SlideShare a Scribd company logo
4
Most read
6
Most read
16
Most read
SECURITY TOPOLOGIES
• DMZ
• Internet Zone
• Intranet Zone
General Framework
1. What is a DMZ (Demilitarized
Zone)?
• A DMZ is a computer
network that sits
between a trusted
internal network, such as
a corporate private LAN,
and an untrusted
external network, such as
the public Internet
• Also known as a
– Data Management Zone
or
– Demarcation Zone
– Perimeter Network
Typical components of DMZ network
• Web servers that need to be made
available to the general public, such as
company's primary Web presence
advertising its products or services.
• Public DNS servers that resolve the
names in your domain for users outside
your organization to the appropriate IP
addresses.
• Public FTP servers on which you provide
files to the public
– Downloads of your product manuals
or
– Software drivers
• Anonymous SMTP relays that forward e-
mail from the Internet to internal mail
server(s)
• Servers running h complex e-commerce
Internet and extranet applications
• Proxy Servers
Split Configurations
• Mail services can be split between
servers on the DMZ and the internal
network.
– Internal mail server handles e-mail
from one computer to another on
the internal network.
– Mail that comes in or is sent to
computers outside the internal
network over the Internet is
handled by an SMTP gateway
located in the DMZ.
• For e-commerce systems
– Front-end server, directly accessible
by Internet users is in the DMZ,
– Back-end servers that store sensitive
information are on the internal
network.
DMZ with two firewalls
• DMZ that uses two firewalls,
called a back to back DMZ.
• An advantage of this
configuration is that you can
put a fast packet filtering
firewall/router at the front end
(the Internet edge) to increase
performance of your public
servers,
• Place a slower application
layer filtering (ALF) firewall at
the back end (next to the
corporate LAN) to provide
more protection to the
internal network without
negatively impacting
performance for your public
Tri-homed DMZ
• When a single firewall is used to
create a DMZ, it's called a
trihomed DMZ.
• The firewall computer or
appliance has interfaces to three
separate networks:
– The internal interface to the
trusted network (the internal
LAN)
– The external interface to the
untrusted network (the public
Internet)
– The interface to the semi-
trusted network (the DMZ)
Creating a DMZ Infrastructure
• Two important characteristics of the DMZ
are:
• A different network ID from the internal
network
– A DMZ can use either public or private
IP addresses, depending on its
architecture
• subnet the IP address block that is
assigned by your ISP
• If using private IP addresses for
the DMZ, a Network Address
Translation (NAT) device will be
required
• It is separated from both the Internet and
the internal network by a firewall
Security of DMZ
• The level of security within the DMZ also
depends on the nature of the servers that are
placed there. We can divide DMZs into two
security categories:
• DMZs designed for unauthenticated or
anonymous access
• DMZs designed for authenticated access
Host Security on the DMZ
• Be sure to set strong passwords and use RADIUS or other certificate based
authentication for accessing the management console remotely.
• To allow you to manage the router through a Web page, it runs an HTTP
server. It is a good security practice to disable the HTTP server, as it can serve
as a point of attack an use a HTTPS.
Example Network
Limit Traffic allowed into corporate network
• traffic can be allowed into the
corporate network must be
limited.
• Traffic entering the corporate
network will be coming from
either the Internet or the DMZ.
• Allow all traffic that originated
from the corporate network
can be allowed back into that
network. No other traffic is
desired into the corporate
network
10.1.1.1/24
10.10.10.1/24
172.16.2.0/24
Deter Spoofing
10.1.1.1/24
10.10.10.1/24
172.16.2.0/24
• Spoofing - A common method to attempt to
forge a valid internal source IP addresses.
• To deter spoofing, it is decided to configure an
access list so that Internet hosts cannot easily
spoof an internal network addresses.
• Three common source IP addresses that hackers
attempt to forge are valid internal addresses
(e.g., 10.10.10.0), loopback addresses
(i.e.,127.x.x.x), and multicast addresses (i.e.,
224.x.x.x – 239.x.x.x).
2. INTERNET ZONE
• The internet is the name given to the entire public
network which provides the infrastructure for the
transfer of data between remote points.
• Such data can take the form of email, web pages,
files, multi-media and just about anything else that
exists in digital form.
• Every computer in internet is identified by IP
Address.
• A Special computer DNS is used to give name to the
IP address.
INTRANET ZONE
• An intranet can be described as a mini-internet build
within the safety of a secure networking environment.
• Intranets are typically used to provide internal
corporate web sites for employee only access.
• Because the intranet servers have internal, private IP
addresses and reside behind firewalls they are
generally not accessible to the outside world.
• If external access is needed to an intranet this is best
achieved through the implementation of a Virtual
Private Network (VPN).
VLAN
• Virtual local area networks
• A way of dividing a single physical network switch
among multiple network segments or broadcast
domains.
• Ability to configure multiple LANs on a single switch
• Trunk – allows switches to share many VLANs over a
single physical link
• Routers needed to make different VLANs talk

