<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You're adding quite a bit of in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689178#M917756</link>
    <description>&lt;P&gt;You're adding quite a bit of server complexity for very small incremental benefit in security.&lt;/P&gt;&lt;P&gt;More secure - assuredly. Better reliability - probably not.&lt;/P&gt;&lt;P&gt;"Don't let the perfect be the enemy of the good."&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jul 2015 02:40:46 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2015-07-21T02:40:46Z</dc:date>
    <item>
      <title>How to publish applications located on LAN to users comming from Internet</title>
      <link>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689169#M917727</link>
      <description>&lt;P&gt;Dear Support.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a security concern.&lt;/P&gt;&lt;P&gt;I have an application based on my local network, this application locally accessed by http. it's a critical application for the entreprise.&lt;/P&gt;&lt;P&gt;For the business raisons, we need to allow access to users from internet to access the application, read data, push and load files and make others action on the application.&lt;/P&gt;&lt;P&gt;My question is how can i give access to the main application to users comming from internet to an application based on the LAN?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a solution to secure the scenario?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:32:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689169#M917727</guid>
      <dc:creator>Rowlands Price</dc:creator>
      <dc:date>2020-02-21T13:32:09Z</dc:date>
    </item>
    <item>
      <title>Is this a homework assignment</title>
      <link>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689170#M917730</link>
      <description>&lt;P&gt;Is this a homework assignment?&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2015 02:18:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689170#M917730</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-19T02:18:50Z</dc:date>
    </item>
    <item>
      <title>Dear Marvin; No, its' not a</title>
      <link>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689171#M917734</link>
      <description>&lt;P&gt;Dear Marvin;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No, its' not a homework assignment, it's a real enterpise case.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2015 06:41:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689171#M917734</guid>
      <dc:creator>Rowlands Price</dc:creator>
      <dc:date>2015-07-19T06:41:31Z</dc:date>
    </item>
    <item>
      <title>How does the enterprise</title>
      <link>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689172#M917737</link>
      <description>&lt;P&gt;How does the enterprise connect to the Internet? That is, what device and version of software is in place? Is the enterprise using private IP addresses internally?&lt;/P&gt;&lt;P&gt;Generally speaking we use an access-list of some type on the perimeter security device. That allows incoming traffic to the destination host on specified protocols and ports (i.e. tcp/80 for http). If there's private addressing internally, we also put in place a static network address translation (NAT) or port address translation (PAT) policy to&amp;nbsp;allow the remote clients to use a publicly reachable address.&lt;/P&gt;&lt;P&gt;If the users are all your enterprise users of trusted business partners, we can use virtual private network (VPN) solutions to protect the traffic end to end. Since our application uses insecure http, that solution would be preferred.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2015 13:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689172#M917737</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-19T13:31:14Z</dc:date>
    </item>
    <item>
      <title>Dear MarvinThe enterprise is</title>
      <link>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689173#M917741</link>
      <description>&lt;P&gt;Dear Marvin&lt;/P&gt;&lt;P&gt;The enterprise is connected to internet by a cisco ASA 5520, there are two interface. gi0/0 sec 0 connected to Internet and Gi0/1 sec 100 connected to lan.&lt;/P&gt;&lt;P&gt;Yes entrerprise is using private IP addresses internally.&lt;/P&gt;&lt;P&gt;For now we are using static nat with ACL coming from internet to a public ip natted with server private one.&lt;/P&gt;&lt;P&gt;My question is for security reasons it's normal to allow traffic comming from internet directly to critical application located on lan?&lt;/P&gt;&lt;P&gt;Or we must use a dmz and push all trafic from internet first to dmz, if yes how to do?&lt;/P&gt;&lt;P&gt;How bank online is working? when you consult your bank account with login and password, our traffic is connected directly to the main server of the bank?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2015 02:18:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689173#M917741</guid>
      <dc:creator>Rowlands Price</dc:creator>
      <dc:date>2015-07-20T02:18:37Z</dc:date>
    </item>
    <item>
      <title>Well there is seldom a "must"</title>
      <link>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689174#M917743</link>
