DMZ zone firewall templates
Issue 4 May 2005 309
DMZ zone firewall templates
The Demilitarized Zone (DMZ) network interface is typically used to al lo w Inter net use rs access
to some corporate services without compromising the private network where sensitive
information is stored. For all the services setup in the DMZ, access is allowed from any network,
including Public, Private, Management and Semi-private. Because the DMZ is not a trusted
network, all outgoing traffic is blocked.
The same security rules are enforced for high security, medium security, and low security. The
DMZ high security rules are enforced for both incoming and outgoing packets as follows.
Incoming traffic from the DMZ zone is denied.
Outgoing traffic to the DMZ zone allowed includes
Packets from the following networks: private, management, semi-private, and the
destination is the servers with the common services.
InBoundSemiPri
vateAccessICM
P
Permit Any Semi-Private
-IP ICMPDESTUNREACHAB
LE
ICMPTIMEEXCEEDED
In Semi-Pri
vate No
OutBoundSemi
PrivateAccessI
CMP
Permit Semi-Privat
e-IP Any ICMPDESTUNREACHAB
LE Out Semi-Pri
vate No
InBoundSemiPri
vateBlockAll Block Any Any Any In Semi-Pri
vate No
OutBoundSemi
PrivateBlockAll Block Any Any Any Out Semi-Pri
vate No
Table 40: Semi-private VPN-only security firewall rules (continued)
2 of 2
Table 41: DMZ high and medium security firewall rules
Rule Name Action Source Destination Service Direction Zone Keep
State Description
InBoundDMZ
ActiveFTPAc
cess
Permit DMZNet Any ActiveFTP In DMZ Yes Permit active FTP
data connection
from FTP server
on DMZNet to any
FTP client on
INATERNET(this
works for both
NAT/Non NAT
setup)
InBoundDMZ
BlockAll Deny Any Any Any In DMZ No Deny the rest of
traffic
1 of 2