Search
-
Re: perimeter network
-
Re: perimeter network
-
Re: perimeter network
The type of setup you have described is often called a screened subnet with dual firewalls. By having internet | subnet 1 (DMZ) | subnet 2 (internal) you are providing alot of protection. Not only must an attacker compromise a single firewall but must pass an additional firewall to get to the less secure internal network.… -
Re: perimeter network
Subnet 1 would be the best choice for the DMZ in this case and your internal network would be on Subnet 2. This is because you have a | and a | on both sides of Subnet 1. 1 would be your public facing firewall and the other would be your private facing firewall. Internet - | Subnet 1 (DMZ) | Subnet 2 (Private)
4 results