Managed interfaces employing boundary protection devices include: proxies, gateways, routers, firewalls, guards, or encrypted tunnels arranged in an effective security architecture (e.g., routers protecting firewalls and application gateways residing on a protected sub-network commonly referred to as a demilitarized zone or DMZ).
This is a boundary control requirement to route traffic through managed firewalls and proxies deployed according to an architectural design. This is a network configuration issue not an application requirement. |