No SSL from the DMZ server to the trusted zone servers.
从DMZ服务器到受信任区域的服务器之间没有使用SSL。
The DMZ should consist of processes like Web servers or proxy servers that will terminate the user's connection before it reaches the backend "trusted" zone.
DMZ应该包括一些进程,例如,在用户连接到达后端“受信任”区之前,Web服务器或代理服务器将终止用户的连接。
This case study involves a single Lotus Domino Web server located in the network demilitarized zone (DMZ) and running SUSE Linux and Lotus Domino 7.
这个案例研究包括一台位于网络非军事区(DMZ)的单一的LotusDominoWeb服务器,并运行SUSELinux和Lotus Domino7。
If the Web server was used as a security measure in the DMZ, then the proxy cannot replace it — but it can sit in the secure zone to help with the routing and load balancing.
如果将Web服务器作为DMZ中的安全措施,则代理无法替代它——但可以在安全区内帮助进行路由和负载平衡。
Specifically, the focus is software and node configuration scenarios within the demilitarized zone (DMZ), or external network, and the implementation procedures for using these designs.
具体地说,主要关注非军事区(demilitarized zone,DMZ)或外部网络中的软件和节点配置场景,以及使用这些设计的实现过程。
For security reasons, you might not want to place proxy servers out in the demilitarized zone (DMZ).
出于安全考虑,您可能不希望将代理服务器放到非保护区(demilitarizedzone,DMZ)以外。
Infrastructure architects focus on access and procedures, such as whether the service should be placed inside or outside demilitarized zone (DMZ).
基础设施架构师的工作重点是访问和过程,如服务应放置在隔离区(DeMilitarizedZone,DMZ)内还是放置在其外。
A typical use case includes a De-Militarized Zone (DMZ) to separate external as well as internal clients from the back-end systems.
一个典型的用例是使用De -Militarized Zone (DMZ)将外部和内部客户端与后台系统分离开来。
A typical use case includes a De-Militarized Zone (DMZ) to separate external as well as internal clients from the back-end systems.
一个典型的用例是使用De -Militarized Zone (DMZ)将外部和内部客户端与后台系统分离开来。
应用推荐