Setting up a DMZ (DeMilitarized Zone)

A DMZ is is an area outside the firewall, in a portion of the network that remains in the public network. A DMZ has been compared the front yard of a house. The front yard is visible to the public and anyone can access the yard, but the yard still belongs to whomever owns the house. The owner will lock anything of value inside the house but will usually prepare the yard to receive visitors.

To set up a DMZ, install a computer that does not contain critical data between the firewall and the internet connection. This computer will become a “gateway” computer. Most software-based firewalls will allow you to designate a directory on the gateway computer so that the network will know it’s the DMZ.

 

How Many Firewalls?

A firewall should be installed at every connection to the Internet. For instance, if you have more than one T1 line coming into the building, you’ll need a firewall on each line.

 

The Rules

You con establish rules on each fire wall so that it will allow or deny traffic. Some examples of rules a firewall will accept include:

 

The Methods

Firewalls use one or more of these three methods to control traffic flowing in and out of the network:

 

Filters

Traffic can be filtered through a firewall a number of ways. Those ways include:

 

Click here for a firewall FAQ.
Firewall Guide
How-to Guide for Firewall and Proxy Server
How to set up a Cisco router with standard IOS as a basic Firewall.
The Truth About Ping

 

3.9 Identify the purpose, benefits, and characteristics of using a proxy.

One way to strengthen the security offered by your firewall is to combine it with a proxy server, which is a server that sits between a client application and a "real" server. For instance, a web proxy server will intercept all requests for web access and will search its access control list for the webpage requested. If it has it in cache, it will send the page back to the client. If it does not, and if the page is not on its list of restricted sites, then it will fetch the page from the Internet for the client.

 

Proxy servers have two main purposes:

 

Benefits of proxy servers include:

 

Types of Proxy Server:

IP Proxy Hides IP addresses of all nodes on a network, sending instead its own IP address. This is better known as Network Address Translation (NAT).
Web (HTTP) Proxy Handles Internet access requests on behalf of any node on the network. The most popular of all web proxy servers is the Proxy Cache Server.
FTP Proxy Handles uploading and downloading of files from a server on behalf of a workstation in an operation similar to a web proxy.
SMTP Proxy Handles Internet e-mail. Many SMTP proxy servers have added network virus protection and will scan each e-mail for viruses.

 

How-to Guide for Firewall and Proxy Server
History of Proxy Servers
Microsoft’s Proxy Server Page
Overview of Web Proxy Servers