1 minute read

Perimeter vs Segmentation vs DMZ

Network security is the protection of a network’s integrity . There are many strategies for that. Some of these are the following:

Perimeter security

The network perimeter is the boundary of the network, separating it from the Internet, which is then defined as a Not-trusted Zone. The zone inside the network perimeter can be a Trusted Zone or not (there might me another subnet).

Some security tools that can be implemented on the network perimeter are:

  • Firewalls.

  • Routers.

  • VPNs.

  • Intrusion Detection & Prevention Systems (IDS/IPS).

Network Segmentation

The process of network segmentation is the division of a network in logical segments with their own policy or security controls. These segments are then isolated from the other zones and enforce access control between them.

Some network segmentation’s methods are VLANs and DMZs.

DMZ

A DMZ (Demilitarized Zone) is a lightly protected subnet positioned between the internal network and the external internet or an internet-facing firewall. The DMZ normally hosts a public server (e.g. web server, mail server…) in an isolated network so it minimizes the risk of compromising the internal network.

Recap and diagram

The next diagram shows the interaction between the previous concepts.

diagram

Security perimeter Network segmentation DMZ Intranet
It separates our network from the Internet It divides the network into subnets. A subnet facing the Internet. Trusted private network.