Firewalls and demilitarized zone (DMZ) configurations

Firewalls are often used in multi-tiered configuations to protect back-end resources, such as databases. Using firewalls can also protect application servers and Web servers from unauthorized outside access.

A demilitarized zone (DMZ) configuration involves multiple firewalls that add layers of security between the Internet and a company's critical data and business logic. A wide variety of topologies are appropriate for a DMZ environment.

A typical DMZ configuration includes the following components:

This figure illustrates a typical DMZ configuration:

Demilitarized zone (DMZ) topology

The area between the two firewalls (where the Web server resides) gives the DMZ configuration its name.

HTTP server separation topologies differ in the advantages they provide in a DMZ configuration.

WebSphere Application Server port usage provides a list of the ports that WebSphere Application Server uses. Use this information to help you configure your firewalls.