74/81
DMZ
Configuration
Servers
in
a
network
most
vulnerable
to
attack
are
those
which
provide
services
to
users
outside
the
local
network.
Many
times
these
computers
are
placed
into
their
own
sub
‐
network
to
provide
more
protection
to
the
rest
of
the
local
network.
This
sub
‐
network
is
called
a
DMZ
(taken
from
“demilitarized
zone”).
Computers
in
the
DMZ
have
limited
connectivity
to
specific
hosts
in
the
internal
network,
although
communication
with
other
hosts
in
the
DMZ
and
to
the
external
network
is
allowed.
This
allows
hosts
in
the
DMZ
to
provide
services
to
both
the
internal
and
external
network,
while
a
firewall
controls
the
traffic
between
the
DMZ
servers
and
the
internal
network
clients.
The
following
chart
describes
the
network
access
control
of
DMZ
.
Summary of Contents for IP 340P
Page 41: ...41 81...
Page 62: ...62 81...