DMZ
DMZ
This is my internal network and there's lots of switches and there's lots of
computers and printers and scanners and all kinds of stuff here.
I am too lazy to show you all that so I'm just using a little half circle to
represent that.
These guys are all connected to one in this particular example a gateway router and
this router is also a firewall in this situation.
This is not an uncommon setup that you'll see with a lot of networks out there now.
What I want to do is I want to set up a minecraft server and I want to set up a web
server I want to have a Web site and I want to run all this myself.
Now to do that I need to do this in such a way that I can expose my mind craft
server and my web server to the public Internet.
Any time you have some number of computers that are exposed to the public Internet
that are separate from your private network we call that a DMZ or demilitarized
zone.
Now DMZ can manifest and a lot of different ways but I'm going to just give you a
couple of quick examples here.
Here's my web server and here's my minecraft server this is a switch that they're
connected to.
Remember this guy is also a router is I can set him up like this so that he's a
stateful firewall in here.
And any unsolicited stuff coming from the Internet is going to be blocked from my
private network but it'll be all redirected up to the this part of the network.
It usually is.
And this being a router and a firewall we can set up an ACL that allowed to do
exactly that.
Now keep in mind when I say these are exposed to the public Internet I'm not saying
they're just wide open.
For example if I wanted to do their job you to play with blocks so much.
So what we have here is a firewall set up where we have two firewalls with a DMZ in
the middle.
So what's taking place here is we have exposed to the Internet that we have our own
network ID in here and then a separate network ID out here.
In this case everything that's coming from my internal network has to go through
both routers and these are both firewalls too.
This firewall right here is completely exposed to the real Internet so we call him
a basti and host because any time where he's there's no protection on here.
He's the bast he knows he's the most hardened firewall that we have set up in our
network.
This guy's job is to protect the internal network like a normal firewall would.
Now if you have a little home Soho router a lot of times you'll see those little
setting there it says DMZ.
That's I mean technically it is a DMZ but it's a really awful DMZ because those
little home routers what they're saying is you pick one IP address and anything
that comes unsolicited from the Internet goes straight to that one device.
So technically it is a DMZ but it's a really really terrible DMZ and not something
that you'd want to use.
All right so we've got a DMZ set up that looks something like this.
Now I really want to protect these two servers here and what I want to do is watch
for bad guys and be able to track stuff.
And here we actually install software that's designed to emulate for example a web
server.
But the idea here is that we want bad guys to attack this guy.
So we call this fella a honeypot, honeypots are used for research honeypots are
used to if a bad guy gets through here.
We want to get him here first so we can stop potential attacks.
And there are powerful tools that we use honeypots all the time.
The next step from a honeypot is actually called a honeynet and tired of blocks
that I could actually put another whole network on here.
That's a little bit easier to get through than my main network and it does the same
job it's designed to monitor and capture bad guys and we would call that a honey
net.
So keep in mind there's a lot of ways to DMZ make sure you're comfortable with the
ones I've shown.