This graphic has on the left the label "Untrusted Client" bounded by a dotted line. To its right is a box labeled "Firewall". To its right is a column of two-sectioned boxes labeled "HTTP Server" and "Proxy plug-in". This column of boxes is labeled "Web Layer" and is surrounded by a dotted line labeled "DMZ". To the right of this column is a column of boxes labeled "Servlet/Object Cluster". Each box contains the labels "JSP", "Servlet", "EJB", and "JDBC". To the right of this column is a "Firewall" and a Database.

Client points to each of the HTTP Servers through the Firewall with three arrows. The Proxy plug-ins point to each of the boxes in the Servlet/Object Cluster and then to the Firewall. The Firewall on the right points to the Database. Under the database is "Trusted Clients" that also points to the Database.