I have a Cisco ASA 5505, with a license that only allows restricted DMZ access. Currently it is setup with two interfaces in each server that needs to be in the DMZ, one on our internal network, and one in our DMZ. This is so that we can access our database locally, and pull information to our hosted web sites, which are accesible from the outside. I'm under the impression that this configuration is wrong, and defeats the purpose of a DMZ. However during the time to get these sites up an running, I couldn't find another way. Can anybody lend some suggestions on the best way to allow communication between servers in the DMZ, and also keep it as secure as possible?