This graphic has on the left the label "Untrusted" bounded by a dotted line. To its right is a box labeled "Firewall." To the right is a column of two-sectioned boxes labeled "HTTP Server" and "Proxy Plug-in." This column of boxes is labeled "Web Layer" and is surrounded by a dotted line labeled "DMZ." To the right of this column is a column of pentagons labeled "Servlet/Object Cluster." Each pentagon contains the labels "JSP," "Servlet," "EJB," and "JDBC." To the right of this column is a box labeled "Firewall" and a database.
Clients points through the Firewall with three arrows to each of the HTTP Servers. The Proxy Plug-ins point to each of the pentagons in the Servlet/Object Cluster to the Firewall, and the Firewall points to the database. Under the database is a dotted-line oval, labeled "Trusted Claims," that also points to the database.