From the course: Protecting Your Network with Open-Source Software
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Understanding one-legged DMZ
From the course: Protecting Your Network with Open-Source Software
Understanding one-legged DMZ
- [Instructor] When opening a file port and enabling port forwarding a risk is that some internal hosts, such as web servers are now accessible on the entire internet. There's always a chance of an attacker compromising the web server. A compromised web server in the same network could infect other hosts and make them vulnerable too. DMZ is a solution to preventing this unfortunate scenario. DMZ stands for demilitarized zone. It's a buffer area between an internal network and an external network. Therefore, DMZ further separates the internal network into a publicly accessible area and a protected area off limits to public access. DMZ allows us to avoid the situation where an internal network is directly exposed to the external network. This way, a compromised host in the DMZ does not affect other hosts in another subnet and make them less vulnerable. DMZ also allows more fine-grained network traffic monitoring by further dividing an internal network and placing more security controls.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Setting up hosts as network firewalls3m 16s
-
(Locked)
Setting up a web server4m 2s
-
(Locked)
Port forwarding7m 26s
-
(Locked)
Testing port forwarding47s
-
(Locked)
Understanding one-legged DMZ2m 45s
-
(Locked)
Understanding true DMZ1m 39s
-
(Locked)
Understanding an application proxy firewall3m 55s
-
(Locked)
Setting up Squid6m 10s
-
(Locked)
Challenge: Fine-tuning the Squid configuration55s
-
(Locked)
Solution: Fine-tuning the Squid configuration2m 47s
-
(Locked)
-
-
-
-