Answer Posted / rajiv dikshit
In computer networking, DMZ is a firewall configuration for
securing local area networks (LANs).
In a DMZ configuration, most computers on the LAN run
behind a firewall connected to a public network like the
Internet. One or more computers also run outside the
firewall, in the DMZ. Those computers on the outside
intercept traffic and broker requests for the rest of the
LAN, adding an extra layer of protection for computers
behind the firewall.
Traditional DMZs allow computers behind the firewall to
initiate requests outbound to the DMZ. Computers in the DMZ
in turn respond, forward or re-issue requests out to the
Internet or other public network, as proxy servers do.
(Many DMZ implementations, in fact, simply utilize a proxy
server or servers as the computers within the DMZ.) The LAN
firewall, though, prevents computers in the DMZ from
initiating inbound requests.
DMZ is a commonly-touted feature of home broadband routers.
However, in most instances these features are not true
DMZs. Broadband routers often implement a DMZ simply
through additional firewall rules, meaning that incoming
requests reach the firewall directly. In a true DMZ,
incoming requests must first pass through a DMZ computer
before reaching the firewall.
| Is This Answer Correct ? | 6 Yes | 0 No |
Post New Answer View All Answers
Hi Guys, Can some please tell me which is the best institute for network protocol (l2 l3 l4 ) stack development in Noida.
What is SDP? Which signaling protocols use it?
Explain Protocols?
Give the name of protocol that is used by DNS name servers?
How to send XAML file on server using HTTP protocol?
• Brief me about yourself? • What are your day to day job roles /responsibilities? • What is the through put of 3560 POE switch? • What is POE switch? • How will you configure VLAN in a new switch? • What is NAT? • Different types of NAT? • Difference between NAT & PAT? • Explain with diagram how you can access a PC on internet; will NAT come into picture, how? • How many physical ports are there in PIX 515E? Are they Ethernet of gigabyte? • What is difference between ASA5510 & ASA5550?How many ports are there • Explain any client network topology? • How will you configure a new firewall, parameters for configuration? • What is HSRP? • If a link is down what status will be the interface be in? • How good are you in SWITCHING ,rate yourself between 1 to 5 • What is VLAN • Avaya IP Phone, separate required? • Configuration for DATA and VOICE VLAN? • What is VTP? • Modes of VTP • Can we have more than 2 VTP servers in a single VTP domain? • What is STP? • How STP works? • How is Root Bridge elected? • Which priority is considered, highest or lowest? • Difference between STP & RSTP? • Modes of STP? • By default which mode of STP is there? • By default which mode of VTP is there? • In firewall which security level is what? • What is DMZ? • What is ether channel?
What are protocols? What are they used for?
What is ftp used for?
Hi I have 10+ years of telecom application development experience ( telecom billing product -call control (ISUP/INAP/CAMEL call handling), short message routing application, telecom tools development). I am very strong in C++/Unix , core java and advanced oops design. Recently I have undergone a training in 3G mobile protocol developement. I have very good knowledge about WCDMA, its various layers and gone through 3GPP technical specs. Now I am looking for 3G mobile development opportunities. I am finding very difficult to get it, as I don't have the relevant experiences on 3G development. Please advice me on this to enter into mobile protocol development.
What is the difference between http and https?
How do I transfer files using ftp?
What is HTTP and can you list few protocols with explanations?
What is a default gateway?
What does ftp stand for?
What is protocol extension?