Hi folks, Regarding the "proper" setup of a DMZ; as a "general rule", computers within DMZ's are no more "trusted" by the internal LAN(s) than are any other computers on the internet. Some of the configuration settings on the firewall are just a little more "relaxed" to allow boxes in your DMZ to be accessed by computers outside your network. Is that an accurate interpretation?
I want to set up a DMZ using the latest Bering, and the above is what I want to achieve. If I follow Tom's documentation on setting up a DMZ...that will be the net result, won't it? Comments...suggestions??? Thank you, Craig ------------------------------------------------------- SF email is sponsored by - The IT Product Guide Read honest & candid reviews on hundreds of IT Products from real users. Discover which products truly live up to the hype. Start reading now. http://productguide.itmanagersjournal.com/ ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html
