Bulbank Mobile Banking Network Architecture

OCINetworkadvanced
Bulbank Mobile Banking Network Architecture — OCI network diagram

About This Architecture

Bulbank's mobile banking network uses a multi-tier DMZ architecture with CheckPoint perimeter firewall, reverse proxy, and internal Cisco firewall protecting Apache Tomcat backend servers and FlexCube core banking system. Traffic flows from iOS/Android clients through the external CheckPoint firewall (82.84.80.121) to the BBMProxy reverse proxy (192.168.100.100) over HTTPS 443, then through the internal Cisco firewall to application and data domains. The backend tier runs Apache Tomcat on Windows Server 2019 with JRE 11 (192.168.123.101), connecting to FlexCube Unix core banking (192.168.123.105) and MSSQL database (192.168.124.99 port 1433) for transaction processing. This architecture enforces defense-in-depth with dual firewalls, encrypted channels, and strict network segmentation between public, DMZ, and intranet zones. Fork this diagram on Diagrams.so to customize firewall rules, add load balancers, or model failover scenarios for your banking platform.

People also ask

How should I architect a secure mobile banking network with multiple firewall tiers and core banking system integration?

This diagram shows a defense-in-depth approach using CheckPoint perimeter firewall, BBMProxy reverse proxy, and Cisco internal firewall to protect Apache Tomcat backend servers and FlexCube core banking system. Traffic is encrypted end-to-end (HTTPS 443), network zones are strictly segmented, and database access is isolated on port 1433.

OCIbankingnetwork-architecturefirewallDMZsecurity
Domain:
Networking
Audience:
Bank network architects designing secure mobile banking infrastructure

Generated by Diagrams.so — AI architecture diagram generator with native Draw.io output. Fork this diagram, remix it, or download as .drawio, PNG, or SVG.

Generate your own network diagram →

About This Architecture

Bulbank's mobile banking network uses a multi-tier DMZ architecture with CheckPoint perimeter firewall, reverse proxy, and internal Cisco firewall protecting Apache Tomcat backend servers and FlexCube core banking system. Traffic flows from iOS/Android clients through the external CheckPoint firewall (82.84.80.121) to the BBMProxy reverse proxy (192.168.100.100) over HTTPS 443, then through the internal Cisco firewall to application and data domains. The backend tier runs Apache Tomcat on Windows Server 2019 with JRE 11 (192.168.123.101), connecting to FlexCube Unix core banking (192.168.123.105) and MSSQL database (192.168.124.99 port 1433) for transaction processing. This architecture enforces defense-in-depth with dual firewalls, encrypted channels, and strict network segmentation between public, DMZ, and intranet zones. Fork this diagram on Diagrams.so to customize firewall rules, add load balancers, or model failover scenarios for your banking platform.

People also ask

How should I architect a secure mobile banking network with multiple firewall tiers and core banking system integration?

This diagram shows a defense-in-depth approach using CheckPoint perimeter firewall, BBMProxy reverse proxy, and Cisco internal firewall to protect Apache Tomcat backend servers and FlexCube core banking system. Traffic is encrypted end-to-end (HTTPS 443), network zones are strictly segmented, and database access is isolated on port 1433.

Bulbank Mobile Banking Network Architecture

OCIadvancedbankingnetwork-architecturefirewallDMZsecurity
Domain: NetworkingAudience: Bank network architects designing secure mobile banking infrastructure
0 views0 favoritesPublic

Created by

April 20, 2026

Updated

April 20, 2026 at 7:43 PM

Type

network

Need a custom architecture diagram?

Describe your architecture in plain English and get a production-ready Draw.io diagram in seconds. Works for AWS, Azure, GCP, Kubernetes, and more.

Generate with AI