What is DMZ?

Answers were Sorted based on User's Feedback



What is DMZ?..

Answer / rajiv dikshit

In computer networking, DMZ is a firewall configuration for
securing local area networks (LANs).
In a DMZ configuration, most computers on the LAN run
behind a firewall connected to a public network like the
Internet. One or more computers also run outside the
firewall, in the DMZ. Those computers on the outside
intercept traffic and broker requests for the rest of the
LAN, adding an extra layer of protection for computers
behind the firewall.

Traditional DMZs allow computers behind the firewall to
initiate requests outbound to the DMZ. Computers in the DMZ
in turn respond, forward or re-issue requests out to the
Internet or other public network, as proxy servers do.
(Many DMZ implementations, in fact, simply utilize a proxy
server or servers as the computers within the DMZ.) The LAN
firewall, though, prevents computers in the DMZ from
initiating inbound requests.

DMZ is a commonly-touted feature of home broadband routers.
However, in most instances these features are not true
DMZs. Broadband routers often implement a DMZ simply
through additional firewall rules, meaning that incoming
requests reach the firewall directly. In a true DMZ,
incoming requests must first pass through a DMZ computer
before reaching the firewall.

Is This Answer Correct ?    6 Yes 0 No

What is DMZ?..

Answer / praveen

A DeMilitarised Zone (DMZ) is a seperate network located in
the neutral zone between a private (inside) network and a
public (outside) network

Is This Answer Correct ?    4 Yes 3 No

What is DMZ?..

Answer / arunanoopm

->DMZ is a Demiliterized Zone.

->In computer networking, DMZ is a firewall configuration
for securing local area networks (LANs).

->DMZ is a commonly-touted feature of home broadband
routers.

->In a true DMZ, incoming requests must first pass through
a DMZ computer before reaching the firewall.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Protocols AllOther Interview Questions

When a customer starts abusing u how will u deal with him? n what do u do?

2 Answers   TATA, Wipro,


Expand IMAP

5 Answers  


what is ethernet?

5 Answers  


Expand DSL

2 Answers  


What?s the OSI model? What are the seven levels?

1 Answers  






Draw diagrams for the waveforms you would expect when the bit sequence 10111001 is transmitted on IEEE 802.3 

0 Answers  


What are protocols? What are they used for?

0 Answers  


how to change mac address of a system ?

17 Answers  


what is the difference between tcp and udp protocol?nowadays internet using which type of protocol?

2 Answers  


What is VMPS?

3 Answers   Cisco,


How do I transfer files using ftp?

0 Answers  


What are the generally asked questions for a Person who is attending Network protocol testing L2/L3.

0 Answers   DLI, IT Labs, Tech Mahindra,


Categories