Computer Basics - Demilitarized Zo
A Demilitarized Zone (DMZ) in networking is an isolated network segment that hosts public-facing services (such as web servers, email servers, or DNS servers), while keeping the internal corporate network protected.
Purpose of a DMZ:
-
Acts as a buffer zone between the internet (untrusted) and the internal network (trusted).
-
Ensures that if a public-facing service is compromised, attackers cannot directly access the internal network.
-
Provides an additional layer of defense in depth.
How It Works:
-
Public services (web servers, mail servers, FTP servers) are placed in the DMZ.
-
Firewalls (or similar controls) are used to strictly control:
-
Inbound traffic → from the internet to the DMZ only.
-
Outbound traffic → from the DMZ to the internet if required.
-
Limited traffic → between the DMZ and the internal LAN.
-
Example:
-
Without DMZ: A web server is placed directly inside the internal LAN → if hacked, the whole network is at risk.
-
With DMZ: The web server is isolated in the DMZ → even if compromised, attackers cannot easily reach sensitive internal resources.
Benefits:
-
Reduces the attack surface.
-
Segregates public services from private systems.
-
Adds layered security for critical assets.
Typical Setup:
-
Firewall 1: Between internet and DMZ → allows only necessary inbound connections (e.g., HTTPS).
-
Firewall 2: Between DMZ and internal LAN → allows only specific, controlled communication (e.g., database queries to an internal server).
Would you like me to also create a simple diagram of a DMZ architecture to make this clearer?