<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Approaches for DMZ with public IP addresses in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641667#M586425</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:Standaardtabel;
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;P class="MsoNormal" style="margin-left: 0cm;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;If you bridge the interface to the DMZ with the interface connecting to the internet your router bridges packets instead of routing them and therefore layer 3 security won't be applied to this traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 0cm;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 0cm;"&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 0cm;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;You can also use private IP addresses in your DMZ and use static NAT rules to make them accessible from the internet.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 25 Dec 2010 00:05:38 GMT</pubDate>
    <dc:creator>jgraafmans</dc:creator>
    <dc:date>2010-12-25T00:05:38Z</dc:date>
    <item>
      <title>Approaches for DMZ with public IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641666#M586424</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking for feedback on best-practices approach to create a DMZ with public IP addresses.&amp;nbsp; It seems there are two options:&lt;/P&gt;&lt;P&gt;1.Have the ISP subnet the address block and assign one of these subnets to the DMZ.&amp;nbsp; From that point forward it is simply a matter of routing and assigning the DMZ and public interfaces in to zones with appropriate policies applied.&lt;BR /&gt;2.Use BVI to bridge between the internet zone and the DMZ zone.&amp;nbsp; This will allow the ISP address block to be bridged accross two interfaces.&amp;nbsp; The bridged interfaces can be assigned to the public and DMZ zones with appropriate policies applied.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm wondering if there are pros/cons to approach number 2, since I do not have experience with this approach in a production environment.&amp;nbsp; But more generally, I am looking for common/best-practices approache(s) to creating a DMZ with public ip addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:27:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641666#M586424</guid>
      <dc:creator>mahoneave</dc:creator>
      <dc:date>2019-03-11T19:27:35Z</dc:date>
    </item>
    <item>
      <title>Re: Approaches for DMZ with public IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641667#M586425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:Standaardtabel;
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;P class="MsoNormal" style="margin-left: 0cm;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;If you bridge the interface to the DMZ with the interface connecting to the internet your router bridges packets instead of routing them and therefore layer 3 security won't be applied to this traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 0cm;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 0cm;"&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 0cm;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;You can also use private IP addresses in your DMZ and use static NAT rules to make them accessible from the internet.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Dec 2010 00:05:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641667#M586425</guid>
      <dc:creator>jgraafmans</dc:creator>
      <dc:date>2010-12-25T00:05:38Z</dc:date>
    </item>
    <item>
      <title>Re: Approaches for DMZ with public IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641668#M586426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunatley, NATing is not an option for this application.&amp;nbsp; The devices in the DMZ must be addressed with non-NATed public IP addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My understanding of zone-based firewall is that upper-layer inspection is possible between the interfaces that make up the bridge group.&amp;nbsp; Is this incorrect?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Dec 2010 00:57:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641668#M586426</guid>
      <dc:creator>mahoneave</dc:creator>
      <dc:date>2010-12-25T00:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: Approaches for DMZ with public IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641669#M586427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;Sorry you're right it is indeed possible to configure IOS as a transparent firewall: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/gt_trans.html#wp1052681"&gt;http://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/gt_trans.html#wp1052681&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If possible I would still prefer having a /30 subnet to the ISP and another subnet on the DMZ. This makes it easier to configure and troubleshoot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Dec 2010 01:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641669#M586427</guid>
      <dc:creator>jgraafmans</dc:creator>
      <dc:date>2010-12-25T01:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: Approaches for DMZ with public IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641670#M586428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As of now you cannot bridge two interfaces of ASA for them&amp;nbsp; to be in the same subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use firewall in transparent mode then &lt;SPAN class="content"&gt;security appliance &lt;STRONG&gt;uses an inside interface and an &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;outside interface only&lt;/STRONG&gt;. If your platform includes a dedicated management &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;interface, you can also configure the management interface or subinterface for &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;management traffic only.Further, &lt;/SPAN&gt;&lt;SPAN class="content"&gt;in single context mode, &lt;STRONG&gt;you can only use two data interfaces&lt;/STRONG&gt; (and the &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;dedicated management interface, if available) even if your security appliance &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;includes more than two interfaces. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With transparent firewall mode,&lt;STRONG&gt; &lt;/STRONG&gt;&lt;SPAN class="content"&gt;&lt;STRONG&gt;Each &lt;/STRONG&gt;&lt;STRONG&gt;directly connected network must be on the same subnet&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Considering all these things, we can split the IP block provided by the ISP into 2. We can then assign one subnet to the DMZ and the other one to the outside. Your inside n/w remains untouched! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Manasi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Dec 2010 03:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641670#M586428</guid>
      <dc:creator>manasjai</dc:creator>
      <dc:date>2010-12-25T03:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Approaches for DMZ with public IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641671#M586429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, I am not sure if we are taking about an ASA here or a router with Zone based firewall configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above explanation is for ASA device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Manasi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Dec 2010 03:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641671#M586429</guid>
      <dc:creator>manasjai</dc:creator>
      <dc:date>2010-12-25T03:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: Approaches for DMZ with public IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641672#M586430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Manasi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&amp;nbsp; Yes I was referring to IOS firewall functionality I suppose.&amp;nbsp; The following link indicates that more than two interfaces can be configured when a birdged/transparent firewall is configured on an IOS zone-pair firewall.&amp;nbsp; I'm suprised that an ASA cannot do the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml#req"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml#req&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So is splitting the ISP address block the common approach.&amp;nbsp; The downside of this is that I would burn two additional IPs out of my block, and I'd also have to participate in routing with my ISP.&amp;nbsp; Is it possible to simply have a privately addressed connection to my perimeter device, i.e. 10.10.10.0/30, then I could manage the routes between the subnetted public IP block?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, I'm mainly interested in common/typical approaches to creating publicly addressed DMZs.&amp;nbsp; What does the crowd say?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Dec 2010 22:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641672#M586430</guid>
      <dc:creator>mahoneave</dc:creator>
      <dc:date>2010-12-25T22:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: Approaches for DMZ with public IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641673#M586431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA would be getting similar functionality in later versions. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well since we are talking about IOS firewall here, yes we can do bridging.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you talk about the crowd, I have generally seen them spliting the IP block!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Manasi!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Dec 2010 04:09:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/approaches-for-dmz-with-public-ip-addresses/m-p/1641673#M586431</guid>
      <dc:creator>manasjai</dc:creator>
      <dc:date>2010-12-26T04:09:27Z</dc:date>
    </item>
  </channel>
</rss>

