<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX DMZ configuration problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-dmz-configuration-problem/m-p/201642#M590256</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kay Keong,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your config look good.  You can capture packets in DMZ to examine incoming &amp;amp; outgoing packets, you should be able to identify where is the problem.  If not, you need to go deeper by using debug/syslog feature on PIX to see if it has something wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Sep 2003 11:40:13 GMT</pubDate>
    <dc:creator>bdube</dc:creator>
    <dc:date>2003-09-01T11:40:13Z</dc:date>
    <item>
      <title>PIX DMZ configuration problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-configuration-problem/m-p/201641#M590253</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I do have some trouble to get my dmz settings working. I have a reverse proxy, located in the dmz, which is supposed to redirect all http traffice to a certain domain to web server that is in the inside network. The PIX does NAT all connections originating for inside and dmz (perimeter):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (perimeter) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all I created a static to outside for my reverse proxy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (perimeter,outside) x.x.x.x 192.168.109.52 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I permitted access to the reverse proxy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host x.x.x.x eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And bound the access-list to the outside interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 100 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far so good, everything&amp;#146;s working at this point. But as soon as I add an access-list for using the web server in the inside network, it interrupts my connection flow. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Excemption to nat from inside to dmz:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,perimeter) 192.168.108.0 192.168.108.0 netmask 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;static (inside,perimeter) 192.168.107.0 192.168.107.0 netmask 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Permit access to the inside web server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 200 permit tcp host 192.168.109.52 host 192.168.108.34 eq 7777 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now what happens is (or at least I assume it): A host connections to the IP x.x.x.x for a http request. The PIX passes the request to the reverse proxy using the acl 100. The reverse proxy picks up the request and processes it respectively forwards it to the internal web server. The answer is sent back to the reverse proxy and then it tries to transmit the response back to the requester. Actually this should work based on the inferface definition of the security level: inside 100, perimeter 50, outside 0. But the responses does not get through to the outside anymore. I guess it must be somewhere between the reverse proxy and the PIX since the network connections (a) is hold between reverse proxy and requester and a new connection (b) is hold by reverse proxy and inside web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have a clue on how to solve this problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Kai Keong Ng&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-configuration-problem/m-p/201641#M590253</guid>
      <dc:creator>kk.ng</dc:creator>
      <dc:date>2020-02-21T06:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: PIX DMZ configuration problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-configuration-problem/m-p/201642#M590256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kay Keong,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your config look good.  You can capture packets in DMZ to examine incoming &amp;amp; outgoing packets, you should be able to identify where is the problem.  If not, you need to go deeper by using debug/syslog feature on PIX to see if it has something wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Sep 2003 11:40:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-configuration-problem/m-p/201642#M590256</guid>
      <dc:creator>bdube</dc:creator>
      <dc:date>2003-09-01T11:40:13Z</dc:date>
    </item>
  </channel>
</rss>

