Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
New Member

what is dirty DMZ

hi,

could not get it why do we use dirty DMZ when we got proper dmz?

any idea on this will be appreciated.

Thanks

Vin

1 REPLY
New Member

Re: what is dirty DMZ

While creating organization's network topology, an important step is to set the various zones so they can reflect the importance of your information technology infrastructure. The most secure computers should be placed behind firewalls and intrusion detection systems, web servers and similar public services, on the other hand, get to be placed within Demilitarized Zones, or popularly just called DMZs. Mr. Malik uses DMZs as an opening for the, overview based part, covering topics related to process of building security into the network. As from the demilitarized zones perspective, you'll learn how to design one using several deployment ways as examples. These examples include using the three-legged firewall, placing the DMZ between the firewall and public network such as the Internet, creating a "dirty DMZ" and creating DMZ between stacked firewalls. The DMZ chapter is closed with a short case study describing usage of PIX Firewall for "zoning" the network.

Please refer following link further details

http://www.net-security.org/review.php?id=42

1392
Views
0
Helpful
1
Replies
CreatePlease to create content