?
Solved

About DMZ zones

Posted on 2004-09-06
4
Medium Priority
?
292 Views
Last Modified: 2010-04-09

Dear all,

I have one PIX 515 firewalls, I want to know about the use of DMZ ports ??
0
Comment
Question by:javeed_ccna
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 23

Expert Comment

by:Tim Holman
ID: 11988792
What do you need to know ?
Think of this as another internal port - you can assign it a different IP address / network range, and setup policies, NAT etc, just as you would your inside port.
0
 
LVL 6

Assisted Solution

by:bloemkool1980
bloemkool1980 earned 300 total points
ID: 11989071
I partly agree with Tim. But a DMZ is a zone that if accessible by the outside it should not be able to initiate a connection towards your LAN.
Meaning that if you put your webserver in a DMZ this server can be accessed through the outside but the webserver should not be allowed to make a connection to the LAN. However the inside should be able to access the webserver eventually but this can only be allowed if the connection is initiated by the inside.
The reverse is also possible, if a DMZ access the LAN it should not be possible to access this DMZ directly from a untrusted zone such as teh Outisde
0
 

Author Comment

by:javeed_ccna
ID: 12042090
Can u give me any good link about his topic in depth ?
0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 450 total points
ID: 12043464
An example may help - here's a Cisco PIX one with a mail server running on the DMZ -

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008015efa9.shtml
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question