Skip to main content

All Questions

Tagged with
Filter by
Sorted by
Tagged with
1 vote
0 answers
159 views

Is there a real gain in terms of security by not using a reverse proxy?

I need to implement a web application consisting of the components FE (Nginx + React.js) BE (Java SpringBoot) DB (MySQL) For simplicity we will assume that the DB runs in localhost on BE's machine. ...
Dan10's user avatar
  • 11
1 vote
1 answer
3k views

Should the Router or Firewall Come First?

Network scenario.... I have a typical enterprise network meaning ISP > Edge Router > Firewall|DMZ > Switch > LAN I know there are several debates about what device comes first, but ...
errMSG's user avatar
  • 307
2 votes
3 answers
4k views

2 vs 3 tier network architecture

I am interested in how a 3-tier network topology (web/app/data) provides improved security than a 2-tier topology (web-app/data). I understand the concept of a DMZ as the initial contact point with ...
Steve M's user avatar
  • 53
1 vote
1 answer
370 views

Separation of devices for VPN / Firewall [closed]

Our company has two separate firewall devices from different vendors (Checkpoint / Cisco) for firewall and VPN access. We're currently evaluating the possibility of migrating to a newer, clustered ...
Pavlos G.'s user avatar
  • 199
0 votes
0 answers
459 views

Pros and cons of extending L3 to the network edge (routed access layer)?

Scenario: Greenfield network rebuild for a SMB distributed over ~10 small campuses with 1 fairly large central campus spread over ~ 100 Miles. You have almost no Cap-ex budget restriction (within ...
DarkMatter's user avatar
  • 2,736
0 votes
1 answer
1k views

Are there risks in not having a edge firewall? [duplicate]

I am currently working with a client that has all their external traffic going through the core switch and then is being passed to the router and back through the core switch and then to the rest of ...
LUser's user avatar
  • 846
2 votes
1 answer
681 views

Securing an HSM on the network [closed]

I've never had to place an HSM on a network before so I want to ask this question to get a consensus on best practice for this. The HSM will reside on an internal network which will look like this; ...
gkw1975's user avatar
  • 23
2 votes
2 answers
2k views

DMZ layer for web server/presentation layer

I need help explaining to non security people why I want to require the webserver/presentation layer in a dmz. I've given options for a tier two (presentation/logic -> logic/data in zones) ...
Jim Beamer's user avatar
0 votes
2 answers
9k views

What kind of attacks can happen on port 80

I am a novice to network security domain. For one of our clients, we are trying propose a network model where an Apache proxy/web-server which will be the only one that is exposed into the DMZ(...
manu bhat's user avatar
2 votes
2 answers
8k views

Dual Firewall DMZ

We've just learnt about firewalls and DMZ and I'm struggling to understand how are these actually implemented ? The architecture we've learned was something like this: Let's say that we have a ...
Robert777's user avatar
  • 205
4 votes
2 answers
3k views

Dirty and clean interface on DMZ gateways

We have a webservice border gateway in DMZ which handles incoming and outgoing webservice requests in terms of authentication and security. We have two network interfaces in place, on is called '...
pfust75's user avatar
  • 425