Enterprise firewall protection: Where it stands, where it's headed
A comprehensive collection of articles, videos and more, hand-picked by our editors
A screened subnet (also known as a "triple-homed firewall") is a network architecture that uses a single firewall with three network interfaces.
- Interface 1 is the public interface and connects to the Internet.
- Interface 2 connects to a DMZ (demilitarized zone) to which hosted public services are attached.
- Interface 3 connects to an intranet for access to and from internal networks.
Even if the firewall itself is compromised, access to the intranet should not be available, as long as the firewall has been properly configured.
The purpose of the screened subnet architecture is to isolate the DMZ and its publicly-accessible resources from the intranet, thereby focusing external attention and any possible attack on that subnet. The architecture also separates the intranet and DMZ networks, making it more difficult to attack the intranet itself. When a properly configured firewall is combined with the use of private IP addresses on one or both of these subnets, attack becomes that much more difficult.
Continue Reading About screened subnet (triple-homed firewall)
- For more information on screened subnets see Mike Chapples Choosing the right firewall topology: Bastion host, screened subnet or dual firewalls at SearchSecurity.com.
'screened subnet (triple-homed firewall)' is part of the:
View All Definitions