More Related Content

What's hot (20)

PPTX
Rc4
Amjad Rehman
 
PPTX
Confidentiality using symmetric encryption.pptx
AYUSHJAIN152065
 
PDF
Email security presentation
SubhradeepMaji
 
PPT
Linux Operating System Vulnerabilities
Information Technology
 
PPT
FireWall
rubal_9
 
PPTX
Elliptic Curve Cryptography
JorgeVillamarin5
 
DOCX
Ports and protocols
Kailash Kumar
 
PPTX
Brute Force Attack and Its Prevention.pptx
hamzajawad10
 
DOCX
Logic bomb virus
ssuser1eca7d
 
PPTX
Kali linux and hacking
AbdullahDanish8
 
PPTX
Network security model.pptx
ssuserd24233
 
ODP
C I D R
colmbennett
 
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
PPT
Structured cabling
Chris McAndrew
 
PPTX
Firewall
Nilkanth Shingala
 
PPTX
Lecture 10 intruders
rajakhurram
 
PDF
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
PPTX
Active and Passive Network Attacks
Pradipta Poudel
 
Confidentiality using symmetric encryption.pptx
AYUSHJAIN152065
 
Email security presentation
SubhradeepMaji
 
Linux Operating System Vulnerabilities
Information Technology
 
FireWall
rubal_9
 
Elliptic Curve Cryptography
JorgeVillamarin5
 
Ports and protocols
Kailash Kumar
 
Brute Force Attack and Its Prevention.pptx
hamzajawad10
 
Logic bomb virus
ssuser1eca7d
 
Kali linux and hacking
AbdullahDanish8
 
Network security model.pptx
ssuserd24233
 
C I D R
colmbennett
 
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Structured cabling
Chris McAndrew
 
Lecture 10 intruders
rajakhurram
 
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
Active and Passive Network Attacks
Pradipta Poudel
 

Similar to Demilitarized Zone (DMZ) in computer networking (20)

PDF
Creating a DMZ - pfSense Hangout January 2016
Netgate
 
PPTX
Firewall management introduction
Raghava Sharma
 
PPTX
Firewall DMZ Zone
NetProtocol Xpert
 
PPSX
physical and hardware security(http://4knet.ir)
Azad Kaki
 
PPT
Chapter 03
Waldemar Gomes
 
PPTX
E commerce & erp assignment | Firewall , Types of attack ,dmz, dhcp and ssl
ShyamMohanKunwar
 
