Screened subnet (previously known as demilitarized zone)

A screened subnet, also known as a demilitarized zone (DMZ), is a network architecture designed to enhance the security of an organization's internal network.

How Screened Subnet Works:

In a screened subnet configuration, there are typically three network zones:

  1. 1. External Network: This zone represents the untrusted network, usually the internet, where potential threats and attacks may originate.
  2. 2. Screened Subnet (DMZ): The DMZ serves as an intermediary zone between the external network and the internal trusted network. It contains servers and services that need to be accessible from the internet, such as web servers, email servers, and public-facing applications.
  3. 3. Internal Network: The internal network is the trusted zone where an organization's critical data and resources reside. It is protected from direct external access by the DMZ.

The DMZ acts as a buffer zone between the external network and the internal network. It contains firewall systems that filter and inspect incoming traffic before allowing it to pass through to the internal network. This screening process helps to block potentially malicious traffic and protect the internal network from direct exposure to external threats.

Benefits of Screened Subnet:

The use of a screened subnet architecture offers several security benefits, including:

Considerations and Best Practices:

When implementing a screened subnet, it's essential to consider the following best practices: