<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic static NAT device across DMZs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-device-across-dmzs/m-p/1223990#M876963</link>
    <description>&lt;P&gt;I have a new DMZ that we created for a CSS to act as a DNS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The CSS will need to access several other DMZs for the services to check different servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All of the existing DMZs are of a higher security level than that of the new DMZ.&lt;/P&gt;&lt;P&gt;My question is regarding the NATing across the DMZs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a rule of thumb regarding security levels when creating the NATs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, it would be more efficient for me to NAT the new DMZ CSS to the other DMZs, because the other DMZs have more than one server the CSS has to poll:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New_DMZ device = &lt;/P&gt;&lt;P&gt;192.168.8.2&lt;/P&gt;&lt;P&gt;interface security level = 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ1&lt;/P&gt;&lt;P&gt;192.168.9.5 (server1)&lt;/P&gt;&lt;P&gt;192.168.9.10 (server2)&lt;/P&gt;&lt;P&gt;interface 192.168.9.1&lt;/P&gt;&lt;P&gt;security level = 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ2&lt;/P&gt;&lt;P&gt;192.168.10.5 (server1)&lt;/P&gt;&lt;P&gt;192.168.10.10 (server2)&lt;/P&gt;&lt;P&gt;interface 192.168.10.1&lt;/P&gt;&lt;P&gt;security level = 11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it matter that I NAT the new DMZ device to the other two DMZs, rather than the other way around? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (New_DMZ,Dmz1) 192.168.8.2 192.168.8.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (New_DMZ,Dmz2) 192.168.8.2 192.168.8.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 14:44:49 GMT</pubDate>
    <dc:creator>wilson_1234_2</dc:creator>
    <dc:date>2019-03-11T14:44:49Z</dc:date>
    <item>
      <title>static NAT device across DMZs</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-device-across-dmzs/m-p/1223990#M876963</link>
      <description>&lt;P&gt;I have a new DMZ that we created for a CSS to act as a DNS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The CSS will need to access several other DMZs for the services to check different servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All of the existing DMZs are of a higher security level than that of the new DMZ.&lt;/P&gt;&lt;P&gt;My question is regarding the NATing across the DMZs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a rule of thumb regarding security levels when creating the NATs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, it would be more efficient for me to NAT the new DMZ CSS to the other DMZs, because the other DMZs have more than one server the CSS has to poll:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New_DMZ device = &lt;/P&gt;&lt;P&gt;192.168.8.2&lt;/P&gt;&lt;P&gt;interface security level = 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ1&lt;/P&gt;&lt;P&gt;192.168.9.5 (server1)&lt;/P&gt;&lt;P&gt;192.168.9.10 (server2)&lt;/P&gt;&lt;P&gt;interface 192.168.9.1&lt;/P&gt;&lt;P&gt;security level = 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ2&lt;/P&gt;&lt;P&gt;192.168.10.5 (server1)&lt;/P&gt;&lt;P&gt;192.168.10.10 (server2)&lt;/P&gt;&lt;P&gt;interface 192.168.10.1&lt;/P&gt;&lt;P&gt;security level = 11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it matter that I NAT the new DMZ device to the other two DMZs, rather than the other way around? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (New_DMZ,Dmz1) 192.168.8.2 192.168.8.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (New_DMZ,Dmz2) 192.168.8.2 192.168.8.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-device-across-dmzs/m-p/1223990#M876963</guid>
      <dc:creator>wilson_1234_2</dc:creator>
      <dc:date>2019-03-11T14:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: static NAT device across DMZs</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-device-across-dmzs/m-p/1223991#M876968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to communicate between DMZs you don't need any NAT. If you apply a adequate ACL they can communicate with each other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, Celio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 08:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-device-across-dmzs/m-p/1223991#M876968</guid>
      <dc:creator>celiocarreto</dc:creator>
      <dc:date>2009-02-03T08:33:22Z</dc:date>
    </item>
  </channel>
</rss>

