<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pix DMZ to Inside access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-dmz-to-inside-access/m-p/40972#M677146</link>
    <description>&lt;P&gt;I have a smtp bastion host on a DMZ in a PIX 515. The DMZ needs to be able to send mail to a host on the inside network. Assume the following scenario: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0 &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100 &lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz security50 &lt;/P&gt;&lt;P&gt;ip address outside 175.0.0.1 255.255.255.224 &lt;/P&gt;&lt;P&gt;ip address inside 100.0.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip address dmz 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;global (dmz) 1 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ server IP= 192.168.1.2 &lt;/P&gt;&lt;P&gt;INSIDE server IP=100.0.0.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside hosts can access DMZ server but I need the DMZ server to be able to send e-mail on port 25 back to an inside server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 06:12:18 GMT</pubDate>
    <dc:creator>exigent</dc:creator>
    <dc:date>2020-02-21T06:12:18Z</dc:date>
    <item>
      <title>Pix DMZ to Inside access</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-to-inside-access/m-p/40972#M677146</link>
      <description>&lt;P&gt;I have a smtp bastion host on a DMZ in a PIX 515. The DMZ needs to be able to send mail to a host on the inside network. Assume the following scenario: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0 &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100 &lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz security50 &lt;/P&gt;&lt;P&gt;ip address outside 175.0.0.1 255.255.255.224 &lt;/P&gt;&lt;P&gt;ip address inside 100.0.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip address dmz 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;global (dmz) 1 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ server IP= 192.168.1.2 &lt;/P&gt;&lt;P&gt;INSIDE server IP=100.0.0.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside hosts can access DMZ server but I need the DMZ server to be able to send e-mail on port 25 back to an inside server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-to-inside-access/m-p/40972#M677146</guid>
      <dc:creator>exigent</dc:creator>
      <dc:date>2020-02-21T06:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: Pix DMZ to Inside access</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-to-inside-access/m-p/40973#M677172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For access from an interface of lower security to one of higher security, you will need to configure a static translation and appropriate access-lists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your example above, you would need something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 100.0.0.2 100.0.0.2 netmask 255.255.255.255  -&amp;gt; so that the DMZ users can recognise the server on the inside using the 100.0.0.2 address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp host 192.168.1.2 host 100.0.0.2 eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you would then need to apply the access-list to the interface using:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 101 in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: the access-list will block all other traffic from going through the DMZ interface so you will need to make sure you permit any other necessary traffic, regardless of the destination (inside or outside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see the following sample configuration:  &lt;A class="jive-link-custom" href="http://www.cisco.com/warp/customer/110/mailserver_in.html" target="_blank"&gt;http://www.cisco.com/warp/customer/110/mailserver_in.html&lt;/A&gt;  -  it is for outside access to an inside SMTP server, but the same theory applies because it is still lower security level to higher security level.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Aug 2002 22:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-to-inside-access/m-p/40973#M677172</guid>
      <dc:creator>albadger</dc:creator>
      <dc:date>2002-08-13T22:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: Pix DMZ to Inside access</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-to-inside-access/m-p/40974#M677187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks! That worked!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Aug 2002 01:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-to-inside-access/m-p/40974#M677187</guid>
      <dc:creator>exigent</dc:creator>
      <dc:date>2002-08-14T01:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: Pix DMZ to Inside access</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-to-inside-access/m-p/40975#M677231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you need a static and a conduit to the inside from the dmz.  If you are using ACL's the same rules apply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) etc.&lt;/P&gt;&lt;P&gt;access-list inside permit tcp (dmz) to (Inside) eq  25&lt;/P&gt;&lt;P&gt;conduit permit tcp (dmz) to (Inside) eq  25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2002 06:13:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-to-inside-access/m-p/40975#M677231</guid>
      <dc:creator>mjones</dc:creator>
      <dc:date>2002-08-20T06:13:07Z</dc:date>
    </item>
  </channel>
</rss>

