x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF

Technical Support

Need help?

 

What is a DMZ?

Information applies to:

Products
Panda GateDefender Integra 100
Panda GateDefender Integra 300

A DMZ (Demilitarized Zone) is a neutral network or zone between the private network and the public network or the Internet. The main function of a DMZ is to isolate public services offered to the outside from the resources in the private network. The LAN resources must be hidden from the outside and protected by the firewall with an additional layer of security. The DMZ assigns different levels of trustworthiness to networks and the firewall acts as a border and checkpoint between these networks.

When configuring a firewall, at least three types of networks can be distinguished, according to the level of trustworthiness assigned to them.

  1. WAN: An external network, for example the Internet. This has the lowest trust level.
  2. LAN: This is the internal, private or local network. A firewall should protect this zone against threats from other zones.
  3. DMZ: Demilitarized Zone. It is conceptually between a WAN and a LAN.

Normally, there is a WAN and a LAN. From there, more networks of each type can be added to isolate them. There can be as many DMZs and levels of trustworthiness as necessary.

The most common way of configuring the DMZ is to place servers in them (HTTP, SMTP, DNS, etc.) that offer services to the outside and even the proxy server through which LAN users access the Internet.

With the correct levels of trustworthiness, if the firewall is configured to only allow access from the LAN to the DMZ and not vice-versa, (the hosts in the DMZ cannot start sessions with the LAN, unless they belong to sessions already established) a user can only access the servers in the DMZ from the public zone. By doing this, even if the security of a certain server is compromised, the security of the LAN is guaranteed at all times.

Help nº- 20070702 31438 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT