Description
This pattern defines the boundary architecture between NIHnet and the public Internet. This boundary is where the majority of external access to internal systems crosses. In addition, all internal access to external systems crosses this boundary. This boundary is where the majority of external threats will need to be detected and prevented. Unique to Boundary Pattern 1 is the use of content filtering on inbound traffic to support enforcement of NIH Internet "acceptable use" policies.
Diagram
Benefits
None documented.
Limitations
None documented.
Time Table
This architecture definition approved on:
July 18, 2003
The next review is scheduled in:
TBD