Solved

About DMZ zones

Posted on 2004-09-06
4
288 Views
Last Modified: 2010-04-09

Dear all,

I have one PIX 515 firewalls, I want to know about the use of DMZ ports ??
0
Comment
Question by:javeed_ccna
  • 2
4 Comments
 
LVL 23

Expert Comment

by:Tim Holman
ID: 11988792
What do you need to know ?
Think of this as another internal port - you can assign it a different IP address / network range, and setup policies, NAT etc, just as you would your inside port.
0
 
LVL 6

Assisted Solution

by:bloemkool1980
bloemkool1980 earned 100 total points
ID: 11989071
I partly agree with Tim. But a DMZ is a zone that if accessible by the outside it should not be able to initiate a connection towards your LAN.
Meaning that if you put your webserver in a DMZ this server can be accessed through the outside but the webserver should not be allowed to make a connection to the LAN. However the inside should be able to access the webserver eventually but this can only be allowed if the connection is initiated by the inside.
The reverse is also possible, if a DMZ access the LAN it should not be possible to access this DMZ directly from a untrusted zone such as teh Outisde
0
 

Author Comment

by:javeed_ccna
ID: 12042090
Can u give me any good link about his topic in depth ?
0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 150 total points
ID: 12043464
An example may help - here's a Cisco PIX one with a mail server running on the DMZ -

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008015efa9.shtml
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question