<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX 515 DMZ problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515-dmz-problem/m-p/349893#M554254</link>
    <description>&lt;P&gt;   Hello,&lt;/P&gt;&lt;P&gt;   We are having some difficulties in moving the traffic in and out of a Cisco PIx 515 firewall. We are using it with two DMZs. The first DMZ has a mail server in it (Front end mail server) that communicates with another mail server in the inside (Back end mail server), this is called DMZ1. The second DMZ (DMZ2) has some users who are supposed to go through the firewall to the outside and use the internet and must have access to the mail server in DMZ1. The inside users must be able to use the Internet and can access DMZ1. Below is the important part of our configuration.&lt;/P&gt;&lt;P&gt;	From what we did, we can access the internet properly from the inside, the inside users can reach the the mail server in DMZ1 and the mail server in DMZ1 can reach the the inside. Our problem is that we can't browse the internet on the mail server in DMZ1 though we set DMZ1 interface ip address as the gateway on that server and the ISP's DNS ip address is propely set on the same machine. Also, we couldn't make DMZ2 users browse the internet, though we permitted the www protocol in the fromOut access-list. One last question, can we make the DMZ2 interface on the PIX a DHCP server and make it distribute ip addresses for the users on that subnet only?? Thanks for all the help offered in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;interface ethernet3 auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz1 security50&lt;/P&gt;&lt;P&gt;nameif ethernet3 dmz2 security40&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip address outside X.Y.Z.163 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.0.9 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address dmz1 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address dmz2 192.168.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list fromOut permit icmp any host X.Y.Z.162 source-quench &lt;/P&gt;&lt;P&gt;access-list fromOut permit icmp any host X.Y.Z.162 echo-reply &lt;/P&gt;&lt;P&gt;access-list fromOut permit icmp any host X.Y.Z.162 unreachable &lt;/P&gt;&lt;P&gt;access-list fromOut permit icmp any host X.Y.Z.162 time-exceeded &lt;/P&gt;&lt;P&gt;access-list fromOut permit tcp any host X.Y.Z.162 eq domain &lt;/P&gt;&lt;P&gt;access-list fromOut permit tcp any host X.Y.Z.162 eq telnet &lt;/P&gt;&lt;P&gt;access-list fromOut permit tcp any host X.Y.Z.162 eq smtp &lt;/P&gt;&lt;P&gt;access-list fromOut permit tcp any host X.Y.Z.162 eq www &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list fromDMZ1 permit tcp host 192.168.10.2 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list fromDMZ1 permit ip host 192.168.10.2 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list fromDMZ2 permit tcp 192.168.20.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz1 1500&lt;/P&gt;&lt;P&gt;mtu dmz2 1500&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outside) 1 X.Y.Z.164 netmask 255.255.255.248&lt;/P&gt;&lt;P&gt;global (outside) 2 X.Y.Z.165 netmask 255.255.255.248&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;nat (dmz1) 1 192.168.10.2 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;nat (dmz2) 2 192.168.20.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz1) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;static (dmz2,dmz1) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;static (dmz1,outside) X.Y.Z.162 192.168.10.2 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group fromOut in interface outside&lt;/P&gt;&lt;P&gt;access-group fromDMZ1 in interface dmz1&lt;/P&gt;&lt;P&gt;access-group fromDMZ2 in interface dmz2&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 X.Y.Z.161 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 07:47:11 GMT</pubDate>
    <dc:creator>jamil.abuaqel</dc:creator>
    <dc:date>2020-02-21T07:47:11Z</dc:date>
    <item>
      <title>PIX 515 DMZ problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-dmz-problem/m-p/349893#M554254</link>
      <description>&lt;P&gt;   Hello,&lt;/P&gt;&lt;P&gt;   We are having some difficulties in moving the traffic in and out of a Cisco PIx 515 firewall. We are using it with two DMZs. The first DMZ has a mail server in it (Front end mail server) that communicates with another mail server in the inside (Back end mail server), this is called DMZ1. The second DMZ (DMZ2) has some users who are supposed to go through the firewall to the outside and use the internet and must have access to the mail server in DMZ1. The inside users must be able to use the Internet and can access DMZ1. Below is the important part of our configuration.&lt;/P&gt;&lt;P&gt;	From what we did, we can access the internet properly from the inside, the inside users can reach the the mail server in DMZ1 and the mail server in DMZ1 can reach the the inside. Our problem is that we can't browse the internet on the mail server in DMZ1 though we set DMZ1 interface ip address as the gateway on that server and the ISP's DNS ip address is propely set on the same machine. Also, we couldn't make DMZ2 users browse the internet, though we permitted the www protocol in the fromOut access-list. One last question, can we make the DMZ2 interface on the PIX a DHCP server and make it distribute ip addresses for the users on that subnet only?? Thanks for all the help offered in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;interface ethernet3 auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz1 security50&lt;/P&gt;&lt;P&gt;nameif ethernet3 dmz2 security40&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip address outside X.Y.Z.163 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.0.9 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address dmz1 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address dmz2 192.168.