Demilitarized zone (computing)
|
Demilitarized_Zone_Diagram.png
In terms of computer security, a demilitarized zone (DMZ) is a network area (a subnetwork) that sits between an organisation's internal network and an external network, usually the Internet. The DMZ allows contained hosts to provide services to the external network, while protecting the internal network from possible intrusions into those hosts. In layman's terms a DMZ is like a one way street.
The DMZ is typically used for connecting servers that need to be accessible from the outside world, such as mail, web and DNS servers.
Connectivity is allowed both from and to the external network. Connections from the external network are usually controlled using port address translation (PAT). A DMZ is often created through a configuration option on the firewall.
Connectivity is allowed from the internal network, but no access is allowed to the internal network.
Note that home routers sometimes refer to a "DMZ host". This is not a true DMZ by definition.
See also: bastion host.de:Demilitarized Zone et:Demilitariseeritud tsoon (informaatika) es:Zona desmilitarizada fr:Zone démilitarisée nl:DMZ (informatica) pl:DMZ