22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

152 Lotus Security Handbook<br />

– X - Network filters (the protocol is permitted across the boundary for all<br />

network addresses of hosts residing in the zone)<br />

Figure 4-10 is an example of how to interpret the table entries using the “FTP”<br />

application row in Table 4-1.<br />

FTP: “X”<br />

Allow connection from any host<br />

FTP: “H”<br />

Allow connection to specific hosts only<br />

Internet Zone<br />

Zone boundary firewall<br />

router<br />

Proxy Zone<br />

Figure 4-10 Graphical depiction of Internet to Proxy zone FTP policy table entry<br />

Note: The following tables are for illustration purposes only, and may not be<br />

all-inclusive. You should determine your own policies based on your specific<br />

business and security requirements.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!