I have a Cisco Pix 506e with 2 virtual interfaces added to the physical inside interface as per below:
interface ethernet0 10full
interface ethernet1 auto
interface ethernet1 vlan2 logical
interface ethernet1 vlan3 logical
nameif ethernet0 outside security0
nameif inside security100
nameif vlan2 LAN security100
nameif vlan3 DMZ security50
ip address outside x.x.x.x 255.255.255.252
ip address inside 192.168.100.254 255.255.255.055.128 outside
ip address DMZ 10.0.0.254 255.255.255.055.255.255.255 outside
ip address LAN 192.168.1.254 255.255.255.00.0 255.255.255.255 inside
The inside interface is connected to a trunking port on my "vlan switch" and 2 other ports on the switch are connected to my LAN and DMZ and are in the vlan2 and vlan3 as appropriate.
That 192.168.100.254 address is basically unused (I wasn't sure if I could just put in 0.0.0.0 or even assign no IP), it's the DMZ and LAN interfaces that are used.
I have traffic coming in from the outside OK and both the DMZ and LAN can get to the internet OK, what I don't know how to do is to get traffic flowing between the DMZ and the LAN.
How do I do that? I'd like to open it right up for now so traffic can freely flow in both directions (from 192.168.1.0/24 to 10.0.0.0/24) and then once I'm all sorted I want to lock down access from the DMZ so it can only get to the servers and ports it needs to.