Chapter 2. Defining Security Zones

This chapter covers the following key topics:

  • An Introduction to Security Zones— This section discusses what security zones are and covers some of the basic concepts concerning how to go about defining security zones in a network.

  • Designing a Demilitarized Zone— This section defines DMZs and discusses ways to create them.

  • Case Study: Creating Zones Using the PIX Firewall— This case study describes a zoned network based on the PIX Firewall.

Security zone definitions play a very important role in setting up a secure network. They not only allow security efforts to be more focused and streamlined but also allow better user access for legitimate users of resources. This chapter looks at what security zones are ...

Get Network Security Principles and Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.