In Computer Networking, what is DMZ?

Article Details
  • Originally Written By: Derek Schauland
  • Revised By: G. Wiesen
  • Edited By: Lucy Oppenheimer
  • Last Modified Date: 03 September 2019
  • Copyright Protected:
    Conjecture Corporation
  • Print this Article
Free Widgets for your Site/Blog
In a recent survey, 12% of men said they believed they could win a point against tennis legend Serena Williams.  more...

September 18 ,  1977 :  The first photograph was taken of the Moon and the Earth together.  more...

A Demilitarized Zone (DMZ) is a network segment that is separated from other networks. Many organizations use them to separate their Local Area Networks (LAN) from the Internet. This puts additional security between their corporate network and the public Internet. It can also be used to separate one particular machine from the rest of a network, moving it outside of the protection of a firewall.

Frequent Uses

Common items that are placed in a DMZ are public-facing servers. For example, if an organization maintains its website on a server, that web server could be placed in a computer "Demilitarized Zone." In this way, if a malicious attack ever compromises the machine, the remainder of the company's network remains safe from danger. Someone can also place a computer on a DMZ outside of a network to test for connectivity issues being created by a firewall protecting the rest of the system.


Router Setup and Functionality

When connecting a LAN to the Internet, a router provides a physical connection to the public Internet, and firewall software offers a gateway to prevent malicious data from entering the network. One port on the firewall often connects to the network using an internal address, allowing traffic being sent out by individuals to reach the Internet. Another port is usually configured with a public address, which allows Internet traffic to reach the system. These two ports allow inbound and outbound data to communicate between the network and the Internet.

Purpose of a Demilitarized Zone

In creating a DMZ, an organization adds another network segment or subnet that is still part of the system, but not connected directly to the network. Adding a DMZ makes use of a third interface port on the firewall. This configuration allows the firewall to exchange data with both the general network and the isolated machine using Network Address Translation (NAT). The firewall does not usually protect the isolated system, allowing it to connect more directly to the Internet.

NAT Functionality

Network Address Translation allows data received on a certain port or interface to be routed to a specified network. For example, when someone visits an organization's web site, the browser is sent to the server hosting the site. If this organization keeps its web server in a DMZ, the firewall knows that all traffic sent to the address associated with their web site should be passed to the server sitting in the DMZ, rather than directly into the organization's internal network.

Drawbacks and Other Methods

Since the DMZ computer lies outside of the firewall's protection, it may be vulnerable to attacks from malicious programs or hackers. Companies and individuals should not store sensitive data on this type of system, and know that such a machine can potentially become corrupted and "attack" the rest of the network. Many networking professionals recommend "port-forwarding" for people experiencing networking or connection issues. This provides specific, targeted access to certain network ports, without opening up a system entirely.


You might also Like


Discuss this Article

Post 33

The answer is quite descriptive, thanks for your input.

Post 30

Thanks for the information about DMZ

Post 27

thanks very much. really a very good explanation.

Post 25

good one. anyone can grasp the concept well with this explanation.

Post 24

It is crystal clear. --satish

Post 23

Good one. it helps.

Post 21

nice one.

Post 20

good and clear explanation,thanks. Paramsh

Post 18

Most crisp DMZ explanation over the net. Superb. Thanks a lot.

Post 17

thank for the simple explanation.

Post 15

great work. thanks. shiva

Post 14

Excellent article.

Post 13

Very good explanation.

Post 12

great info. thanks.

Post 11

Good one.

Post 10

thanks and got the complete understanding of the DMZ.

Post 9

good article. thanks.

Post 7

Superb way of explanation, really useful.

Post 4

This is a clear and simple explanation.



Post 3

Very well written...

Post 2

wow, simple and clear explanation, thanks.

Post 1

I didn't know DMZ applies in the computing world! I always thought it was confined to the political/military world!

Post your comments

Post Anonymously


forgot password?