{"id":29537,"date":"2023-04-07T15:09:37","date_gmt":"2023-04-07T15:09:37","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=29537"},"modified":"2023-06-06T16:20:10","modified_gmt":"2023-06-06T16:20:10","slug":"dmz-network","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/","title":{"rendered":"What Is a DMZ Network? Definition, Architecture &#038; Benefits"},"content":{"rendered":"\n<p>A DMZ network, or a demilitarized zone, is a subnetwork in an enterprise networking environment that contains public-facing resources \u2014 such as web servers for company websites \u2014 in order to isolate them from an enterprise\u2019s private local area network (LAN).<\/p>\n\n\n\n<p>Also referred to as a perimeter network or screened subnet, a DMZ network acts as an additional layer of <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network security<\/a>, isolating itself and its contents from the parts of the enterprise network where more sensitive and private resources are more securely kept. While users can interact with public networks and whatever resources are provided in the DMZ, DMZ perimeter security keeps the organization\u2019s private network private and secure from outside users.<\/p>\n\n\n\n<p><strong>A Comprehensive Guide to DMZ Networks<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#purpose\">What Is the Purpose of a DMZ Network?<\/a><\/li>\n\n\n\n<li><a href=\"#work\">How DMZ Networks Work<\/a><\/li>\n\n\n\n<li><a href=\"#benefits\">5 Benefits to DMZ in Networking<\/a><\/li>\n\n\n\n<li><a href=\"#examples\">4 DMZ Networking Examples<\/a><\/li>\n\n\n\n<li><a href=\"#practices\">DMZ Network Best Practices<\/a><\/li>\n\n\n\n<li><a href=\"#conclusion\">Bottom Line: DMZ Networks<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"purpose\">What Is the Purpose of a DMZ Network?<\/h2>\n\n\n\n<p>The purpose of a DMZ network is to balance reasonable access to resources with effective isolation and security measures.<\/p>\n\n\n\n<p>For companies that offer digital products and services, chances are they want some of their resources to be available for customers, while other data and systems need to remain hidden from external users. An effective way to make sure users can only access the resources they need is to isolate them in a new subnetwork or network segment with its own access, security, and operational rules.<\/p>\n\n\n\n<p>DMZ networks typically contain external-facing resources such as DNS, email, proxy and web servers.<\/p>\n\n\n\n<p>DMZ networks are also helpful for separating out third-party servers, routers, and other technologies and platforms that don\u2019t have as many manageable security features and controls built in. By isolating these less secure assets in a single location, network administrators can easily monitor and identify anomalous network traffic before it breaches the main network.<\/p>\n\n\n\n<p>DMZ networks are primarily used to manage outside user access and give network administrators more network security and monitoring support. However, when your DMZ network includes a proxy server, administrators also have the option to filter all internal internet usage through the DMZ. This approach requires employees to use public networks according to their organization\u2019s rules while also giving network security professionals additional visibility into internet usage across the organization.<\/p>\n\n\n\n<p><strong>Also read: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-a-network\/\"><strong>Network Protection: How to Secure a Network<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"work\">How DMZ Networks Work<\/h2>\n\n\n\n<p>DMZ networks work through isolation, but first, through network segmentation. Network administrators that want to create a DMZ need to first determine which parts of their network should be available for outside users. They can also use this time to identify any network components that operate with lesser security controls that put the rest of the network at risk.<\/p>\n\n\n\n<p>These are the kinds of servers and resources you\u2019ll often find on a DMZ network:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>VoIP servers<\/li>\n\n\n\n<li>Proxy servers<\/li>\n\n\n\n<li>Web servers<\/li>\n\n\n\n<li>Email servers<\/li>\n\n\n\n<li>DNS servers<\/li>\n\n\n\n<li>FTP servers<\/li>\n\n\n\n<li>Third-party routers and servers<\/li>\n\n\n\n<li>Other external services, resources, and servers<\/li>\n<\/ul>\n\n\n\n<p>Now, these resources need to be isolated from the rest of the enterprise network and placed on a DMZ subnetwork. The DMZ should be set up with at least one gateway device (typically a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-firewalls\/\">firewall<\/a>) that will filter external network packets through to the DMZ and monitor for unusual traffic or activity. In many cases, a dual firewall layout is implemented for a second round of network packet filtering before the LAN (see image below).<\/p>\n\n\n\n<p>Many DMZs and the firewalls that protect them include advanced security features and tools, such as <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">network access control (NAC) technology<\/a> and proxy servers for optimized traffic monitoring. These and many other network security solutions are ramped up specifically on the DMZ, making it so network administrators can often detect unusual behavior before unauthorized users try to move past the DMZ to access the LAN.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2-1013x1024.png\" alt=\"DMZ network architecture\" class=\"wp-image-29538\" width=\"760\" height=\"768\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2-1013x1024.png 1013w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2-297x300.png 297w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2-768x776.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2-1520x1536.png 1520w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2-150x152.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2-300x303.