Med DMZ menas (oftast, jag kan inte svara för alla tillverkare, Apple kallar det ju inte DMZ i AirPortarna t.ex.) ett internt IP dit _alla_ inkommande anrop skickas.
Nej, helt fel Ett DMZ är ett eget "nät" med adresser separerade från LAN som brandväggen kontrollerar/routar trafiken till/från.
"In the context of network security, a DMZ is a network segment that is separate from your trusted network, but it is protected from the Internet by the firewall. In addition, the firewall also protects the trusted network from the DMZ. The DMZ is typically used as the network where you put resources that the public (the Internet) can get to. For example a DMZ is commonly where you put Web, FTP, or Mail servers.
It is important to keep publicly available resources separate from your trusted network. Because these resources can be accessed by the public, they are more vulnerable to attack. If an attack on your publicly available server succeeds, having a DMZ can keep the attacker out of your most trusted network. Normally you can get to the DMZ from your trusted network, the public can get to the resources in the DMZ from the Internet, but the servers in the DMZ cannot get to your trusted network.
Here are the concepts behind the DMZ:
1. The servers in the DMZ should never be able to access the trusted network.
2. The public is allowed to get to the resources in the DMZ over specified ports.
3. The servers in the DMZ should not be allowed out to the Internet.
4. The trusted network is allowed to get to the DMZ over specified ports."