Documentation Index
Fetch the complete documentation index at: https://otoyinc.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
What is a DMZ?
A demilitarized zone (DMZ) is similar to a perimeter security to securely connect untrusted public-facing nodes to trusted internal network components. It is a standard network architecture feature rather than a service from a single provider. To establishing a DMZ, you must create distinct network segments that separate your private internal data from public-facing services. This is primarily achieved through hardware or software firewalls that manage traffic between three zones:- The Internet (untrusted)
- The DMZ (public services)
- The LAN (private/internal)
- DMZ Host Settings (simple) on RV110W by Cisco for small business routers and enterprise firewalls
- Cisco’s Subnet DMZ (secure) setups
- The FortiGate Administration Guide by Fortinet for creating DMZ interfaces and configuring “Virtual IPs” (port forwarding) to map public traffic to your isolated servers
- Palo Alto Network’s Zone-Based Security documentation for defining a “DMZ Zone” and applying specific security profiles to incoming traffic
- pfSense/OPNsense: These platforms use “Interfaces” and “Firewall Rules” to create a DMZ. Their official documentation (available via pfSense Docs) details how to isolate the DMZ from your LAN.
- OpenWrt: The OpenWrt Wiki provides a technical breakdown of using VLANs to create a DMZ on consumer-grade hardware.