Q

How to configure and implement a DMZ

Learn how to design and configure a DMZ in this network security Ask the Expert Q&A.

What are the constraints of setting up a DMZ and what are the basic appliances needed?

DMZs (demilitarized zones) are the network equivalent of neutral ground. They provide an isolated network segment for public-facing services, such as Web and mail servers. The private side of your network is protected from these servers, as their public accessibility makes them more vulnerable to compromise.

The standard approach for creating a DMZ involves the use of a firewall with three network interfaces. For more information and an illustration, read Choosing the Right Firewall Topology.

More on this topic

Visit our resource center for news, tips and expert advice on how to configure a DMZ to prevent unwanted external access to your network.

This was first published in July 2006

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close