De-Militarized Zone — Network’s Living Room

Swagat Jena
2 min readMar 11, 2022
DMZ derives its name from the DMZ between North and South Korea.

When a guest pays us a visit, the first room they see would be the Drawing Room or Living Room. They are not directly entertained into the deeper secrets of the house such as our Bedrooms.

There is a very similar setting in Organizational Networks. The Drawing Room of the Organizational Network, called the “De-Militarized Zone”.

This zone hosts the Public Facing Part of our network and separates them from the Internal LAN.

The public facing part may consist of our Web Servers, DNS Servers, FTP Servers, Proxy Servers.

A DMZ is connected to Internet via a Public IP and to the organizational Intranet via Private IP.

A Demilitarized Zone, Connected to Internet and Internal LAN. Both Networks are protected by Firewalls

Each side is protected by a Firewall.

The Demilitarized zone can also be equipped with security controls that help prevent/detect/trap the malicious actors.

This will not only prevent the attacker from entering the Internal Network, but also allow us more reaction time before our internal systems are compromised.

DMZ are also hosted on Virtual Machines. The Virtual Machine is connected to the internet on one network and to the internal LAN on another Network.

Using a VM as DMZ. Here, the Main PC does not have access to the Internet.

Similarly, the use of Containers for DMZ.

With Cloud, now many DMZ are directly hosted on the cloud while the internal server is hosted in-premises.

The functions that are served by employing a DMZ are:
- Host Public facing Services
- Isolate the internet from the internal server
- Reduce Access to outsiders

Isolation of Public facing services is an obvious advantage obtained from DMZ. This helps decrease the threat surface.
The other advantages obtained using DMZ are:
- Greater control over network, packet flow
- Prevents Reconnaissance. When attackers run reconnaissance attempts on our system, only the DMZ is compromised. Internal servers are never reached.

Attacker launches a Reconnaissance probe on our system, the probe will only gather information about our DMZ. The Internal Server will still be Safe.

- Increases Time for us to React.

--

--

Swagat Jena

A learner trying new ventures. I wish to build skills and network by sharing knowledge. Feel free to comment suggestions on the posts.