• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » What is Demilitarized Zone (DMZ) in Networking

By Abhishek Ghosh December 8, 2023 8:56 am Updated on December 8, 2023

What is Demilitarized Zone (DMZ) in Networking

Advertisement

A demilitarized zone (DMZ) is a computer network with security-controlled access to the servers connected to it.
The systems installed in the DMZ are shielded from other networks (e.g. Internet, LAN) by one or more firewalls. This separation allows access to publicly accessible services (bastion hosts with e.g. e-mail, WWW) and at the same time protects the internal network (LAN) from unauthorized access from outside. The purpose is to provide the most secure possible services of the computer network to both the WAN (Internet) and the LAN (intranet). A DMZ develops its protective effect by isolating a system from two or more networks.

Many of the research workers recommend a two-stage firewall concept for the Internet in its IT baseline protection catalogues. In this case, a firewall separates the Internet from the DMZ, and another firewall separates the DMZ from the internal network. As a result, a single vulnerability does not immediately compromise the internal network. Ideally, the two firewalls are from different manufacturers, otherwise one known vulnerability would be enough to overcome both firewalls.

The filtering functions can certainly be taken over by a single device; in this case, the filtering system needs at least three network connections: one for each of the two network segments to be connected (e.g. WAN and LAN) and a third for the DMZ. Even though the firewall protects the internal network from attacks by a compromised server from the DMZ, the other servers in the DMZ are directly vulnerable until further protection measures are taken. This could be, for example, segmentation in VLANs or software firewalls on the individual servers that drop all packets from the DMZ network.

Advertisement

---

What is Demilitarized Zone DMZ in Networking

A connection should always be established from the internal network to the DMZ, never from the DMZ to the internal network. A common exception to this is access from the DMZ to database servers on the internal network. As a last resort, the firewall administrator usually watches over this principle before the rule is activated. As a result, the risk potential of a compromised server in the DMZ is largely reduced to attacks:

  • to the inner firewall directly
  • to other servers in the same DMZ
  • about security vulnerabilities in administration tools such as Telnet or SSH and
  • on connections that have been established regularly in the DMZ.

Some home routers mistakenly refer to the configuration of an exposed host as a “DMZ”. You can specify the IP address of a computer in the internal network to which all packets from the Internet are forwarded that cannot be assigned to another recipient via the NATs table. This means that the host can be reached (even for potential attackers) from the Internet. Port forwarding of the ports actually used is preferable to this – if possible.

It depends on the specific configuration of the firewall whether port forwarding to other computers is taken into account first and only then the exposed host, or whether the exposed host renders port forwarding to other computers ineffective.

The dirty DMZ or dirty net is usually the network segment between the perimeter router and the firewall of the (internal) LAN. From the outside, this zone has only the limited security of the perimeter router. This version of the DMZ is less of an obstacle to data transfer, as the incoming data only needs to be filtered simply (perimeter router).

A protected DMZ is a DMZ that is connected to the firewall’s own LAN interface. This DMZ has the individual security of the firewall. Many firewalls have multiple LAN interfaces to set up multiple DMZs.

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to What is Demilitarized Zone (DMZ) in Networking

  • How Can a Firewall can Protect Your Company?

    A firewall is your first line of defence against online threats, and it’s an important feature of any cybersecurity strategy. As a business owner, you need to be aware of the damage that cyberattacks can have against your business and ensure the right measures are in place to stop them. Firewalls are a useful tool […]

  • Guide To Buy 4G/LTE Router or Hotspot & Extend Network

    It is Normal to Get Fooled By the Devices Sold By Internet Service Provider (ISP). Here is a Foolproof 4G/LTE Router or Hotspot Buying Guide.

  • Wi-Fi for Old House With Thick Walls

    Residents of old houses with 2 to 3ft thick limestone exterior walls and some load-bearing interior walls often face problem while deploying Wi-Fi to their houses. Most of these walls were insulated and it is super difficult for any radio-wave to penetrate. While these buildings are good for health while deploying solutions related to the […]

  • Router Setup to Watch IP Camera Online Remotely via Browser

    You Only Need 3/4G Connection & Power Supply For Surveillance on Remote Area. Here is Router Setup to Watch IP Camera Online Remotely via Browser.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy