Solved

About DMZ zones

Posted on 2004-09-06
4
287 Views
Last Modified: 2010-04-09

Dear all,

I have one PIX 515 firewalls, I want to know about the use of DMZ ports ??
0
Comment
Question by:javeed_ccna
  • 2
4 Comments
 
LVL 23

Expert Comment

by:Tim Holman
ID: 11988792
What do you need to know ?
Think of this as another internal port - you can assign it a different IP address / network range, and setup policies, NAT etc, just as you would your inside port.
0
 
LVL 6

Assisted Solution

by:bloemkool1980
bloemkool1980 earned 100 total points
ID: 11989071
I partly agree with Tim. But a DMZ is a zone that if accessible by the outside it should not be able to initiate a connection towards your LAN.
Meaning that if you put your webserver in a DMZ this server can be accessed through the outside but the webserver should not be allowed to make a connection to the LAN. However the inside should be able to access the webserver eventually but this can only be allowed if the connection is initiated by the inside.
The reverse is also possible, if a DMZ access the LAN it should not be possible to access this DMZ directly from a untrusted zone such as teh Outisde
0
 

Author Comment

by:javeed_ccna
ID: 12042090
Can u give me any good link about his topic in depth ?
0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 150 total points
ID: 12043464
An example may help - here's a Cisco PIX one with a mail server running on the DMZ -

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008015efa9.shtml
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question