Hi folks,
Regarding the "proper" setup of a DMZ; as a "general rule", computers within
DMZ's are no more "trusted" by the internal LAN(s) than are any other
computers on the internet. Some of the configuration settings on the
firewall are just a little more "relaxed" to allow boxes in your DMZ to be
accessed by computers outside your network. Is that an accurate
interpretation?

I want to set up a DMZ using the latest Bering, and the above is what I want
to achieve. If I follow Tom's documentation on setting up a DMZ...that will
be the net result, won't it?

Comments...suggestions???

Thank you,
Craig



-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://productguide.itmanagersjournal.com/
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to