2023 IT Examiner School
Internal Use Only
Network Diagram: E-Mail Flow
3 2
1
7
4
5-6
Internal Use Only
Receiving an External E-Mail Steps 1 - 4
1. The e-mail is transmitted from the internet to the bank’s network. 2. The front-end firewall filters the e mail and determines whether to block, redirect, or allow it. 3. The IDS identifies suspicious e mail traffic before it reaches the mail relay server. 4. The e-mail application runs on the mail relay server, which sends and receives e-mails to or from external parties.
Made with FlippingBook - Share PDF online