Firewalls are collections of hardware, software, and policies that are designed to limit access to resources in a networked environment.
Firewalls:
Net.Data can be used with firewall products that execute in your environment.
The following possible configurations provide recommendations for managing the security of your Net.Data application. These configurations provide high-level information and assume that you have configured a firewall that isolates your secure intranet from the public Internet. Carefully consider these configurations with your organization's security policies:
This configuration creates a subnetwork that isolates Net.Data and the Web server from both the secure intranet and the public Internet. The firewall software is used to create a firewall between the Web server and the public Internet, and another firewall between the Web server and the secured intranet, which contains DB2 Server. This configuration is shown by Figure 15.
Figure 15. High Security Configuration
![]() |
To set up this configuration:
In this configuration, firewall software isolates the secured intranet with DB2 server from the public Internet. Net.Data and the Web server are outside the firewall on a workstation platform. This configuration is simpler than the first, but still offers database protection. Figure 16 shows this configuration.
Figure 16. Intermediate Security Configuration:
![]() |
You must install CAE on the Web server to allow Net.Data to communicate with DB2 server.The firewall must be configured to allow DB2 client requests to flow from Net.Data to DB2 and to allow acknowledge packets to flow from DB2 to Net.Data.
In this configuration, DB2 server and Net.Data are installed outside of the firewall and the secured intranet. They are not protected from external attacks. The firewall needs no packet filtering rules for this configuration. Figure 17 shows this configuration.
Figure 17. Low Security Configuration:
![]() |