Skip to content

Demilitarized Zone

August 3, 2009

In computer networking, DMZ is a firewall configuration for securing local area networks (LANs). In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the Internet.

In computer networks, a DMZ (demilitarized zone) is a small network inserted as a “neutral zone” between a company’s private network and the outside public network. It prevents outside users from getting direct access to a server that has company data

In the computer network world, a DeMilitarized Zone (DMZ) is a part of a network separated from other systems by a Firewall which allows only certain types of network traffic to enter or leave. For example, a company will protect its internal networks from the Internet with a Firewall, but will have a separate network, or DMZ, to which the public can gain limited access. Public web servers might be placed in such a DMZ.

In a network with DMZ, all Internet traffic is routed through an Internet or external firewall. This firewall allows only Web traffic and Internet mail through to the Demilitarized Zone (DMZ). All Web and application servers reside in the DMZ for security purposes.

The Internal firewall allows e-mail traffic and database connections from the DMZ servers to pass through. This way, the system administrators can be assured that only e-mail traffic and database calls from the secured DMZ server can access corporate information. The servers can authenticate these users based on their certificates and encrypt the network traffic from the browser to the application server.

Generally, any service that is being provided to users in an external network should be placed in the DMZ. The most common of these services are web servers, mail servers, ftp servers and DNS servers. In some situations, additional steps need to be taken to be able to provide secure services.

No comments yet

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: