From the course: Protecting Your Network with Open Source Software

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Understanding one-legged DMZ

Understanding one-legged DMZ

From the course: Protecting Your Network with Open Source Software

Start my 1-month free trial

Understanding one-legged DMZ

- [Instructor] When opening a file port and enabling port forwarding, a risk is that some internal hosts, such as web servers, are now accessible on the internet. There's always a chance of an attacker compromising the web server. A compromised web server in the same network could infecting other hosts, and make them vulnerable too. DMZ is a solution to preventing this unfortunate scenario. DMZ is a solution to preventing this unfortunate scenario. DMZ stands for demilitarized zone. DMZ stands for demilitarized zone. It's a buffer area between an internal network and an external network. Therefore, DMZ further separates the internal network into a publicly, accessible area, and a protected area off limits to public access. DMZ allows us to avoid a situation DMZ allows us to avoid a situation where an internal network is directly exposed to the external network. This way, a compromised host in the DMZ does This way, a…

Contents