Jul 23

In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a neutral zone between outside a private network and public network companies. It prevents outside users get direct access to a server, enterprise data. (The term comes from the geographic buffer zone between North Korea and South Korea after the action of the United Nations police in the 1950s.) Is a DMZ set up an optional and more secure approach to a server securely and effectively acts as a proxy server when.

In a typical configuration of a DMZ for a small company, a separate computer (or host in network terms) requests from users to access private network of web sites or other undertaking is open to the public. The DMZ host then initiates sessions for these requests on the public.
can, however, is the DMZ host does not log in to the private network. You can only packets that were requested.

The public network users outside the company can access the DMZ host. The DMZ usually include information on Web pages, so that it can be covered with the outside world. However, the zone does not allow access to data from another company. When an external user in the DMZ hosts security, Web pages can be damaged, but no information about the society of those suspended. D-Link, a leading manufacturer of routers, a company that sells products for the creation of a demilitarized zone.

Be Sociable, Share!

Tags: , , ,

3 Comments


(Required)
(Required, will not be published)

css.php