From the course: Protecting Your Network with Open-Source Software
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
Understanding true DMZ
From the course: Protecting Your Network with Open-Source Software
Understanding true DMZ
- [Instructor] A true DMZ is the most secure firewall architecture. To set up a true DMZ, what you need is two network firewall hosts and a switch. The first network firewall host serves as an external firewall interfacing with the external network and the DMZ. The second network firewall host acts as an internal firewall interfacing with the DMZ and the internal network. When we have one network firewall in a much simpler topology, it only separates the external network from the internal network. In the true DMZ topology, we introduce a second network firewall host. Therefore, in between the two network firewall host, we're creating a new subnet, which is our DMZ. Think of this as adding the external network interface of the second network firewall host through the internal interface of the first network firewall host. And the true DMZ topology, we protect an internal network better because it's behind the second firewall. There are two layers of firewalls in this architecture. Your…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Setting up hosts as network firewalls3m 16s
-
(Locked)
Setting up a web server4m 2s
-
(Locked)
Port forwarding7m 26s
-
(Locked)
Testing port forwarding47s
-
(Locked)
Understanding one-legged DMZ2m 45s
-
(Locked)
Understanding true DMZ1m 39s
-
(Locked)
Understanding an application proxy firewall3m 55s
-
(Locked)
Setting up Squid6m 10s
-
(Locked)
Challenge: Fine-tuning the Squid configuration55s
-
(Locked)
Solution: Fine-tuning the Squid configuration2m 47s
-
(Locked)
-
-
-
-