Microsoft Windows Security Essentials by Darril Gibson

Microsoft Windows Security Essentials by Darril Gibson

Author:Darril Gibson
Language: eng
Format: epub
Publisher: Sybex
Published: 2011-05-18T16:00:00+00:00


A perimeter network is also called a demilitarized zone (DMZ).

Perimeter networks are typically created using two hardware-based firewalls, as shown in Figure 7-4. However, it’s also possible to create a perimeter network with a single firewall, as shown in Figure 7-5.

Figure 7-5: Single firewall creating a perimeter network

In Figure 7-5, the single firewall has three network interface cards (NICs). One NIC is connected to the Internet, one NIC is connected to the perimeter network, and the third NIC is connected to the internal network. This type of configuration is often referred to as a three-pronged or a three-legged firewall configuration.

Vendors often provide configuration best practice documents to assist you in the initial configuration of a complex firewall.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.