<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall Implementation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236138#M347380</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Maro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A firewall is a device that will be place into the network to filter traffic (depending on the security policies your managment team has set) to protect the internal resources from both internal and outside threaths,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you place a firewall in front of a server farm that will protect them it would be amazing,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now remember that you will need to configure the firewall to allow access to those servers on the right ports/services,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts. &lt;BR /&gt; &lt;BR /&gt;For this community that's as important as a thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 29 Jun 2013 04:03:12 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-06-29T04:03:12Z</dc:date>
    <item>
      <title>Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236136#M347378</link>
      <description>&lt;P&gt;Is it advisable to place a firewall infront of my server farm???? and why&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236136#M347378</guid>
      <dc:creator>Maro.Cisco</dc:creator>
      <dc:date>2019-03-12T02:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236137#M347379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Firewall questions should be posted in the Security Firewall forum. This forum is strictly wireless.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jun 2013 15:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236137#M347379</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2013-06-27T15:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236138#M347380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Maro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A firewall is a device that will be place into the network to filter traffic (depending on the security policies your managment team has set) to protect the internal resources from both internal and outside threaths,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you place a firewall in front of a server farm that will protect them it would be amazing,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now remember that you will need to configure the firewall to allow access to those servers on the right ports/services,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts. &lt;BR /&gt; &lt;BR /&gt;For this community that's as important as a thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Jun 2013 04:03:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236138#M347380</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-06-29T04:03:12Z</dc:date>
    </item>
    <item>
      <title>Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236139#M347383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok what do u think about this implementation , &lt;/P&gt;&lt;P&gt;i have servers that will be exposed to the internet access , also i have server farm which will be used to internal use , now what do u think of this design , Internet-----Redundant Firewall1 with IPS------Firewall 2----------Core switch -------------Distributuion switchs-------------End user.&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 17px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;Firewall1: outer interface to internet , Internal interface to firewall2 , DMZ interface to DNS and EMail server&lt;/P&gt;&lt;P&gt;Firewall2 : Outer interface to firewall1 , DMZ interface to Server Farm , internal interface for core switchs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Jun 2013 04:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236139#M347383</guid>
      <dc:creator>Maro.Cisco</dc:creator>
      <dc:date>2013-06-29T04:20:30Z</dc:date>
    </item>
    <item>
      <title>Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236140#M347384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Maro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's looks like you will need to be less restrictive on the Outside firewall as you will have some servers on the DMZ but you can be as restrictive as you want on the 2 ASA,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I like the approach as you are not just adding one layer of security, you are going beyond that which is pretty good,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts. &lt;BR /&gt; &lt;BR /&gt;For this community that's as important as a thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Jun 2013 04:30:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236140#M347384</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-06-29T04:30:49Z</dc:date>
    </item>
    <item>
      <title>Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236141#M347385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you but one last question , i have bluecoat which is acting as a internet proxy server to wireless users and websense for lan users access where shall i place those devices ??? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Jun 2013 04:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236141#M347385</guid>
      <dc:creator>Maro.Cisco</dc:creator>
      <dc:date>2013-06-29T04:46:35Z</dc:date>
    </item>
    <item>
      <title>Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236142#M347386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Maro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That depends, if it's just for wireless users you could place it on the same vlan than them (so the ASA does not need to handle that process{Redirect traffic to the Websense server}) but if you need to forward the traffic from multiple subnets you will then need to consider using the ASA to redirect the traffic to those proxies,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts. &lt;BR /&gt; &lt;BR /&gt;For this community that's as important as a thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Jun 2013 05:27:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236142#M347386</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-06-29T05:27:25Z</dc:date>
    </item>
    <item>
      <title>Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236143#M347387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes for being &lt;SPAN style="font-size: 10pt;"&gt;restrictive on the firewall2 which is connected to server farm and internal users , the link connected to firewall1 will be level 0 thus no traffic will be allowed by default from firewall1 going to server farm or internal users, on the otherhand traffic from internal users to serverfarm will be allowed as they will have a higher level security but i would even make policy that traffic going from internal users to server farm would be allowed based on specific servers ports.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Jun 2013 06:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236143#M347387</guid>
      <dc:creator>Maro.Cisco</dc:creator>
      <dc:date>2013-06-29T06:24:24Z</dc:date>
    </item>
    <item>
      <title>Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236144#M347388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Maro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Excellent,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have sent you a private message&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts. &lt;BR /&gt; &lt;BR /&gt;For this community that's as important as a thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Jun 2013 15:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236144#M347388</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-06-29T15:41:32Z</dc:date>
    </item>
    <item>
      <title>Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236145#M347389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jcarvaja ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;im not sure if i got your point about where to attach my websense and bluecoat servers should it be connected to the outside firewall or the 2nd firewall which is better as best practise???.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jun 2013 13:10:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236145#M347389</guid>
      <dc:creator>Maro.Cisco</dc:creator>
      <dc:date>2013-06-30T13:10:14Z</dc:date>
    </item>
    <item>
      <title>Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236146#M347390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Maro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I meant to say:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you are gonna use it to filter the traffic being generated by the inside users right?&lt;/P&gt;&lt;P&gt;So you could place it on the same interface than the clients, in this way traffic will reach the ASA and go redirected to the right server so traffic can be filtered,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts. &lt;BR /&gt; &lt;BR /&gt;For this community that's as important as a thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jun 2013 16:12:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236146#M347390</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-06-30T16:12:24Z</dc:date>
    </item>
    <item>
      <title>Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236147#M347391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i was thinking to connect my bluecoat server ( guest wireless users) and my websense ( Wired internet traffic) to Firewall1 DMZ interface ???? so upload traffic going from internal users to internet will be PC&amp;gt;&amp;gt;Distrubtion switch &amp;gt; Core Switch &amp;gt;&amp;gt;&amp;gt; Firewall2 &amp;gt;&amp;gt;&amp;gt;&amp;gt; Firewall 1 &amp;gt;&amp;gt;&amp;gt; DMZ &amp;gt;&amp;gt;Blue Coat / Websense&amp;gt;&amp;gt;&amp;gt;Firewall1 &amp;gt;&amp;gt;&amp;gt;&amp;gt; Internet????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jun 2013 16:42:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236147#M347391</guid>
      <dc:creator>Maro.Cisco</dc:creator>
      <dc:date>2013-06-30T16:42:25Z</dc:date>
    </item>
    <item>
      <title>Firewall Implementation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236148#M347392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Maro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean, you should redirect the traffic at the firewall level and it should work,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No problem at all where you place it, it just that depending where you place it traffic will need to go further,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But again if everything is properly configured you should be good &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts. &lt;BR /&gt; &lt;BR /&gt;For this community that's as important as a thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jun 2013 17:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-implementation/m-p/2236148#M347392</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-06-30T17:10:16Z</dc:date>
    </item>
  </channel>
</rss>

