<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HI Mikey, So of you keep the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507792#M235665</link>
    <description>&lt;P&gt;HI Mikey,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So of you keep the setup like that... then you can terminate your ipsec VPN on the internet firewall.... providing access to the dmz server i.e. jump server and app server for your external clients...... authentication you can point your DC in aaa configurations for VPN to inside AD/DC server....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So your corporate users can access jump server and application server from corporate network....&lt;/P&gt;&lt;P&gt;corp network--&amp;gt;inside interface --&amp;gt; dmz---&amp;gt;app and jump servers&lt;/P&gt;&lt;P&gt;corp network ---&amp;gt;inside interface --&amp;gt;outside --&amp;gt;general internet access&lt;/P&gt;&lt;P&gt;external clients --&amp;gt;outside interface--&amp;gt;dmz zone -- app and jump servers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so all these would be possible in that way......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
    <pubDate>Tue, 12 Aug 2014 14:20:20 GMT</pubDate>
    <dc:creator>nkarthikeyan</dc:creator>
    <dc:date>2014-08-12T14:20:20Z</dc:date>
    <item>
      <title>Server setup in DMZ Environment</title>
      <link>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507788#M235653</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;Iam setting up a DMZ environment to have External customers access my Servers sitting in&amp;nbsp;the DMZ. I have attached the diagram for reference.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Proposed Setup&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1) 2x ISP links (redundant) - IPSEC connections from customer terminating on our Internet&amp;nbsp;Facing FWs.&lt;BR /&gt;2) There are 2 DMZ FWs separting the Corporate (internal) and External environment.&lt;BR /&gt;3) The APP server and Jump server is placed behind the Server switches.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Requirement&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1) External customer needs to access Jump server and APP server from over the Internet IPSEC VPN&lt;BR /&gt;2) Internal (Corporate)&amp;nbsp;users need to access the Jump server and App server.&lt;BR /&gt;3) Any user accessing the Jump server would need to get authenticated with from a Domain&amp;nbsp;controller. Domain controller would be on the Internal corporate&amp;nbsp;segment&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Questions&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1) With the current design, Internal users have to pass DMZ FW and Internet FW to access&amp;nbsp;server. Is it recommended? Is it ok to connect the servers behind a separate pair of&amp;nbsp;server switches? Or can they connect directly to DMZ switches? What is the best possible&amp;nbsp;solution (standard) that is generally followed in this case?&lt;BR /&gt;2) If there are multiple customers with IPSEC VPNs coming in, can VLANs be defined and&amp;nbsp;access given accordingly to the servers?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate your inputs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Mikey&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:36:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507788#M235653</guid>
      <dc:creator>Mikey John</dc:creator>
      <dc:date>2019-03-12T04:36:56Z</dc:date>
    </item>
    <item>
      <title>Could anyone please reply to</title>
      <link>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507789#M235658</link>
      <description>&lt;P&gt;Could anyone please reply to this.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2014 14:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507789#M235658</guid>
      <dc:creator>Mikey John</dc:creator>
      <dc:date>2014-08-11T14:38:41Z</dc:date>
    </item>
    <item>
      <title>Hi, Can anyone please reply</title>
      <link>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507790#M235661</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone please reply to this? Or else please guide me if I need to take this to another forum?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Mikey&lt;/P&gt;</description>
      <pubDate>Tue, 12 Aug 2014 11:51:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507790#M235661</guid>
      <dc:creator>Mikey John</dc:creator>
      <dc:date>2014-08-12T11:51:49Z</dc:date>
    </item>
    <item>
      <title>Hi Mikey, I am not sure why</title>
      <link>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507791#M235663</link>
      <description>&lt;P&gt;Hi Mikey,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure why you have kept the corporate network under the dmz zone. In general security practice we use to keep the dmz zone/dmz firewall for having the server/hosting environment where external parties requires access to those.... for example web server / application server.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So your design requires some change in order to have a better architecture....&lt;/P&gt;&lt;P&gt;internet&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;router&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;external SW&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;internet facing firewalls&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;DMZ SW and Junp Server / Application Server (DMZ Interface of the Firewall).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internet facing Firewall&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;LAN Interface SW (Inside Interface of the firewall)&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;LAN FW (If you really want to keep it)&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;Corporate Network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Aug 2014 14:15:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507791#M235663</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-08-12T14:15:45Z</dc:date>
    </item>
    <item>
      <title>HI Mikey, So of you keep the</title>
      <link>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507792#M235665</link>
      <description>&lt;P&gt;HI Mikey,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So of you keep the setup like that... then you can terminate your ipsec VPN on the internet firewall.... providing access to the dmz server i.e. jump server and app server for your external clients...... authentication you can point your DC in aaa configurations for VPN to inside AD/DC server....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So your corporate users can access jump server and application server from corporate network....&lt;/P&gt;&lt;P&gt;corp network--&amp;gt;inside interface --&amp;gt; dmz---&amp;gt;app and jump servers&lt;/P&gt;&lt;P&gt;corp network ---&amp;gt;inside interface --&amp;gt;outside --&amp;gt;general internet access&lt;/P&gt;&lt;P&gt;external clients --&amp;gt;outside interface--&amp;gt;dmz zone -- app and jump servers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so all these would be possible in that way......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Tue, 12 Aug 2014 14:20:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507792#M235665</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-08-12T14:20:20Z</dc:date>
    </item>
    <item>
      <title>Hi Karthik, Thanks for your</title>
      <link>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507793#M235667</link>
      <description>&lt;P&gt;Hi Karthik,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply. My Corporate Zone is not behind the DMZ as such. I have just depicted that the DMZ FW separates my corporate zone from the External network or External DMZ if you would say.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, if the traffic from outside follows this path, then would it make sense to have a separate pair of switches behind the DMZ switches to connect those servers? This is for making it more scalable (in case more servers come in)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internet--&amp;gt; External switch---&amp;gt;External FW---&amp;gt;DMZ Sw---&amp;gt;Jump servers&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Mikey&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 09:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507793#M235667</guid>
      <dc:creator>Mikey John</dc:creator>
      <dc:date>2014-08-14T09:54:44Z</dc:date>
    </item>
    <item>
      <title>Yeah. for outside users to</title>
      <link>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507794#M235669</link>
      <description>&lt;P&gt;Yeah. for outside users to access through VPN for the application server access....&lt;/P&gt;&lt;P&gt;internet --&amp;gt;external switch --&amp;gt;internet fw (dmz interface)--&amp;gt;dmz-sw--server LAN (Jump/App Server)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it is for the corporate users:&lt;/P&gt;&lt;P&gt;internet --&amp;gt;external switch --&amp;gt;internet fw (inside interface)--&amp;gt;corp lan network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can make inside to dmz or dmz to inside access for corp users access...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can tweak as per your requirement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 11:11:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-setup-in-dmz-environment/m-p/2507794#M235669</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-08-14T11:11:01Z</dc:date>
    </item>
  </channel>
</rss>