      <description>&lt;P&gt;Well there is seldom a&amp;nbsp;"must" or "must not" in such things.&lt;/P&gt;&lt;P&gt;Commonly accepted best practice is to use a DMZ. The server is relocated to a dedicated subnet where only publicly accessible servers are located. You allow outside clients to initiate traffic only to the proper ports and protocols on the web server and then further allow the web server to initiate communications to internal resources per its known and required service profile.&lt;/P&gt;&lt;P&gt;There are all sorts of additional hardening measures one can take. I would reiterate the securing of the application traffic via requiring https instead of the completely insecure http. That's one method. Others include things like using a layer 7 Web Application firewall in front of your server. Such functionality is available from most load balancers / application delivery controllers (such as&amp;nbsp;Citrix Netscaler, F5 BigIP, etc.).&lt;/P&gt;&lt;P&gt;That may not be practical for a small shop without any such existing infrastructure and only a single app running on a single server but you asked how larger enterprises such as banks do it. They use multiple layers of security at multiple points in the access, processing and storage subsystems to implement defense in depth.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2015 21:04:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689174#M917743</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-20T21:04:40Z</dc:date>
    </item>
    <item>
      <title>Thanks MarvinAttached is my</title>
      <link>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689175#M917745</link>
      <description>&lt;P&gt;Thanks Marvin&lt;/P&gt;&lt;P&gt;Attached is my schema. for now there is no DMZ, only firewall with 2 interfaces. one interface in lan and the other in internet.&lt;/P&gt;&lt;P&gt;Actually the traffic from internet is directly natted to the application server in the lan with http and not http (my concern).&lt;/P&gt;&lt;P&gt;So, i will create a third interface called dmz and place a proxy server on the dmz (like in the scheme)&lt;/P&gt;&lt;P&gt;1-/ Traffic from internet will be directed to proxy server in dmz&lt;/P&gt;&lt;P&gt;2-/ proxy server in dmz will initiate communication with the application server based on the lan&lt;/P&gt;&lt;P&gt;Is this more secure for my enterprise?&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2015 21:39:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689175#M917745</guid>
      <dc:creator>Rowlands Price</dc:creator>
      <dc:date>2015-07-20T21:39:01Z</dc:date>
    </item>
    <item>
      <title>Yes it is somewhat more</title>
      <link>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689176#M917749</link>
      <description>&lt;P&gt;Yes it is somewhat more secure if you can setup the proxy server as you show in your diagram.&lt;/P&gt;&lt;P&gt;It can be tricky to get it do all the things you need with a web server that's doing more than serving up simple static web pages. I mention this since you had asked about loading data and files earlier. That bit on the configuration is all inside the proxy server though and how it interacts with your web server. That's outside my area of expertise.&lt;/P&gt;&lt;P&gt;More commonly we would see the web server itself be located in that DMZ zone. Both internal and external users would access it there, with the only difference being external users would use the public IP and be subjected to the incoming access-list. Internal users would use the address in the DMZ and not normally be subject to access-list restrictions since they are coming from a higher security level.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2015 21:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689176#M917749</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-20T21:44:49Z</dc:date>
    </item>
    <item>
      <title>OK, thanksso to avoid</title>
      <link>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689177#M917751</link>
      <description>&lt;P&gt;OK, thanks&lt;/P&gt;&lt;P&gt;so to avoid reverser proxy server in dmz to initiate traffic to the main application, i think it's will be more secure to use another private dmz.&lt;/P&gt;&lt;P&gt;will install another server in the private dmz and the main application will copy all data to the server in private dmz, so reverse proxy server will only initiate traffic with the copy in the private dmz.&lt;/P&gt;&lt;P&gt;The mail application server in lan will update data every time to it's copy in private dmz&lt;/P&gt;&lt;P&gt;attached is the diagram&lt;/P&gt;&lt;P&gt;What do you think about this scenario&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2015 22:16:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689177#M917751</guid>
      <dc:creator>Rowlands Price</dc:creator>
      <dc:date>2015-07-20T22:16:27Z</dc:date>
    </item>
    <item>
      <title>You're adding quite a bit of</title>
      <link>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689178#M917756</link>
      <description>&lt;P&gt;You're adding quite a bit of server complexity for very small incremental benefit in security.&lt;/P&gt;&lt;P&gt;More secure - assuredly. Better reliability - probably not.&lt;/P&gt;&lt;P&gt;"Don't let the perfect be the enemy of the good."&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2015 02:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-publish-applications-located-on-lan-to-users-comming-from/m-p/2689178#M917756</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-21T02:40:46Z</dc:date>
    </item>
  </channel>
</rss>

