From the course: Protecting Your Network with Open Source Software

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Understanding true DMZ

Understanding true DMZ

From the course: Protecting Your Network with Open Source Software

Start my 1-month free trial

Understanding true DMZ

- [Instructor] A true DMZ is the most secure firewall architecture. To set up true DMZ what you need is two network firewall host and switches. The first network file host serves as an external firewall interfacing with the external network and the DMZ. The second network firewall host acts as an internal firewall interfacing with the DMZ and the internal network. When we have one network firewall in a much simpler topology, it only separates the external network from the internal network. In the true DMZ topology, we introduce a second network file host. Therefore, in between the two network file host we're creating a new sub-net, which is our DMZ. Think of this as adding a second network file host through the internal interface of the first network file host. In the true DMZ topology, we protect an internal network better because it's behind the second firewall. There are two layers of firewalls in this…

Contents