O'Reilly logo

J2EE™ Applications and BEA™ WebLogic Server™ by Sandra L. Emerson, Rob Woollen, Michael Girdley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using a DMZ and Firewalls in a Web Deployment

Most secure Web deployments involve the use of a demilitarized zone (DMZ) for greater security. A DMZ is an isolated and protected network that is separate from the corporate network.

A DMZ-based Web architecture is the preferred structure for a Web deployment of WebLogic Server. Figure 13-3 shows the components of this architecture.

Figure 13-3. A DMZ Deployment of WebLogic Server

Client requests arrive from the Internet and are routed through firewall No. 1. This firewall is configured to support only HTTP connections originating from the Internet. WebLogic Server receives requests, processes them, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required