From the course: Protecting Your Network with Open-Source Software

Unlock the full course today

Join today to access over 24,400 courses taught by industry experts.

Understanding true DMZ

Understanding true DMZ

- [Instructor] A true DMZ is the most secure firewall architecture. To set up a true DMZ, what you need is two network firewall hosts and a switch. The first network firewall host serves as an external firewall interfacing with the external network and the DMZ. The second network firewall host acts as an internal firewall interfacing with the DMZ and the internal network. When we have one network firewall in a much simpler topology, it only separates the external network from the internal network. In the true DMZ topology, we introduce a second network firewall host. Therefore, in between the two network firewall host, we're creating a new subnet, which is our DMZ. Think of this as adding the external network interface of the second network firewall host through the internal interface of the first network firewall host. And the true DMZ topology, we protect an internal network better because it's behind the second firewall. There are two layers of firewalls in this architecture. Your…

Contents