Hitachi

uCosminexus Application Server Security Management Guide


3.1 Organization of this chapter

This chapter describes various system configurations for ensuring security. The table below shows how the chapter is organized.

Table 3‒1: Organization of this chapter (System Configurations for Ensuring Security)

Part

Title

Relevant information

Description

System configurations using a firewall

3.2

Deployment of reverse proxies in a DMZ

3.3

Note: This chapter does not include information on implementation, setup, operation, or precautions.