<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic web server (linux) sits in the DMZ (asa 5520) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955420#M440329</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your case is nearly exactly described in the config guide. Both for NAT and ACLs. Just give it a try ...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 30 Jun 2012 15:18:49 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2012-06-30T15:18:49Z</dc:date>
    <item>
      <title>web server (linux) sits in the DMZ (asa 5520)</title>
      <link>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955415#M440322</link>
      <description>&lt;P&gt;Hi Experts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I Have web server (linux) sits in the DMZ (asa 5520) segment and this server should be accessible form the internet, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)how to make this server&amp;nbsp; https based access over SSL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)how to protect this server form network and security standpoint?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;jamil&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955415#M440322</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2019-03-11T23:24:31Z</dc:date>
    </item>
    <item>
      <title>web server (linux) sits in the DMZ (asa 5520)</title>
      <link>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955416#M440323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA doesn't care if it's HTTPS or anything else. You just allow tcp/443 on the outside ACL and add a static NAT for the server. Thats it. The Server is now protected that no other traffic is allowed to that server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA will not protect you from any harm thats coming through the HTTPS-connection. If you want your ASA to protect you from that, then you have to decrypt the traffic in front on the ASA i.e. with an SSL-Offloader. Or, the HTTPS is terminated in a seperate DMZ at a reverse-proxy, and that proxy sends HTTP to your real server in the original DMZ. Now the ASA can inspect the HTTP from the proxy to your webserver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another important control is that the ACL on the ASA only permits traffic that's really needed. For example only DNS and FTP/HTTP to the update-server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For even more security, you could add the AIP-SSM for IPS. In the scenario with the reverse-proxy or the SSL-Offload the IPS can search the HTTP-Traffic for known attacks against your server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 07:15:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955416#M440323</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-06-29T07:15:39Z</dc:date>
    </item>
    <item>
      <title>web server (linux) sits in the DMZ (asa 5520)</title>
      <link>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955417#M440324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi karsten&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for ur reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pls do u have a link which is similar to my case to start&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 07:34:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955417#M440324</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2012-06-29T07:34:03Z</dc:date>
    </item>
    <item>
      <title>web server (linux) sits in the DMZ (asa 5520)</title>
      <link>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955418#M440325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats the way to find this sort of documentation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;www.cisco.com/go/asa -&amp;gt; select "Configure" (on the right side under "Support"), then choose "Configuration Guides". Depending on your ASA-version and your ASDM/CLI-preference you find the complete documetation. In te guides go for access-control and NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 08:12:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955418#M440325</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-06-29T08:12:17Z</dc:date>
    </item>
    <item>
      <title>web server (linux) sits in the DMZ (asa 5520)</title>
      <link>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955419#M440328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i meant pdf similar to my case , &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 08:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955419#M440328</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2012-06-29T08:17:46Z</dc:date>
    </item>
    <item>
      <title>web server (linux) sits in the DMZ (asa 5520)</title>
      <link>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955420#M440329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your case is nearly exactly described in the config guide. Both for NAT and ACLs. Just give it a try ...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2012 15:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955420#M440329</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-06-30T15:18:49Z</dc:date>
    </item>
    <item>
      <title>web server (linux) sits in the DMZ (asa 5520)</title>
      <link>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955421#M440330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b9b509.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b9b509.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the link for your reference.They are allowing port 25 from outside.And you want 443 this is the difference.&lt;/P&gt;&lt;P&gt;Hope this helps you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 06:27:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-server-linux-sits-in-the-dmz-asa-5520/m-p/1955421#M440330</guid>
      <dc:creator>gouravbathla</dc:creator>
      <dc:date>2012-07-03T06:27:44Z</dc:date>
    </item>
  </channel>
</rss>