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2-696x703.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2-1068x1079.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2.png 1596w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><figcaption class=\"wp-element-caption\">DMZ network architecture<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">DMZ Architecture<\/h3>\n\n\n\n<p>There are two main layout options to choose from when developing a DMZ subnetwork: a single firewall layout and a dual firewall layout.<\/p>\n\n\n\n<p>With a single firewall layout, the firewall sits in the middle of the private LAN, the DMZ, and the public network; no users can travel directly from one of these networks to another without first passing through the centralized firewall, which filters and monitors all traffic. This model is much easier to implement, but it is generally considered less secure since only one firewall needs to be compromised for a successful cyberattack to breach the LAN.<\/p>\n\n\n\n<p>In a dual firewall layout, two different firewalls are used for tiered network packet filtering. The front-end firewall sits between public networks and the DMZ to filter and manage traffic before it enters the DMZ. If a user attempts to move from the DMZ to the LAN, a back-end firewall sits between these two networks to further filter and authorize traffic. The dual firewall setup is generally considered more secure, but it\u2019s also harder to manage.<\/p>\n\n\n\n<p><strong>See the <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\"><strong>top next-generation firewalls (NGFWs)<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"benefits\">5 Benefits to DMZ in Networking<\/h2>\n\n\n\n<p>DMZ networks provide the isolation necessary to protect the main network from public-facing threats, but they also create an environment where focused security tools can be used to monitor and protect vulnerable DMZ resources. These are some of the benefits you can expect from the implementation of a DMZ model:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Isolation adds an additional layer of protection<\/h3>\n\n\n\n<p>DMZ development requires network administrators to segment their networks so potentially unsecure and public-facing resources are identified and isolated from everything else. This isolation is particularly valuable when organizations need to work with resources or servers that have fewer native security controls, such as FTP servers.<\/p>\n\n\n\n<p>These kinds of servers and modern technologies like the Internet of Things (IoT) and operational technology (OT) are important to overall network operations but can be detrimental to everything else on the network if breached. When these kinds of resources are isolated in a dedicated environment like a DMZ, even successful security breaches aren\u2019t likely to reach the LAN.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Avoids common network performance lags<\/h3>\n\n\n\n<p>Especially for resources that your customers will regularly be accessing, high speeds and performance are key to the user experience. DMZs are designed in a way that optimizes network performance because they separate frequently used and high-workload resources, like web servers, from the rest of the internal network. With that separation, network admins are able to optimize the DMZ for high traffic volumes without affecting internal network resource allocation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Focused security tools and notifications<\/h3>\n\n\n\n<p>DMZ isolation can offer great support for internal network security, but DMZ networks themselves are also ideal environments for security tools. Most DMZs incorporate multi-functional firewall technology as well as network access control, proxy servers, information security policies, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\">network monitoring<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/\">vulnerability management<\/a>, and other features to protect the environment and alert network administrators when something\u2019s amiss.<\/p>\n\n\n\n<p><strong>Learn about the <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-network-security\/\"><strong>34 Most Common Types of Network Security Protections<\/strong><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Compatibility with proxy servers<\/h3>\n\n\n\n<p>If your organization implements network access control tools and specific rules on its DMZ network, you can require all internal traffic moving toward the internet to follow specific rules and visit only approved IP addresses. This is because DMZ networks are compatible with proxy servers that make this kind of traffic steering possible.<\/p>\n\n\n\n<p>Proxy servers are also helpful for monitoring types and quantities of traffic. Proxies on DMZs are particularly helpful for healthcare organizations and other industries in which <a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\">compliance management and data security<\/a> are crucial operating factors to consider.<\/p>\n\n\n\n<p><strong>See the <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/secure-web-gateway-vendors\/\"><strong>top secure web gateways<\/strong><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Improved visibility for network administrators<\/h3>\n\n\n\n<p>Network administrators have a lot of network features, functions, users, devices, and applications to manage at all times. Especially on networks with limited network security personnel, it can quickly become overwhelming to monitor and address all network security issues. It\u2019s even more difficult if your network uses tools that have limited security features and require more hands-on monitoring than everything else.<\/p>\n\n\n\n<p>With a DMZ in place, network administrators are able to divide up different types of network resources into the main network and the DMZ subnetwork. This division makes the more problematic security configurations readily apparent in the DMZ network.