Solved

About DMZ zones

Posted on 2004-09-06
4
290 Views
Last Modified: 2010-04-09

Dear all,

I have one PIX 515 firewalls, I want to know about the use of DMZ ports ??
0
Comment
Question by:javeed_ccna
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 23

Expert Comment

by:Tim Holman
ID: 11988792
What do you need to know ?
Think of this as another internal port - you can assign it a different IP address / network range, and setup policies, NAT etc, just as you would your inside port.
0
 
LVL 6

Assisted Solution

by:bloemkool1980
bloemkool1980 earned 100 total points
ID: 11989071
I partly agree with Tim. But a DMZ is a zone that if accessible by the outside it should not be able to initiate a connection towards your LAN.
Meaning that if you put your webserver in a DMZ this server can be accessed through the outside but the webserver should not be allowed to make a connection to the LAN. However the inside should be able to access the webserver eventually but this can only be allowed if the connection is initiated by the inside.
The reverse is also possible, if a DMZ access the LAN it should not be possible to access this DMZ directly from a untrusted zone such as teh Outisde
0
 

Author Comment

by:javeed_ccna
ID: 12042090
Can u give me any good link about his topic in depth ?
0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 150 total points
ID: 12043464
An example may help - here's a Cisco PIX one with a mail server running on the DMZ -

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008015efa9.shtml
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Come and listen to Percona CEO Peter Zaitsev discuss what’s new in Percona open source software, including Percona Server for MySQL (https://www.percona.com/software/mysql-database/percona-server) and MongoDB (https://www.percona.com/software/mongo-…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question