<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX 525 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-525/m-p/59878#M711069</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a dmz interface running on network 192.168.2.0 and inside network running on 192.168.1.0.  I want all of my devices on dmz to connect to devices on inside network.  What conduit commands I could use in conjuction with the command below to open the whole network from dmz to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 06:00:16 GMT</pubDate>
    <dc:creator>abbas.ali</dc:creator>
    <dc:date>2020-02-21T06:00:16Z</dc:date>
    <item>
      <title>PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/pix-525/m-p/59878#M711069</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a dmz interface running on network 192.168.2.0 and inside network running on 192.168.1.0.  I want all of my devices on dmz to connect to devices on inside network.  What conduit commands I could use in conjuction with the command below to open the whole network from dmz to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525/m-p/59878#M711069</guid>
      <dc:creator>abbas.ali</dc:creator>
      <dc:date>2020-02-21T06:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/pix-525/m-p/59879#M711096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That kind of configuration is completely unsecure.  What you want, is opening completely your internal network from DMZ, and this  one, by definition, is open to the Internet, then internal nets will be open to the Internet through DMZ servers.  Of course, it's possible to do that, but you shouldn't.  But, if you absolutely want that config, move your servers to inside and kill your DMZ network, you don't need it anymore.  Don't forget, F/Ws aren't miracle box against hackers.  They just filtered out some attacks based on the security you have configured on it.  Then, f/w is as good as the person who has configured it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want some advices on this subject, you can contact me directly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Mar 2002 16:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525/m-p/59879#M711096</guid>
      <dc:creator>bdube</dc:creator>
      <dc:date>2002-03-16T16:53:01Z</dc:date>
    </item>
  </channel>
</rss>

