<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best Practice Two Tier Firewall Architecture in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/best-practice-two-tier-firewall-architecture/m-p/3580686#M157198</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Hi Ken,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;I am also posting first time.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Architecture will be vary depends upon client requirement. &lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;If customer have internal servers and internal team wants to use, those servers will be in behind lan firewall. Create NAT to hide the real server ip from internal user communication.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;All DMZ servers will be on Internet firewall.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Use P2P IPSEC/GRE tunnels between Client to customers/vendor communication on Internet firewall for more secure.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Create contexts for multiple clients.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Place the proxy server between lan and internet firewall for internet access.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Always routed mode firewall is good for troubleshooting point of view. I hope this may be useful.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Rajesh Vemuri.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 30 Jun 2016 01:54:57 GMT</pubDate>
    <dc:creator>rajevemu</dc:creator>
    <dc:date>2016-06-30T01:54:57Z</dc:date>
    <item>
      <title>Best Practice Two Tier Firewall Architecture</title>
      <link>https://community.cisco.com/t5/network-security/best-practice-two-tier-firewall-architecture/m-p/3580685#M157197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First time posting so bear with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking for a best practice design reference for a customer that wants a two tier firewall structure.&amp;nbsp; &lt;/P&gt;&lt;P&gt;--Does anyone have a reference link/document/book?&amp;nbsp; &lt;/P&gt;&lt;P&gt;--Should the customer use different vendors at each tier, I know that is blasphemy but I'm asking anyway since they wanted to Palo Alto on the 1st tier and ASA's on 2nd tier.&amp;nbsp; Current design in front of the client has the ASA in Transparent mode to conserve IP space is what I am being told.&lt;/P&gt;&lt;P&gt;--Is double-natting a best practice? Assuming we recommend ASA in routed mode over transparent mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be asking these same questions at Cisco Live in a few weeks but would like to get back to my customer sooner that that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help is certainly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;-Ken&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jun 2016 14:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-practice-two-tier-firewall-architecture/m-p/3580685#M157197</guid>
      <dc:creator>k.clifford</dc:creator>
      <dc:date>2016-06-29T14:59:18Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice Two Tier Firewall Architecture</title>
      <link>https://community.cisco.com/t5/network-security/best-practice-two-tier-firewall-architecture/m-p/3580686#M157198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Hi Ken,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;I am also posting first time.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Architecture will be vary depends upon client requirement. &lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;If customer have internal servers and internal team wants to use, those servers will be in behind lan firewall. Create NAT to hide the real server ip from internal user communication.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;All DMZ servers will be on Internet firewall.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Use P2P IPSEC/GRE tunnels between Client to customers/vendor communication on Internet firewall for more secure.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Create contexts for multiple clients.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Place the proxy server between lan and internet firewall for internet access.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Always routed mode firewall is good for troubleshooting point of view. I hope this may be useful.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #3d3d3d; background: white;"&gt;Rajesh Vemuri.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2016 01:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-practice-two-tier-firewall-architecture/m-p/3580686#M157198</guid>
      <dc:creator>rajevemu</dc:creator>
      <dc:date>2016-06-30T01:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice Two Tier Firewall Architecture</title>
      <link>https://community.cisco.com/t5/network-security/best-practice-two-tier-firewall-architecture/m-p/3580687#M157199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This link may useful.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/SAFE_RG/SAFE_rg.pdf" title="http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/SAFE_RG/SAFE_rg.pdf"&gt;http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/SAFE_RG/SAFE_rg.pdf&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2016 23:20:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-practice-two-tier-firewall-architecture/m-p/3580687#M157199</guid>
      <dc:creator>rajevemu</dc:creator>
      <dc:date>2016-06-30T23:20:23Z</dc:date>
    </item>
  </channel>
</rss>

