Think of DMZ as the front yard of your house. It belongs to you and you may put some things there, but you would put anything valuable inside the house where it can be properly secured so it's a good idea to have zones with their security policies in a network.
the following link explain simple DMZ configuration by the Cisco PIX.
In the network world, things you want to allow people to access securely are put in a DMZ. A DMZ is typically defined on firewalls. You could put servers, load balancers, vpn concentrators, IDS sensors, network probes etc on a DMZ. Servers hosting Web, Mail, could either be put directly on the DMZ or behind a load balancer.
The firewall will protect access to these servers only on those ports that are permitted by the firewall.This will prevent any kind of attacks on those servers (other than through the ones that are already opened). Even if any of these devices are hacked, or affected by a virus, your internal network will be isolated from the DMZ network. This will help prevent spreading of the virus or the attack to other parts of your network.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...