188.8.131.52 DMZ (Demilitarized Zone)
(Page 1 of 3)
The DMZ, or Demilitarized Zone, on a network is that portion of a companys network which sits between the Internet and an internal networks line of defense, usually some combination of firewalls and bastion hosts327. Firewalls were described earlier in this section. Bastion hosts are gateways between inside and outside networks, designed to defend the internal network from attacks aimed at it from outside.
Much like in the non-computerized world, a network DMZ, sometimes called a perimeter network, is a neutral zone that attempts to keep external users and the internal network apart. It is strongly advised that there be an external firewall (or at least a well-configured filtering router) between the DMZ and the Internet as well, for protection of the DMZ, although that is not required for that portion of the network to be considered a DMZ.
Usually a DMZ is a separate subnet from your internal network, to minimize opportunities for compromises due to traffic sniffing. While, logically speaking, a DMZ is an intermediate area between your internal network and the Internet, a network configuration supporting a DMZ is sometimes implemented by using a single router with three port connections (Internet, DMZ and internal network) and good filtering rules between them.
327. DMZ, http://www.webopedia.com
Home - Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.