What Is A DMZ Network
What Is A DMZ Network
What Is A DMZ Network
Definition,
Architecture & Benefits
A DMZ network, or a demilitarized zone, is a subnetwork in an enterprise networking environment that contains public-facing
resources — such as web servers for company websites — in order to isolate them from an enterprise’s private local area
network (LAN).
Also referred to as a perimeter network or screened subnet, a DMZ network acts as an additional layer of network security,
isolating itself and its contents from the parts of the enterprise network where more sensitive and private resources are more
securely kept. While users can interact with public networks and whatever resources are provided in the DMZ, DMZ
perimeter security keeps the organization’s private network private and secure from outside users.
For companies that offer digital products and services, chances are they want some of their resources to be available for
customers, while other data and systems need to remain hidden from external users. An effective way to make sure users
can only access the resources they need is to isolate them in a new subnetwork or network segment with its own access,
security, and operational rules.
DMZ networks typically contain external-facing resources such as DNS, email, proxy and web servers.
DMZ networks are also helpful for separating out third-party servers, routers, and other technologies and platforms that don’t
have as many manageable security features and controls built in. By isolating these less secure assets in a single location,
network administrators can easily monitor and identify anomalous network traffic before it breaches the main network.
DMZ networks are primarily used to manage outside user access and give network administrators more network security
and monitoring support. However, when your DMZ network includes a proxy server, administrators also have the option to
filter all internal internet usage through the DMZ. This approach requires employees to use public networks according to
their organization’s rules while also giving network security professionals additional visibility into internet usage across the
organization.
These are the kinds of servers and resources you’ll often find on a DMZ network:
VoIP servers
Proxy servers
Web servers
Email servers
DNS servers
FTP servers
Now, these resources need to be isolated from the rest of the enterprise network and placed on a DMZ subnetwork. The
DMZ should be set up with at least one gateway device (typically a firewall) that will filter external network packets through
to the DMZ and monitor for unusual traffic or activity. In many cases, a dual firewall layout is implemented for a second
round of network packet filtering before the LAN (see image below).
Many DMZs and the firewalls that protect them include advanced security features and tools, such as network access
control (NAC) technology and proxy servers for optimized traffic monitoring. These and many other network security
solutions are ramped up specifically on the DMZ, making it so network administrators can often detect unusual behavior
before unauthorized users try to move past the DMZ to access the LAN.
DMZ network architecture
DMZ Architecture
There are two main layout options to choose from when developing a DMZ subnetwork: a single firewall layout and a dual
firewall layout.
With a single firewall layout, the firewall sits in the middle of the private LAN, the DMZ, and the public network; no users can
travel directly from one of these networks to another without first passing through the centralized firewall, which filters and
monitors all traffic. This model is much easier to implement, but it is generally considered less secure since only one firewall
needs to be compromised for a successful cyberattack to breach the LAN.
In a dual firewall layout, two different firewalls are used for tiered network packet filtering. The front-end firewall sits between
public networks and the DMZ to filter and manage traffic before it enters the DMZ. If a user attempts to move from the DMZ
to the LAN, a back-end firewall sits between these two networks to further filter and authorize traffic. The dual firewall setup
is generally considered more secure, but it’s also harder to manage.
These kinds of servers and modern technologies like the Internet of Things (IoT) and operational technology (OT) are
important to overall network operations but can be detrimental to everything else on the network if breached. When these
kinds of resources are isolated in a dedicated environment like a DMZ, even successful security breaches aren’t likely to
reach the LAN.
Proxy servers are also helpful for monitoring types and quantities of traffic. Proxies on DMZs are particularly helpful for
healthcare organizations and other industries in which compliance management and data security are crucial operating
factors to consider.
See the top secure web gateways
With a DMZ in place, network administrators are able to divide up different types of network resources into the main network
and the DMZ subnetwork. This division makes the more problematic security configurations readily apparent in the DMZ
network.
Because admins manage both environments, they still have as much control over these resources as they did before. Now,
they simply have a more efficient way to monitor vulnerable network assets and services.
Unless the network is segmented, unauthorized users could potentially move from the website and data they’re supposed to
access into the rest of the private network. With a DMZ, the web server and other customer materials are isolated from a
company’s private assets, making it so users cannot easily move laterally from the web server to the internal network.
In this hybrid cloud environment, you have resources on-premises that need to interact with your cloud assets, but at the
same time, you don’t want both aspects of your network to have full, unbridled access to each other. In this scenario, a DMZ
network can be set up between the cloud environment and the on-premises network to audit and filter traffic moving
between the two.
DMZs can isolate these kinds of devices from the rest of the network, making them accessible internally and externally while
upholding firewall filtering rules to limit any lateral movement if a breach occurs.
However, DMZ still proves useful in many cases, especially when hardware or on-premises networks need to be part of a
secure and integrated environment with access management rules. When a DMZ network is implemented in the right
scenarios, your business can more easily isolate unsecure devices, operate hybrid networks with appropriately-integrated
legacy components, and streamline the network monitoring process for network administrators.