<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: dmz data flow in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/455003#M101526</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Meaning the vlan IP for routing etc is on the firewall and the switch is just layer 2 for that particular vlan.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Wed, 22 Dec 2021 16:43:16 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2021-12-22T16:43:16Z</dc:date>
    <item>
      <title>dmz data flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454133#M101431</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advise&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a design flaw . I am trying to test dual dmz . dmz server the gateway is on the dmz firewall .&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the server in dmz wants to send data to dc server it has to go back through the same switch&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to avoid this ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And also, please&amp;nbsp; point out pros and cons for the below&amp;nbsp; design&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dual dmz.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38216i9D057CD677CBF821/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="dual dmz.PNG" alt="dual dmz.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Dec 2021 18:48:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454133#M101431</guid>
      <dc:creator>simsim</dc:creator>
      <dc:date>2021-12-18T18:48:09Z</dc:date>
    </item>
    <item>
      <title>Re: dmz data flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454191#M101438</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59972"&gt;@simsim&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Your diagram isn't incredibly well labelled, at least to my eyes. I don't see where you have a dual DMZ configured, nor do I honestly fully understand your question.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59972"&gt;@simsim&lt;/a&gt;&amp;nbsp;wrote:
&lt;P&gt;If the server in dmz wants to send data to dc server it has to go back through the same switch&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How to avoid this ?&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Why do you think this is a problem that needs to be avoided. Ideally your DMZ wouldn't be allowed to access resources in your DC, but in the event this is needed I would have the traffic separated through different physical switches, or have the DMZ isolated to it's own VRF on any shared switches.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Dec 2021 06:50:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454191#M101438</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-12-19T06:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: dmz data flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454207#M101440</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have updated the diagram&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dual dmz.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38220iBEF93E94E509186C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="dual dmz.PNG" alt="dual dmz.PNG" /&gt;&lt;/span&gt;.Hopes it make sense now&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I don't see where you have a dual DMZ configured, nor do I honestly fully understand your question.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I meand dual firewall dmz ,I want to ask the above design is ok ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;Ideally your DMZ wouldn't be allowed to access resources in your DC,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;what if a web server wants to talk to a DB server inside&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;but in the event this is needed I would have the traffic separated through different physical switches, or have the DMZ isolated to it's own VRF on any shared switches.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please provide a rough diagram&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for your support&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It would be great if you can reply&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 17:05:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454207#M101440</guid>
      <dc:creator>simsim</dc:creator>
      <dc:date>2021-12-20T17:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: dmz data flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454512#M101474</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;A DMZ is just a vlan that is anchored at the firewall. Using two different vendors, no longer makes sense to me in the modern world, especially with PaloAlto. I would simplify the diagram and get rid of the Fortinet firewall. Also make sure all traffic to/from the DMZ serer goes through the palo alto and gets inspected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1640036985742.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38247iB5245D8606BEC090/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1640036985742.png" alt="OtakarKlier_0-1640036985742.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 21:50:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454512#M101474</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-12-20T21:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: dmz data flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454596#M101484</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp; and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I&amp;nbsp; make a DMZ zone in the dc firewall?&lt;/P&gt;&lt;P&gt;In the above diagram which one is good .My purpose is i will keep all web server in dmz and the server has t ocommunicate internal vlan and ldap .Please suggest&amp;nbsp;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dmz 3 types.png" style="width: 594px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38283iB4A9E2716B5587D2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="dmz 3 types.png" alt="dmz 3 types.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 01:59:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454596#M101484</guid>
      <dc:creator>simsim</dc:creator>
      <dc:date>2021-12-21T01:59:02Z</dc:date>
    </item>
    <item>
      <title>Re: dmz data flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454788#M101503</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I've always been a fan of keeping things simple. There are a few things to keep in mind when architecting networks, some of these are where are the systems that require a NAT from outside to inside (if at all) and what function do all the devices perform. You have a device called 'core' yet in the second diagram, you have a way to bypass it? Depending on its overall function,&amp;nbsp; I would either go with the first or third diagram. I would also let the PAN's handel the routing and anchor the vlans so that the traffic can be inspected and monitored.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that makes sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 21:37:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454788#M101503</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-12-21T21:37:33Z</dc:date>
    </item>
    <item>
      <title>Re: dmz data flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454857#M101511</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;you have a device called 'core' yet in the second diagram, you have a way to bypass it? Depending on its overall function"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;That is my core device for routing and edge switches are connected. Inter VLAN routing is happening on core&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What does it mean by anchor the vlan ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Dec 2021 02:54:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/454857#M101511</guid>
      <dc:creator>simsim</dc:creator>
      <dc:date>2021-12-22T02:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: dmz data flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/455003#M101526</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Meaning the vlan IP for routing etc is on the firewall and the switch is just layer 2 for that particular vlan.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 22 Dec 2021 16:43:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-data-flow/m-p/455003#M101526</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-12-22T16:43:16Z</dc:date>
    </item>
  </channel>
</rss>

