<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Setting up DMZ in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/setting-up-dmz/m-p/25336#M18461</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First time poster in the new forum.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We're looking into creating a pure DMZ on our Palo Alto. Right now all our servers and network are behind a Layer 3 interface with private IPs. Anything that needs to be externally accessible is done via a One to One NAT through that interface. We have a vendor coming out to do some Lync setup and they "highly recommend" that the server(s) be placed in a DMZ and not inside our network. I tried explaining that we're pretty good at punching holes through and making things work but that wasn't an option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been looking at some of the Layer 2 documentation and I think I'm on the right track but if anyone has done this already and has some tips or things to watch out for it would be a big help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 May 2014 17:32:00 GMT</pubDate>
    <dc:creator>tgrzeczk</dc:creator>
    <dc:date>2014-05-05T17:32:00Z</dc:date>
    <item>
      <title>Setting up DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/setting-up-dmz/m-p/25336#M18461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First time poster in the new forum.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We're looking into creating a pure DMZ on our Palo Alto. Right now all our servers and network are behind a Layer 3 interface with private IPs. Anything that needs to be externally accessible is done via a One to One NAT through that interface. We have a vendor coming out to do some Lync setup and they "highly recommend" that the server(s) be placed in a DMZ and not inside our network. I tried explaining that we're pretty good at punching holes through and making things work but that wasn't an option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been looking at some of the Layer 2 documentation and I think I'm on the right track but if anyone has done this already and has some tips or things to watch out for it would be a big help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 May 2014 17:32:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/setting-up-dmz/m-p/25336#M18461</guid>
      <dc:creator>tgrzeczk</dc:creator>
      <dc:date>2014-05-05T17:32:00Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/setting-up-dmz/m-p/25337#M18462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ is a very good idea for servers. Configuration what You need isn't so complicated and I hope that this community will help You to create them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please read &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1517"&gt;Understanding PAN-OS NAT&lt;/A&gt;&lt;/P&gt;&lt;P&gt;especially U-turn NAT is for You ( for traffic from Your LAN to DMZ) - this is a stranges part for peoples from ie. Juniper world.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 May 2014 19:15:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/setting-up-dmz/m-p/25337#M18462</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-05-05T19:15:11Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/setting-up-dmz/m-p/25338#M18463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;another example &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1678"&gt;How to Configure U-Turn NAT&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 May 2014 19:48:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/setting-up-dmz/m-p/25338#M18463</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-05-05T19:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/setting-up-dmz/m-p/25339#M18464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What exactly do they mean by a DMZ?&amp;nbsp; Most customers put the public servers on their own subnet/interface/zone using private IPs and use NAT to map them to public IPs. Are they suggesting a second public subnet? This can be done as well but is less common.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If they fear NAT issues, you can always give the Lync server a public IP and then put a VWire between the server and the switch that hosts the public IP addresses. Then you can configure Zone and DoS protection as well as restrict the applications that can talk to the server as well as apply threat and AV profiles. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 May 2014 00:25:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/setting-up-dmz/m-p/25339#M18464</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2014-05-06T00:25:28Z</dc:date>
    </item>
  </channel>
</rss>