PDF
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Agnieszka Kuba
 
PDF
Ch18 Internet Security
phanleson
 
PDF
Fire walls
Smit Panchal
 
PPT
Network security
Presentaionslive.blogspot.com
 
PDF
Introduction to Cyber security module - III
TAMBEMAHENDRA1
 
PPTX
UNIT-4 network information security ID system
agasyabutolia
 
PPT
Network and security concepts
sonuagain
 
PPTX
SharePoint and Forefront United Access Gateway
Planet Technologies
 
PPTX
Firewall & DMZ.pptx
karthikvcyber
 
PPTX
Chapter_1_Introduction to Network Security-1.pptx
mmmmoh35
 
PPTX
MVA slides lesson 8
Fabio Almeida- Oficina Eletrônica
 
PPTX
98 366 mva slides lesson 8
suddenven
 
PPTX
Forefront UAG
James Tramel
 
Creating a DMZ - pfSense Hangout January 2016
Netgate
 
Firewall management introduction
Raghava Sharma
 
Firewall DMZ Zone
NetProtocol Xpert
 
physical and hardware security(http://4knet.ir)
Azad Kaki
 
Chapter 03
Waldemar Gomes
 
E commerce & erp assignment | Firewall , Types of attack ,dmz, dhcp and ssl
ShyamMohanKunwar
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Agnieszka Kuba
 
Ch18 Internet Security
phanleson
 
Fire walls
Smit Panchal
 
Introduction to Cyber security module - III
TAMBEMAHENDRA1
 
UNIT-4 network information security ID system
agasyabutolia
 
Network and security concepts
sonuagain
 
SharePoint and Forefront United Access Gateway
Planet Technologies
 
Firewall & DMZ.pptx
karthikvcyber
 
Chapter_1_Introduction to Network Security-1.pptx
mmmmoh35
 
98 366 mva slides lesson 8
suddenven
 
Forefront UAG
James Tramel
 
Ad

Recently uploaded (20)

PDF
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PPTX
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PPTX
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PDF
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
PDF
Dimensions of Societal Planning in Commonism
StefanMz
 
PDF
The dynastic history of the Chahmana.pdf
PrachiSontakke5
 
PPTX
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
PPTX
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
PPTX
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
PDF
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
PDF
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
PDF
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
PDF
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
Dimensions of Societal Planning in Commonism
StefanMz
 
