|
![]() |
|
Figure 2. A Logical Design for Perimeter Defenses Use a secure perimeter design to identify the various services and protection systems you want to put in place. This design includes four zones: demilitarized, sensitive, internal, and perimeter management. Note that to add further protection, this design includes an authentication gateway in the DMZ. This provides strong protection for both intranet and extranet services. |