Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

3
  • Any traffic in or out of a DMZ should pass through a firewall, else it is not really a DMZ. Devices in a DMZ are only semi-trusted. Allowing any direct access to your corporate network means they are just part of the corporate network, not in a DMZ. If something in the DMZ gets compromised, you need a firewall from it to your corporate network to buy time to either shut it down or remediate it. Commented Oct 17, 2024 at 15:34
  • Sure, fair enough. This is in a homelab deployment where my plex server is in the DMZ and my NAS is in a trusted vlan and I want to have 10Gbps file transfer to plex while keeping the rest of the traffic isolated. I would not do something like this in a corporate setting. Commented Oct 17, 2024 at 15:46
  • I'm more just wondering if this is possible in my deployment, which I admit is unusual because: I want a DMZ for the sake of learning how to set one up, but I also want 10Gbps SMB traffic between the DMZ and my NAS. In a corporate setting I would get a firewall with higher throughput. Just want to know if what I'm trying to do is possible, setting aside whether it's truly secure. Commented Oct 17, 2024 at 15:49