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list fromOut permit icmp any host X.Y.Z.162 source-quench &lt;/P&gt;&lt;P&gt;access-list fromOut permit icmp any host X.Y.Z.162 echo-reply &lt;/P&gt;&lt;P&gt;access-list fromOut permit icmp any host X.Y.Z.162 unreachable &lt;/P&gt;&lt;P&gt;access-list fromOut permit icmp any host X.Y.Z.162 time-exceeded &lt;/P&gt;&lt;P&gt;access-list fromOut permit tcp any host X.Y.Z.162 eq domain &lt;/P&gt;&lt;P&gt;access-list fromOut permit tcp any host X.Y.Z.162 eq telnet &lt;/P&gt;&lt;P&gt;access-list fromOut permit tcp any host X.Y.Z.162 eq smtp &lt;/P&gt;&lt;P&gt;access-list fromOut permit tcp any host X.Y.Z.162 eq www &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list fromDMZ1 permit tcp host 192.168.10.2 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list fromDMZ1 permit ip host 192.168.10.2 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list fromDMZ2 permit tcp 192.168.20.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz1 1500&lt;/P&gt;&lt;P&gt;mtu dmz2 1500&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outside) 1 X.Y.Z.164 netmask 255.255.255.248&lt;/P&gt;&lt;P&gt;global (outside) 2 X.Y.Z.165 netmask 255.255.255.248&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;nat (dmz1) 1 192.168.10.2 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;nat (dmz2) 2 192.168.20.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz1) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;static (dmz2,dmz1) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;static (dmz1,outside) X.Y.Z.162 192.168.10.2 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group fromOut in interface outside&lt;/P&gt;&lt;P&gt;access-group fromDMZ1 in interface dmz1&lt;/P&gt;&lt;P&gt;access-group fromDMZ2 in interface dmz2&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 X.Y.Z.161 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:47:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-dmz-problem/m-p/349893#M554254</guid>
      <dc:creator>jamil.abuaqel</dc:creator>
      <dc:date>2020-02-21T07:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515 DMZ problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-dmz-problem/m-p/349894#M554256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jamil,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One important thing to note here are the access-lists. Always remember that a implicit deny rule is there in an access-list at the end. the answers to your problems are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) mail server in DMZ 1 not able to browse:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just make sure you have the following on the access-list fromDMZ1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list fromDMZ1 permit tcp host 192.168.10.2 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list fromDMZ1 permit ip host 192.168.10.2 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list fromDMZ1 permit ip host 192.168.10.2 any eq http&lt;/P&gt;&lt;P&gt;access-list fromDMZ1 permit ip host 192.168.10.2 any eq https&lt;/P&gt;&lt;P&gt;access-list fromDMZ1 permit ip host 192.168.10.2 any eq dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;add the access-list to open whatever port you want from 192.168.10.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) DMZ2 users not able to browse:please change it to the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list fromDMZ2 permit tcp 192.168.20.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list fromDMZ2 permit tcp 192.168.2.0 255.255.255.0 any eq http&lt;/P&gt;&lt;P&gt;access-list fromDMZ2 permit tcp 192.168.2.0 255.255.255.0 eq dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DHCP option:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes.. you can configure.. refer to the following URL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a008008cd12.html#wp1050373" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a008008cd12.html#wp1050373&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.. all the best..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Dec 2004 07:09:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-dmz-problem/m-p/349894#M554256</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2004-12-04T07:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515 DMZ problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-dmz-problem/m-p/349895#M554258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jamil,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a phrase on the URL that i sent you , that you can currently enable dhcp option on the inside interface only. Just check this..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Dec 2004 07:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-dmz-problem/m-p/349895#M554258</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2004-12-04T07:11:23Z</dc:date>
    </item>
  </channel>
</rss>

