<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic firewall policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-policy/m-p/648581#M1036393</link>
    <description>&lt;P&gt;hi all, I am new to firewall. now we have a FW for internet access. My boss asked me to design some policy to be applied on the FW.   Can some of you share some configuration/policy to me. Our DMZ topology is quite simple: &lt;/P&gt;&lt;P&gt;intenet--------internet router--------ASA 5520-----LAN. There are some servers in the LAN, they are: Databased server, Mail server (need to be accessed via internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:21:24 GMT</pubDate>
    <dc:creator>att-sgcops</dc:creator>
    <dc:date>2019-03-11T09:21:24Z</dc:date>
    <item>
      <title>firewall policy</title>
      <link>https://community.cisco.com/t5/network-security/firewall-policy/m-p/648581#M1036393</link>
      <description>&lt;P&gt;hi all, I am new to firewall. now we have a FW for internet access. My boss asked me to design some policy to be applied on the FW.   Can some of you share some configuration/policy to me. Our DMZ topology is quite simple: &lt;/P&gt;&lt;P&gt;intenet--------internet router--------ASA 5520-----LAN. There are some servers in the LAN, they are: Databased server, Mail server (need to be accessed via internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:21:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-policy/m-p/648581#M1036393</guid>
      <dc:creator>att-sgcops</dc:creator>
      <dc:date>2019-03-11T09:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: firewall policy</title>
      <link>https://community.cisco.com/t5/network-security/firewall-policy/m-p/648582#M1036411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would create a DMZ for the internet based servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest somethign more like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inet&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;Inet router&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;ASA ---- DMZ with externally accessed servers&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;Interal router&lt;/P&gt;&lt;P&gt;| &lt;/P&gt;&lt;P&gt;Internal lans&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as policy, I would allow the internet uses to access the DMZ resources only on the ports required for functionality.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allow outboud from the internal network only on the ports required for work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You actually need 3 seperate policys&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 for the outside interface&lt;/P&gt;&lt;P&gt;1 for the dmz interface &lt;/P&gt;&lt;P&gt;1 for the inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also need a translation for internal hosts to get out and to access the dmz resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2007 14:43:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-policy/m-p/648582#M1036411</guid>
      <dc:creator>martybarron</dc:creator>
      <dc:date>2007-01-18T14:43:56Z</dc:date>
    </item>
  </channel>
</rss>

