<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DMZ or NAT for web server in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-or-nat-for-web-server/m-p/47955#M35251</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do both, since these are externally accessible servers you can install them in a separate zone from your LAN and do static 1:1 NAT for public access to these servers. Then configure a policy to allow outside access to the webservers on DMZ (if needed restrict the services allowed for more security). Document suggested above is a good reference.&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;When you mention each server has an internal sql database, do they have to access internal production database on your LAN? However, you should be able to configure security policies accordingly for the servers to talk between zones.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Hope that helps!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Aditi&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Sep 2013 14:59:43 GMT</pubDate>
    <dc:creator>apasupulati</dc:creator>
    <dc:date>2013-09-05T14:59:43Z</dc:date>
    <item>
      <title>DMZ or NAT for web server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-or-nat-for-web-server/m-p/47952#M35248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking for some insight on the best security design for several externally accessible web applications. We have several public IP addresses available and can simply do a 1:1 NAT for each web server, put it in a DMZ, or both. Each web server has an internal SQL database to complicate things. From a best security perspective i'm not sure if a 1:1 NAT will work fine or if i should use a DMZ. I would still like to allocate 1 public IP address per web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 05:39:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-or-nat-for-web-server/m-p/47952#M35248</guid>
      <dc:creator>mdfaulkner</dc:creator>
      <dc:date>2013-09-05T05:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ or NAT for web server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-or-nat-for-web-server/m-p/47953#M35249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can have your servers in the DMZ zone and then do a 1:1 dnat for your servers. Something similar to the example given in page 15 of this doc &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1517"&gt;https://live.paloaltonetworks.com/docs/DOC-1517&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 06:34:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-or-nat-for-web-server/m-p/47953#M35249</guid>
      <dc:creator>sraghunandan</dc:creator>
      <dc:date>2013-09-05T06:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ or NAT for web server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-or-nat-for-web-server/m-p/47954#M35250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my mind, the best security thing should be&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Using DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Using reverse Proxy in DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Install your server in an other zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Concerning NAT, 1:1 nat is ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then allow access from outside to your DMZ. then open access from dmz to your web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 09:09:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-or-nat-for-web-server/m-p/47954#M35250</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-09-05T09:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ or NAT for web server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-or-nat-for-web-server/m-p/47955#M35251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do both, since these are externally accessible servers you can install them in a separate zone from your LAN and do static 1:1 NAT for public access to these servers. Then configure a policy to allow outside access to the webservers on DMZ (if needed restrict the services allowed for more security). Document suggested above is a good reference.&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;When you mention each server has an internal sql database, do they have to access internal production database on your LAN? However, you should be able to configure security policies accordingly for the servers to talk between zones.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Hope that helps!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Aditi&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 14:59:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-or-nat-for-web-server/m-p/47955#M35251</guid>
      <dc:creator>apasupulati</dc:creator>
      <dc:date>2013-09-05T14:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ or NAT for web server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dmz-or-nat-for-web-server/m-p/47956#M35252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;basically, they are 3rd party applications with web interfaces. Currently, everything is on the LAN (web server and SQL server) but i'm implementing a new PA-3020 and may utilize a DMZ for the web server and keep the sql box on the LAN, and like you say, just have the DMZ zone and trust zone communicate. Thanks for the reply, i'm going to have a look at that document now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 16:33:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dmz-or-nat-for-web-server/m-p/47956#M35252</guid>
      <dc:creator>mdfaulkner</dc:creator>
      <dc:date>2013-09-05T16:33:54Z</dc:date>
    </item>
  </channel>
</rss>

