Differences between version 2 and previous revision of DeMilitarizedZone.
Other diffs: Previous Major Revision, Previous Author, or view the Annotated Edit History
Newer page: | version 2 | Last edited on Tuesday, June 22, 2004 9:27:18 am | by StuartYeates | Revert |
Older page: | version 1 | Last edited on Tuesday, June 22, 2004 3:39:29 am | by StuartYeates | Revert |
@@ -1,6 +1,6 @@
A network segment between an external and an interal FireWall, where exposed hosts can be placed that are accessible from the external InterNet as well as from the internal network. These hosts are treated by the inner FireWall as anyone else from the InterNet: they're blocked from access to the inner network. This way, potential corruption of endangered public services such as a WebServer does not threaten the integrity of the internal network.
-Semi-trusted
networks are often also connected to the DMZ, these are typically [WirelessNetwork]s and
[PublicAccessNetwork]s.
+Untrusted local
networks are often also connected to the DMZ, these are typically [WirelessNetwork]s,
[PublicAccessNetwork]s, student labs or networks set aside for cleaning [Virus]es off machines
.
----
CategoryNetworking, CategorySecurity