The dynastic history of the Chahmana.pdf
PrachiSontakke5
 
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
Ad

Demilitarized Zone (DMZ) in computer networking

  • 1. SECURITY TOPOLOGIES • DMZ • Internet Zone • Intranet Zone
  • 3. 1. What is a DMZ (Demilitarized Zone)? • A DMZ is a computer network that sits between a trusted internal network, such as a corporate private LAN, and an untrusted external network, such as the public Internet • Also known as a – Data Management Zone or – Demarcation Zone – Perimeter Network
  • 4. Typical components of DMZ network • Web servers that need to be made available to the general public, such as company's primary Web presence advertising its products or services. • Public DNS servers that resolve the names in your domain for users outside your organization to the appropriate IP addresses. • Public FTP servers on which you provide files to the public – Downloads of your product manuals or – Software drivers • Anonymous SMTP relays that forward e- mail from the Internet to internal mail server(s) • Servers running h complex e-commerce Internet and extranet applications • Proxy Servers
  • 5. Split Configurations • Mail services can be split between servers on the DMZ and the internal network. – Internal mail server handles e-mail from one computer to another on the internal network. – Mail that comes in or is sent to computers outside the internal network over the Internet is handled by an SMTP gateway located in the DMZ. • For e-commerce systems – Front-end server, directly accessible by Internet users is in the DMZ, – Back-end servers that store sensitive information are on the internal network.
  • 6. DMZ with two firewalls • DMZ that uses two firewalls, called a back to back DMZ. • An advantage of this configuration is that you can put a fast packet filtering firewall/router at the front end (the Internet edge) to increase performance of your public servers, • Place a slower application layer filtering (ALF) firewall at the back end (next to the corporate LAN) to provide more protection to the internal network without negatively impacting performance for your public
  • 7. Tri-homed DMZ • When a single firewall is used to create a DMZ, it's called a trihomed DMZ. • The firewall computer or appliance has interfaces to three separate networks: – The internal interface to the trusted network (the internal LAN) – The external interface to the untrusted network (the public Internet) – The interface to the semi- trusted network (the DMZ)
  • 8. Creating a DMZ Infrastructure • Two important characteristics of the DMZ are: • A different network ID from the internal network – A DMZ can use either public or private IP addresses, depending on its architecture • subnet the IP address block that is assigned by your ISP • If using private IP addresses for the DMZ, a Network Address Translation (NAT) device will be required • It is separated from both the Internet and the internal network by a firewall
  • 9. Security of DMZ • The level of security within the DMZ also depends on the nature of the servers that are placed there. We can divide DMZs into two security categories: • DMZs designed for unauthenticated or anonymous access • DMZs designed for authenticated access
  • 10. Host Security on the DMZ • Be sure to set strong passwords and use RADIUS or other certificate based authentication for accessing the management console remotely. • To allow you to manage the router through a Web page, it runs an HTTP server. It is a good security practice to disable the HTTP server, as it can serve as a point of attack an use a HTTPS.
  • 12. Limit Traffic allowed into corporate network • traffic can be allowed into the corporate network must be limited. • Traffic entering the corporate network will be coming from either the Internet or the DMZ. • Allow all traffic that originated from the corporate network can be allowed back into that network. No other traffic is desired into the corporate network 10.1.1.1/24 10.10.10.1/24 172.16.2.0/24
  • 13. Deter Spoofing 10.1.1.1/24 10.10.10.1/24 172.16.2.0/24 • Spoofing - A common method to attempt to forge a valid internal source IP addresses. • To deter spoofing, it is decided to configure an access list so that Internet hosts cannot easily spoof an internal network addresses. • Three common source IP addresses that hackers attempt to forge are valid internal addresses (e.g., 10.10.10.0), loopback addresses (i.e.,127.x.x.x), and multicast addresses (i.e., 224.x.x.x – 239.x.x.x).
  • 14. 2. INTERNET ZONE • The internet is the name given to the entire public network which provides the infrastructure for the transfer of data between remote points. • Such data can take the form of email, web pages, files, multi-media and just about anything else that exists in digital form. • Every computer in internet is identified by IP Address. • A Special computer DNS is used to give name to the IP address.
  • 15. INTRANET ZONE • An intranet can be described as a mini-internet build within the safety of a secure networking environment. • Intranets are typically used to provide internal corporate web sites for employee only access. • Because the intranet servers have internal, private IP addresses and reside behind firewalls they are generally not accessible to the outside world. • If external access is needed to an intranet this is best achieved through the implementation of a Virtual Private Network (VPN).
  • 16. VLAN • Virtual local area networks • A way of dividing a single physical network switch among multiple network segments or broadcast domains. • Ability to configure multiple LANs on a single switch • Trunk – allows switches to share many VLANs over a single physical link • Routers needed to make different VLANs talk

Editor's Notes

  • #3: Connecting our private network to the un-trusted network (aka the internet), we should control the flow of the traffic in a secured manner by a firewall device. With firewall, all the traffic are forced to pass through a single concentrated checkpoint where all traffic will be controlled, authenticated, filtered, and logged according to the policies set. With this way, we can significantly reduce, but not eliminate the amount of unauthorized traffic reaching our internal network.
  • #4: Internet users can access the public resources but they cannot get into our private / internal corporate networks.
  • #9: The level of security within the DMZ also depends on the nature of the servers that are placed there. We can divide DMZs into two security categories: DMZs designed for unauthenticated or anonymous access DMZs designed for authenticated access If you have a Web server that you want everybody on the Internet to be able to access, (such as a Web presence advertising your company), you'll have to allow anonymous access. You can't easily provide authentication credentials to every stranger who happens upon your site. However, if your Internet-facing servers on the DMZ are used by partners, customers, or employees working off-site, you can require authentication to access them. This makes it more difficult for a hacker to gain access.