DMZ (computing): Difference between revisions

Content deleted Content added
Matthuxtable (talk | contribs)
m remove bold on otherusesof
No edit summary
Line 1:
{{otherusesof|DMZ}}
{{Expand|date=March 2007}}
{{Unreferenced|date=March 2007}}Hello
[[Image:DMZ network diagram.png|thumb|300px|Diagram of a typical network employing DMZ using a three-legged firewall]]
In [[computer security]], a '''demilitarized zone''' (DMZ), more appropriately known as '''demarcation zone''', or '''perimeter network''' is a [[computer network|network]] area (a [[subnetwork]]) that sits between an organization's internal network and an external network, usually the [[Internet]]. The point of a DMZ is that connections from the internal and the external network to the DMZ are permitted, whereas connections from the DMZ are only permitted to the external network — hosts in the DMZ may not connect to the internal network. This allows the DMZ's [[server (computing)|host]]s to provide services to both the internal and external network while protecting the internal network in case intruders compromise a host in the DMZ. For someone on the external network who wants to illegally connect to the internal network, the DMZ is a dead end.
Line 57:
[[ru:DMZ (компьютерные сети)]]
[[sv:DMZ (Internet)]]'''
<br />