What is DMZ?
Ans: In a network, the hosts most vulnerable to attack are those that provide services to users outside of the LAN, such as e-mail, web and DNS servers. Because of the increased potential of these hosts being compromised, they are placed into their own subnetwork in order to protect the rest of the network if an intruder was to succeed. Hosts in the DMZ have limited connectivity to specific hosts in the internal network, though communication with other hosts in the DMZ and to the external network is allowed. This allows hosts in the DMZ to provide services to both the internal and external network, while an intervening firewall controls the traffic between the DMZ servers and the internal network clients.
what all can be deployed within DMZ?
Ans: Generally, any service that is being provided to users in an external network could be placed in the DMZ. The most common of these services are web servers, mail servers, ftp servers, VoIP servers and DNS servers. In some situations, additional steps need to be taken to be able to provide secure services.
ur site/blog info means a lot for me.....thanks a lot.
ReplyDeletei am still at learning stage....
what all i need is the basic overflow of weblogic i.e from
user(url) --to--database.....can i have a diagram or overflow from where this url passes to database...please.....