The outermost subnet is usually a DMZ. A middle subnet can serve as a transaction subnet where systems needed to support complex web applications in the DMZ reside.
- Chapter 11 Secure Network Architecture and Securing Network Components
- from (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
- Publisher: Sybex
- Released: May 2018
DMZ , Transaction subnet , Private network