Hitachi

uCosminexus Application Server Security Management Guide


3. System Configurations for Ensuring Security

This chapter describes various system configurations that can be used to ensure security in J2EE application execution infrastructures. Using examples of system configurations, this chapter provides information about deploying firewalls to suit different types of components and deploying reverse proxies in a DMZ.

Organization of this chapter