Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

Node types > Node types - Pg. 79

Network Infrastructure node The Network Infrastructure node provides the network connectivity between the enterprise and the partners. Most commonly in today's business-to-business (B2B) world, this is provided by the Internet. However, many enterprises still communicate using leased lines, value-added networks (VANs), Integrated Services Digital Network (ISDN) and other network infrastructures. Protocol Firewall node A firewall is a hardware or software system that manages the flow of information between the Internet and an organization's private network. Firewalls can prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. They can also block some virus attacks, as long as the viruses come from the Internet. A firewall can separate two or more parts of a local network to control data exchange between departments. Components of firewalls include filters or screens, each of which controls transmission of certain classes of traffic. Firewalls provide the first line of defense for protecting private information. Comprehensive security systems combine firewalls with encryption and other complementary services, such as content filtering and intrusion detection. The Protocol Firewall node is an enterprise's first line of defense against attack from the outside world and typically screens the enterprise's routers. It allows traffic through into the DMZ, where it must still pass the Domain Firewall before it can gain access to applications. Domain Firewall node The Domain Firewall node protects the Enterprise Secure Zone and is the second line of defense against attack. It protects the application gateways from traffic that has reached as far as the DMZ. It is typically implemented as a dedicated server node for additional security. Rules directory The rules directory contains the rules that are generally used to control the mode of operation of an interaction, depending on external factors. Examples of such rules are: Business data mapping rules (for adapter connectors) Process execution rules and intermediate results Autonomic rules (such as priority in a shared environment) Security rules Capacity and availability rules Chapter 5. Runtime patterns 79