Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

demilitarized zone (DMZ)

Abbreviations / Acronyms / Synonyms:

DMZ

Definitions:

  An interface on a routing firewall that is similar to the interfaces found on the firewall’s protected side. Traffic moving between the DMZ and other interfaces on the protected side of the firewall still goes through the firewall and can have firewall protection policies applied.
Sources:
NIST SP 1800-21C under Demilitarized Zone (DMZ)
NIST SP 800-41 Rev. 1 under Demilitarized Zone (DMZ)

  3. An interface on a routing firewall that is similar to the interfaces found on the firewall’s protected side. Traffic moving between the DMZ and other interfaces on the protected side of the firewall still goes through the firewall and can have firewall protection policies applied.
Sources:
CNSSI 4009-2015 from NIST SP 800-41 Rev. 1

  A host or network segment inserted as a “neutral zone” between an organization’s private network and the Internet.
Sources:
NIST SP 800-44 Version 2 under Demilitarized Zone (DMZ)
NIST SP 800-45 Version 2 under Demilitarized Zone (DMZ)

  2. A host or network segment inserted as a “neutral zone” between an organization’s private network and the Internet.
Sources:
CNSSI 4009-2015 from NIST SP 800-45 Version 2

  1. Perimeter network segment that is logically between internal and external networks. Its purpose is to enforce the internal network’s Information Assurance (IA) policy for external information exchange and to provide external, untrusted sources with restricted access to releasable information while shielding the internal networks from outside attacks.
Sources:
CNSSI 4009-2015

  A network created by connecting two firewalls. Systems that are externally accessible but need some protections are usually located on DMZ networks.
Sources:
NIST SP 1800-21B under Demilitarized Zone (DMZ) from NISTIR 7711
NISTIR 7711 under Demilitarized Zone

  Perimeter network segment that is logically between internal and external networks. Its purpose is to enforce the internal network's information assurance policy for external information exchange and to provide external, untrusted sources with restricted access to releasable information while shielding thei internal networks from external attacks.
Sources:
NIST SP 1800-12b under demilitarized zone

  A perimeter network or screened subnet separating an internal network that is more trusted from an external network that is less trusted.
Sources:
NIST SP 1800-16B under Demilitarized Zone
NIST SP 1800-16C under Demilitarized Zone
NIST SP 1800-16D under Demilitarized Zone

  An interface on a routing firewall that is similar to the interfaces found on the firewall’s protected side. Traffic moving between the DMZ and other interfaces on the protected side of the firewall still goes through the firewall and can have firewall protection policies applied.
Sources:
NIST SP 800-82r3 under demilitarized zone from NIST SP 800-41 Rev. 1