2023 IT Examiner School

Internal Use Only

Network Diagram: E-Mail Flow

3 2

1

7

4

5-6

Internal Use Only

Receiving an External E-Mail Steps 1 - 4

1. The e-mail is transmitted from the internet to the bank’s network. 2. The front-end firewall filters the e mail and determines whether to block, redirect, or allow it. 3. The IDS identifies suspicious e mail traffic before it reaches the mail relay server. 4. The e-mail application runs on the mail relay server, which sends and receives e-mails to or from external parties.

Made with FlippingBook - Share PDF online