In what situation you might want to install a demilitarized zone DMZ on your network?

The Demilitarized Zone (DMZ) is a feature that allowsdevice in your network to be stripped off its external firewall and be exposed completely to the Internet.

 Do you need it?

 A DMZ helps electronic signals bypass strict firewall and router security and open all ports for faster delivery of data packets.  It is an easy way to enhance connectivity such as when you play online games, transfer files over the Internet, or create a website on your own server, and the like.

 The main disadvantage of a DMZ, however, is that it leaves a computer open to all, which may entail leaving data within it open to intruders.  You will need to proceed with the DMZ setup with caution.  You can use Port Forwarding as an alternative to DMZ as it creates a rule to open a certain port or a range of ports that receives only a specific data request.  To know more about Single Port Forwarding, click

here.

 IMPORTANT:  Below is the list of things to remember when enabling the DMZ feature in your Linksys router.

 
  • If you decide to use the IP Address, be sure to set up a static IP Address to the computer that you want to expose because its IP Address may change if set it to DHCP.  You can also specify by MAC Address.
  • Alternatively, if your router has a DHCP Reservation feature, you may also use it instead of setting up a static IP Address on your computer. 

To start setting DMZ, follow the procedure below.

 NOTE:  This feature is not available on the Linksys app.

Step 1:
Go to
https://www.linksyssmartwifi.com and log in to your Linksys cloud account.  

 NOTE:  You can also log in to the router's web interface by typing "http://192.168.1.1" in the browser's Address bar or whatever the IP Address of your router is.

Step 2:
On the Navigation pane under Router Settings, select Security.

 
Step 3:
On the Security screen, select DMZ from the tabs and toggle to the ON position to enable the DMZ feature.
 

In what situation you might want to install a demilitarized zone DMZ on your network?

 
Step 4:
Select the option for the Source IP Address and enter the correct values required.
 

First Option - If you want to allow any external computer to access the exposed computer, select Any IP Address.  This is best chosen if you are going to use your computer as the server and you have multiple users trying to access it. 

 Second Option - For a more secured DMZ setup, you can select the second option where you will be able to specify a range of IP Addresses that will only be allowed entry to the computer’s DMZ zone.  IP Addresses that are not in the range will not be allowed to connect.

 
Step 5:
Enter the Destination IP Address.  This is the IP Address of the computer you’ve set up for DMZ. 
 

 
Alternatively, you can also select the MAC Address radio button and manually enter the MAC Address of the computer you are setting up for DMZ.

 

Aside from manual entry, you can also automatically populate the MAC Address by clicking on the View DHCP Client Table button and clicking on the Select button of the corresponding Client MAC Address. 
 

 
The MAC Address of the device will be extracted and automatically placed on the fields available.
 

            Step 6:
            Once you’re done, click Apply to save the changes and then click Ok to exit.

Expanding your network

 The common usage of the DMZ feature is when users build a dedicated server on one of their computers in the home network to host a personal website, an FTP file server, or become a game server.  Because of the nature of these types of web servers, it needs to “face the public” and be completely open for all to access to.  Enabling a “demilitarized zone” on the exposed computer helps facilitate access to only that isolated device.  Just make sure that all your other connected devices in the network are also equipped with protective firewall and security.

Was this support article useful?

Additional Support Questions?

Search Again

When would you use a DMZ?

DMZ networks are often used for the following: isolate and keep potential target systems separate from internal networks; reduce and control access to those systems by external users; and. host corporate resources to make some of them available to authorized external users.

What is a DMZ and what would you put in it?

A DMZ is a physical or logical subnet that isolates a LAN from untrusted networks like the public internet. Any service that is offered to users on the public internet should be set up in the DMZ network. The external-facing servers, services, and resources are usually placed there.

What is a DMZ network and what types of systems would you expect to find on such networks?

A DMZ, short for demilitarized zone, is a network (physical or logical) used to connect hosts that provide an interface to an untrusted external network – usually the internet – while keeping the internal, private network – usually the corporate network – separated and isolated form the external network.

What is the most appropriate location and strategy for the DMZ and firewall implementation?

In fact, a DMZ should be placed behind a firewall, taking advantage of the protection that a firewall provides. The true benefit of a DMZ comes when you see how one is implemented. A DMZ is nothing more than a segment of your network that is isolated from the rest for the purpose of public use.