Talk:DMZ (computing)
Computer Security: Computing Start‑class High‑importance | ||||||||||||||||||
|
Computing: Networking Start‑class Low‑importance | |||||||||||||
|
Update
I have updated the article and removed the stub. If you have any comments, please let me know. Jasonlfunk 15:45, 11 October 2007 (UTC)
Illustrations
The picture does not show a proper DMZ. It should look like (in ascii art):
| [internet]----[Firewall/router]----- | ------[Firewall]-----[Internal network] | [DMZ]
What is shown here is a three-legged firewall concept.
Greg Rojas
I am confused as to the way a DMZ is laid out. The pictures are showing two different methods, which I understand are differences in topography. But, how is the ascii art dipiction laid out with the actual machines, is there a router between the firewalls? There should maybe be an illustration in the article or more detailed discriptions. 12:08 CDT, 02 June 2006
The boundary between
The term DMZ has been used to describe the boundary between autonomous networks, likely predating the adoption of the term by firewall vendors.
Cjcoleman 20060121
Whether DMZ can be one of the NIC of the firewall
Is it possible to configure one of the network card IP of the firewall(With 3 Network Card) as DMZ. One NIC to Internal network One NIC to external network
Response to above
I believe that many people do this: configure the one Firewall to be the connection between DMZ and LAN and External. However, if the Firewall is breached from the outside then there is the potential to get to the LAN as easily as they get to the DMZ. It is a more secure solution to use 2 Firewalls.
82.211.102.231 10:09, 1 December 2006 (UTC)Helen
Article title wrong?
Everyone understands that the term "DMZ" in computing is short for "demilitarized zone", but no one in computing ever actually says "demilitarized zone" (except in answer to the question "what does DMZ stand for?"). And the article reflects this; the full term is never used again after the first sentence.
So I think the article should be renamed to "DMZ (computing)", and the first paragraph updated accordingly. Or maybe even renamed to just "DMZ", with a disambiguation link to "Demilitarized zone" (since, eg, googling for "DMZ" turns up this article first and the military article second). —Preceding unsigned comment added by 24.99.22.247 (talk) 18:13, 30 May 2008 (UTC)
- Done --h2g2bob (talk) 21:13, 28 October 2008 (UTC)
Article title wrong!
Better to call this a 'Data Management Zone'. —Preceding unsigned comment added by 194.110.215.6 (talk) 12:40, 10 March 2009 (UTC)
I'd like some source info on this. As a 13 year IT veteran and many other people I communicate with just as much if not more IT experience have NEVER heard of 'Data Management Zone' and would prefer this is removed. A DMZ in terms of computing does root from Demilitarized Zone and is best described as that or a Perimeter Network. My re-wording of that in the first sentence could be helped by someone more elegant in their writing skills. thanks. Turnpike420 (talk) 18:42, 14 December 2009 (UTC)
- Start-Class Computer Security articles
- High-importance Computer Security articles
- Start-Class Computer Security articles of High-importance
- Start-Class Computing articles
- Low-importance Computing articles
- All Computing articles
- All Computer Security articles
- Start-Class Computer networking articles
- Mid-importance Computer networking articles
- Start-Class Computer networking articles of Mid-importance
- All Computer networking articles