Talk:Demilitarized zone (computing)
From Wikipedia, the free encyclopedia
Contents |
[edit] Illustrations
The picture does not show a proper DMZ. It should look like (in ascii art):
[internet]----[Firewall/router]-----------[Firewall]-----[Internal network] | [DMZ]
What is shown here is a three-legged firewall concept.
Spearhead 16:17, 11 July 2005 (UTC)
I am confused as to the way a DMZ is laid out. The pictures are showing two different methods, which I understand are differences in topography. But, how is the ascii art dipiction laid out with the actual machines, is there a router between the firewalls? There should maybe be an illustration in the article or more detailed discriptions. 12:08 CDT, 02 June 2006
[edit] The boundary between
The term DMZ has been used to describe the boundary between autonomous networks, likely predating the adoption of the term by firewall vendors.
Cjcoleman 20060121
[edit] Whether DMZ can be one of the NIC of the firewall
Is it possible to configure one of the network card IP of the firewall(With 3 Network Card) as DMZ. One NIC to Internal network One NIC to external network
[edit] Response to above
I believe that many people do this: configure the one Firewall to be the connection between DMZ and LAN and External. However, if the Firewall is breached from the outside then there is the potential to get to the LAN as easily as they get to the DMZ. It is a more secure solution to use 2 Firewalls.
82.211.102.231 10:09, 1 December 2006 (UTC)Helen