&nbsp;<\/p>\n\n\n\n<p>Because admins manage both environments, they still have as much control over these resources as they did before. Now, they simply have a more efficient way to monitor vulnerable network assets and services.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"examples\">4 DMZ Networking Examples<\/h2>\n\n\n\n<p>A DMZ can help any organization with a main network and web-facing assets, but here are a few specific use cases where a DMZ can help.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data-driven user experience on a company website<\/h3>\n\n\n\n<p>Whether you\u2019re running an e-commerce business or are a healthcare provider, you likely have a customer-facing website that enables users to make purchases and complete other actions with company data and systems. This website requires a web server running on your network.<\/p>\n\n\n\n<p>Unless the network is segmented, unauthorized users could potentially move from the website and data they\u2019re supposed to access into the rest of the private network. With a DMZ, the web server and other customer materials are isolated from a company\u2019s private assets, making it so users cannot easily move laterally from the web server to the internal network.<\/p>\n\n\n\n<p><strong>See the <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\"><strong>Top Microsegmentation Software<\/strong><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hybrid cloud environments<\/h3>\n\n\n\n<p>Let\u2019s say your company has been operating for multiple decades and has some of its most important assets and applications on-premises. However, many other applications and services you now use are hosted in the cloud.<\/p>\n\n\n\n<p>In this hybrid cloud environment, you have resources on-premises that need to interact with your cloud assets, but at the same time, you don\u2019t want both aspects of your network to have full, unbridled access to each other. In this scenario, a DMZ network can be set up between the cloud environment and the on-premises network to audit and filter traffic moving between the two.<\/p>\n\n\n\n<p><strong>See the <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/\"><strong>top cloud security companies<\/strong><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Production and manufacturing device security<\/h3>\n\n\n\n<p>Manufacturers and critical infrastructure industries are increasingly investing in newer technologies like <a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\">IoT and OT devices<\/a>, which open up businesses to new operational use cases \u2014 and new security vulnerabilities. Most of these kinds of tools are designed to store and transmit a lot of data but don\u2019t necessarily have many security features in place, due to the speed and capacity required of these tools. When an IoT or OT device operates on the same networking plane as other assets, then, it opens all of them up to greater security risk.<\/p>\n\n\n\n<p>DMZs can isolate these kinds of devices from the rest of the network, making them accessible internally and externally while upholding firewall filtering rules to limit any lateral movement if a breach occurs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DMZ hosts for home computer networks<\/h3>\n\n\n\n<p>Home computer networks are much smaller but still contain personally identifiable information (PII) and other features for which you\u2019ll want to limit access to known users. Unfortunately, home networks tend to be easy to hack due to limited security investments on the part of the owner.<\/p>\n\n\n\n<p>A DMZ host is an easy thing to set up with existing technologies in your home, such as a gaming console. The selected host device sits outside of the firewall and acts as a filter for all incoming traffic, giving the rest of your devices and your internal network more protection from unauthorized outside users. For this use case, it\u2019s important to select a DMZ host device that contains minimal sensitive data and private information, as it will be outside of the firewall\u2019s protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"practices\">DMZ Network Best Practices<\/h2>\n\n\n\n<p>Setting up a DMZ network can be a great security addition if it\u2019s configured correctly. Consider these best practices and tips during your implementation process for better outcomes:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Label all networks and network segments<\/h3>\n\n\n\n<p>As obvious as it may sound, you need to clearly label each part of your network so it\u2019s clear what\u2019s operating where, how, and why. This will save time during initial setup, make ongoing reconfigurations easier, and also create usable documentation if your network security team changes over time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Clearly define and enforce isolation rules<\/h3>\n\n\n\n<p>Your DMZ is only as effective as the filtering rules and policies you set up. It\u2019s important to research every feature of your network and be able to justify why something does or does not need to go into the DMZ; similarly, it\u2019s important to program your firewalls and any other security tools you set up on the DMZ to reflect and enforce your security policies for all device and traffic types.<\/p>\n\n\n\n<p><strong>Also read: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/fine-tuning-firewall-rules-best-practices\/\"><strong>Fine-tuning Firewall Rules: 10 Best Practices<\/strong><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use a dual firewall strategy for added protection<\/h3>\n\n\n\n<p>A dual firewall setup is harder to manage than a single firewall, but it\u2019s also more effective at filtering out malicious traffic. If you plan to implement a dual firewall architecture, consider working with a different provider for each firewall to diversify your security setup and make it more difficult to take down all infrastructure in an attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Choose the right kinds of firewalls<\/h3>\n\n\n\n<p>Not all firewalls are created equal and not all firewalls work for the same scenarios. Because you\u2019re trying to filter traffic at a very granular level that\u2019s driven by applications and individual users, a proxy firewall or application-level gateway is typically the best option for your DMZ.<\/p>\n\n\n\n<p><strong>Also read: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-firewalls\/#web\"><strong>Types of Firewalls Explained<\/strong><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Incorporate zero trust best practices<\/h3>\n\n\n\n<p>DMZs work best in cooperation with <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust network access (ZTNA)<\/a>. With ZTNA solutions, traffic is denied unless it explicitly passes your predefined user access control policies. Combined with DMZ isolation, it\u2019s a great way to stop unauthorized access to the LAN.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Don\u2019t forget vulnerability management<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Vulnerability management tools<\/a>, like <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">vulnerability scanners<\/a> and vulnerability assessments, are incredibly helpful assets for regularly monitoring network traffic in a DMZ. But don\u2019t just invest in vulnerability management solutions; also take the time to develop a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management\/\">vulnerability management policy and process<\/a> that makes sense for your organization.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Monitor and audit DMZ performance over time<\/h3>\n\n\n\n<p>Be sure to invest in tools and personnel for DMZ traffic monitoring, as it may require more constant and vigilant oversight than the rest of the network. As new tools, applications, and users are brought onto your enterprise network, frequently evaluate whether or not they should be moved to the DMZ and what changes will be necessary if that move happens.<\/p>\n\n\n\n<p><strong>See the <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/\"><strong>Top Network Detection &amp; Response (NDR) Solutions<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">Bottom Line: DMZ Networks<\/h2>\n\n\n\n<p>Some people now consider DMZ networks outdated or ill-fitting for the modern enterprise network, especially since many networks have moved past technologies like internal web servers in favor of cloud computing and cloud-hosted networks. There are also several newer networking and security options, such as <a href=\"https:\/\/www.esecurityplanet.com\/products\/sd-wan\/\">SD-WAN<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/container-and-kubernetes-security-vendors\/\">containerization<\/a>, virtualization, <a href=\"https:\/\/www.esecurityplanet.com\/products\/secure-access-service-edge-sase\/\">SASE<\/a>, and ZTNA, which seem to offer more comprehensive security support for modern cloud environments than DMZ\u2019s form of perimeter security.<\/p>\n\n\n\n<p>However, DMZ still proves useful in many cases, especially when hardware or on-premises networks need to be part of a secure and integrated environment with access management rules. When a DMZ network is implemented in the right scenarios, your business can more easily isolate unsecure devices, operate hybrid networks with appropriately-integrated legacy components, and streamline the network monitoring process for network administrators.<\/p>\n\n\n\n<p><strong>Further reading:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\"><strong>Best Enterprise Network Security Tools &amp; Solutions<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\"><strong>Top Secure Email Gateway Solutions<\/strong><\/a><\/li>\n<\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6da0bda0dc-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6da0bda0dc\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6da0bda0dc\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6da0bda0dc\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6da0bda0dc\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6da0bda0dc\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6da0bda0dc\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A DMZ network, or a demilitarized zone, is a subnetwork in an enterprise networking environment that contains public-facing resources \u2014 such as web servers for company websites \u2014 in order to isolate them from an enterprise\u2019s private local area network (LAN). Also referred to as a perimeter network or screened subnet, a DMZ network acts [&hellip;]<\/p>\n","protected":false},"author":328,"featured_media":29538,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[2369,3790,31946,7234,23887,3414,730,23182,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[394,395,31779,381,31775,392],"class_list":["post-29537","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cloud-security","tag-cybersecurity","tag-email-gateway","tag-firewalls","tag-microsegmentation","tag-network-security","tag-security","tag-web-application-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-email-security","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-iot-security","b2b_product-network-access-control-nac","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is a DMZ Network? | Ultimate Guide to DMZ in Networking<\/title>\n<meta name=\"description\" content=\"Learn what a DMZ network is, how to set up a DMZ network, and explore the benefits of a DMZ network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is a DMZ Network? | Ultimate Guide to DMZ in Networking\" \/>\n<meta property=\"og:description\" content=\"Learn what a DMZ network is, how to set up a DMZ network, and explore the benefits of a DMZ network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-07T15:09:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-06T16:20:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1596\" \/>\n\t<meta property=\"og:image:height\" content=\"1613\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shelby Hiter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shelby Hiter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/\"},\"author\":{\"name\":\"Shelby Hiter\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5\"},\"headline\":\"What Is a DMZ Network? Definition, Architecture &#038; Benefits\",\"datePublished\":\"2023-04-07T15:09:37+00:00\",\"dateModified\":\"2023-06-06T16:20:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/\"},\"wordCount\":2536,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2.png\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"email gateway\",\"firewalls\",\"microsegmentation\",\"network security\",\"security\",\"web application security\",\"Web security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/\",\"name\":\"What Is a DMZ Network? | Ultimate Guide to DMZ in Networking\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2.png\",\"datePublished\":\"2023-04-07T15:09:37+00:00\",\"dateModified\":\"2023-06-06T16:20:10+00:00\",\"description\":\"Learn what a DMZ network is, how to set up a DMZ network, and explore the benefits of a DMZ network.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2.png\",\"width\":1596,\"height\":1613,\"caption\":\"DMZ network architecture\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is a DMZ Network? Definition, Architecture &#038; Benefits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5\",\"name\":\"Shelby Hiter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg\",\"caption\":\"Shelby Hiter\"},\"description\":\"eSecurity Planet contributor Shelby Hiter has covered cybersecurity, AI and more in her time at TechnologyAdvice. In addition to eSecurity Planet, she's worked as a technology editor and writer for TechRepublic, LinuxToday, Webopedia, SoftwarePundit, Datamation, Enterprise Networking Planet, CIO Insight, AllBusiness.com, and SiteProNews. Beyond B2B content strategy and editing, she also specializes in marketing and communication strategies and the occasional photo collage of her dog.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/shelby-hiter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is a DMZ Network? | Ultimate Guide to DMZ in Networking","description":"Learn what a DMZ network is, how to set up a DMZ network, and explore the benefits of a DMZ network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/","og_locale":"en_US","og_type":"article","og_title":"What Is a DMZ Network? | Ultimate Guide to DMZ in Networking","og_description":"Learn what a DMZ network is, how to set up a DMZ network, and explore the benefits of a DMZ network.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/","og_site_name":"eSecurity Planet","article_published_time":"2023-04-07T15:09:37+00:00","article_modified_time":"2023-06-06T16:20:10+00:00","og_image":[{"width":1596,"height":1613,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2.png","type":"image\/png"}],"author":"Shelby Hiter","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Shelby Hiter","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/"},"author":{"name":"Shelby Hiter","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5"},"headline":"What Is a DMZ Network? Definition, Architecture &#038; Benefits","datePublished":"2023-04-07T15:09:37+00:00","dateModified":"2023-06-06T16:20:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/"},"wordCount":2536,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2.png","keywords":["cloud security","cybersecurity","email gateway","firewalls","microsegmentation","network security","security","web application security","Web security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/","url":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/","name":"What Is a DMZ Network? | Ultimate Guide to DMZ in Networking","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2.png","datePublished":"2023-04-07T15:09:37+00:00","dateModified":"2023-06-06T16:20:10+00:00","description":"Learn what a DMZ network is, how to set up a DMZ network, and explore the benefits of a DMZ network.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/DMZ_NetworkSecurity_eSP_rnd2.png","width":1596,"height":1613,"caption":"DMZ network architecture"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"What Is a DMZ Network? Definition, Architecture &#038; Benefits"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5","name":"Shelby Hiter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg","caption":"Shelby Hiter"},"description":"eSecurity Planet contributor Shelby Hiter has covered cybersecurity, AI and more in her time at TechnologyAdvice. In addition to eSecurity Planet, she's worked as a technology editor and writer for TechRepublic, LinuxToday, Webopedia, SoftwarePundit, Datamation, Enterprise Networking Planet, CIO Insight, AllBusiness.com, and SiteProNews. Beyond B2B content strategy and editing, she also specializes in marketing and communication strategies and the occasional photo collage of her dog.","url":"https:\/\/www.esecurityplanet.com\/author\/shelby-hiter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/29537"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/328"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=29537"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/29537\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/29538"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=29537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=29537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=29537"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=29537"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=29537"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=29537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}