<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DMZ question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026282#M439192</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In theory no...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason being if the destination resides in the same layer three boundary (same subnet) then the source will do an ARP request and find the destinations MAC.&amp;nbsp; From there the source node will send the data directly to the destination's MAC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no man in the middle (firewall) to filter this traffic.&amp;nbsp; If you were routing between networks and the firewall was in the middle it would work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 20 Aug 2012 19:20:21 GMT</pubDate>
    <dc:creator>Derron Carstensen</dc:creator>
    <dc:date>2012-08-20T19:20:21Z</dc:date>
    <item>
      <title>DMZ question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026281#M439191</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Am I able to apply an ACL within the same DMZ to prevent one host from talking to another............in that same DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ X:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.17.1.1 is allowed to talk to the internet and to internal hosts BUT,&lt;/P&gt;&lt;P&gt;Denied from talking to 172.17.3.3 which is on the same DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I just do a:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit ip host 172.17.1.1 any port whatever&lt;/P&gt;&lt;P&gt;deny ip host 172.17.1.1 host 172.17.3.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:44:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026281#M439191</guid>
      <dc:creator>m.saunders</dc:creator>
      <dc:date>2019-03-11T23:44:02Z</dc:date>
    </item>
    <item>
      <title>DMZ question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026282#M439192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In theory no...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason being if the destination resides in the same layer three boundary (same subnet) then the source will do an ARP request and find the destinations MAC.&amp;nbsp; From there the source node will send the data directly to the destination's MAC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no man in the middle (firewall) to filter this traffic.&amp;nbsp; If you were routing between networks and the firewall was in the middle it would work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 19:20:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026282#M439192</guid>
      <dc:creator>Derron Carstensen</dc:creator>
      <dc:date>2012-08-20T19:20:21Z</dc:date>
    </item>
    <item>
      <title>DMZ question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026283#M439193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; So if we put both devices in 2 different DMZ's we can then apply ACL's around them and protect them from one another?&amp;nbsp; Do they have to be in different subnets as well?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 19:27:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026283#M439193</guid>
      <dc:creator>m.saunders</dc:creator>
      <dc:date>2012-08-20T19:27:22Z</dc:date>
    </item>
    <item>
      <title>DMZ question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026284#M439194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes if you place them in two different DMZs (which would also be different subnets) then you can use ACLs on the firewall to allow/block specific traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 19:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026284#M439194</guid>
      <dc:creator>Derron Carstensen</dc:creator>
      <dc:date>2012-08-20T19:33:15Z</dc:date>
    </item>
    <item>
      <title>DMZ question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026285#M439195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 19:38:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026285#M439195</guid>
      <dc:creator>m.saunders</dc:creator>
      <dc:date>2012-08-20T19:38:53Z</dc:date>
    </item>
    <item>
      <title>DMZ question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026286#M439196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;You can't deny network traffic when the source and destination are in the same network address. However, if you still want to block access between these 2 devices (assuming both these devices are physically connected to the same Cisco L2 switches), you'll need to configure &lt;STRONG&gt;Private VLAN&lt;/STRONG&gt;, on those switchports. This will work like a charm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/tech/tk389/tk814/tk840/tsd_technology_support_sub-protocol_home.html"&gt;http://www.cisco.com/en/US/tech/tk389/tk814/tk840/tsd_technology_support_sub-protocol_home.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;STRONG&gt;P/S: If you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 03:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026286#M439196</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-08-21T03:01:12Z</dc:date>
    </item>
    <item>
      <title>DMZ question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026287#M439197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not a bro but thank you for the response!!&amp;nbsp; LOL&amp;nbsp; This helps in my configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michelle&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 12:18:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-question/m-p/2026287#M439197</guid>
      <dc:creator>m.saunders</dc:creator>
      <dc:date>2012-08-21T12:18:13Z</dc:date>
    </item>
  </channel>
</rss>

