NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
back-to-back configuration
|
|
three-leg perimeter configuration
|
|
basic configuration
|
|
perimeter configuration
|
Detailed explanation-1: -The three legged DMZ model makes use of a single firewall with a minimum of three network interfaces to create the architecture that contains a DMZ. In this configuration, the external network gets created or formed from the Internet Service Provider (ISP) to the network’s firewall on the first network interface.
Detailed explanation-2: -The more secure approach to creating a DMZ network is a dual-firewall configuration, in which two firewalls are deployed with the DMZ network positioned between them. The first firewall–also called the perimeter firewall–is configured to allow only external traffic destined for the DMZ.
Detailed explanation-3: -Explanation: Setting up a DMZ with two firewalls has its own advantages. The biggest advantage that you can do load balancing. A topology with two firewalls also helps in protecting internal services on the LAN from denial of the service attacks on the firewall’s perimeter.
Detailed explanation-4: -A, B Perimeter networks can be created with one or two firewalls. One firewall is cheaper, though a perimeter network created with a single firewall can be more complex to create.