmz) command?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks again my friend,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2006 10:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-through-pix-between-dmz-and-inside/m-p/648813#M1033352</guid>
      <dc:creator>daniel.bowen</dc:creator>
      <dc:date>2006-12-08T10:10:00Z</dc:date>
    </item>
  </channel>
</rss>

