The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader ...

New to eBooks.com?

Learn more

Building DMZs for Enterprise Networks

Building DMZs for Enterprise Networks
Not available
Building DMZs for Enterprise Networks covers a sorely needed area in critical business infrastructure... the demilitarized zone. DMZs play a crucial role in any network consisting of a Hosted Internet Web Server, internal servers which need to be segregated, External to Internal DNS Server, and an E-mail SMTP Relay Agent. The primary role of a DMZ is to mitigate risks associated with offering services to untrusted clients. A DMZ accomplishes this by providing network-level protection for a hosting environment, as well as segregating public hosting facilities from the private network infrastructure.

This small but very important segment of the network is the section exposed to the public Internet and is the most difficult area on the network to create, and maintain both from an Engineering standpoint and a security standpoint. In this book (the only one of its kind) readers will learn how to make DMZ’s utilizing the IT world’s best of breed software and hardware products from Microsoft, Sun, Cisco, Nokia, and Check Point. This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter.

Syngress Publishing; Read online