22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

136 Lotus Security Handbook<br />

Firewall (filtering)<br />

Internet<br />

Firewall (filtering)<br />

Router<br />

Router<br />

Internal network<br />

Border router<br />

DMZ network<br />

Figure 4-5 DMZ referring to a screened subnet<br />

In the second model, the DMZ is not completely isolated from the private<br />

network. It logically lies between the Internet and the internal, trusted private<br />

network. To secure this architecture, we must use more sophisticated firewall<br />

defenses to protect the private network. So within the DMZ we employ proxy<br />

servers and application gateways to separate the private network from the<br />

Internet. We make the inside invisible from the outside, while nonetheless<br />

allowing local users access to the outside world and external access to selected<br />

services on both the DMZ and the private network. Ingress and egress through<br />

the DMZ is carefully protected through firewall defenses. This is a simple “three<br />

zone” security model, which has been refined to various degrees over the past<br />

few years with respect to what functions need to be provided in the DMZ and at<br />

its boundaries. The firewall defenses can be distributed and replicated within the<br />

DMZ and at the boundaries to reduce potential single points of failure.<br />

In this simple DMZ model, we have servers that are publicly available in the<br />

DMZ, and servers that are on the internal, private network. The application<br />

server separation is basically split into two corresponding categories: public and<br />

private.<br />

The three-zone model was considered adequate when the number of services or<br />

applications made externally available was fairly limited. These services were<br />

typically Web applications (HTTP), and possibly file transfer (FTP), often using a

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!