
ucts (both hardware- and software-based) on multiple platforms to achieve the level
of protection necessary, and DMZs are often designed to provide failover capabilities
as well.
When we are working with a DMZ, we must have a common ground to work
from.To facilitate understanding, we examine a number of conceptual paths for traffic
flow in the following section. Before we look at the conceptual paths, let’s make sure
that we understand the basic configurations that can be used for firewall and DMZ
location and how each of them can be visualized. In the following figures, we’ll see
and discuss these configurations. Please note that each of these configurations ...