Red Hat Training

A Red Hat training course is available for JBoss Enterprise Application Platform Common Criteria Certification

5.3. Network Configuration

5.3.1. Network Interfaces

The following network interfaces are defined and created so that trusted and untrusted network traffic is separated.

Network Interfaces

public
For communication to and from external, potentially untrusted parties.
cluster
For communication between cluster nodes. Cannot be accessed by untrusted parties. This must be enforced as part of network/firewall configuration.
internal
For communication between trusted servers or users (such as administrators) via the internal network. Cannot be accessible to untrusted parties or general users of the system.