NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
three-leg perimeter
|
|
basic
|
|
back to back
|
|
perimeter
|
Detailed explanation-1: -The more secure approach to creating a DMZ network is a dual-firewall configuration, in which two firewalls are deployed with the DMZ network positioned between them. The first firewall–also called the perimeter firewall–is configured to allow only external traffic destined for the DMZ.
Detailed explanation-2: -It’s a kind of topology when you put your internal network behind a firewall, then you create another network for services purposes called dmz and finally you´ve added another firewall to the external network. Advantages Isolates customer-facing and partner-facing content to a separate perimeter network.
Detailed explanation-3: -Dual Firewall This implementation uses two firewalls to create a DMZ. The first firewall (also called the “front-end” firewall) must be configured to allow traffic destined for the DMZ only. The second firewall (also called “back-end” firewall) allows only traffic from the DMZ to the internal network.
Detailed explanation-4: -Launch a web browser from a computer or mobile device that is connected to your router’s network. Enter the router user name and password. The user name is admin. Select ADVANCED > Setup > WAN Setup. Select the Default DMZ Server check box. Type the IP address. Click the Apply button. 16-Jul-2022
Detailed explanation-5: -Web servers. It’s possible for web servers communicating with internal database servers to be deployed in a DMZ. FTP servers. Email servers. DNS servers. Proxy servers. VoIP servers. 16-Jun-2022