<Table> <Tr> <Td> </Td> <Td> This article includes a list of references, but its sources remain unclear because it has insufficient inline citations . Please help to improve this article by introducing more precise citations. (April 2010) (Learn how and when to remove this template message) </Td> </Tr> </Table> <Tr> <Td> </Td> <Td> This article includes a list of references, but its sources remain unclear because it has insufficient inline citations . Please help to improve this article by introducing more precise citations. (April 2010) (Learn how and when to remove this template message) </Td> </Tr> <P> In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external - facing services to an untrusted network, usually a larger network such as the Internet . The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external network node can access only what is exposed in the DMZ, while the rest of the organization's network is firewalled . The DMZ functions as a small, isolated network positioned between the Internet and the private network . </P> <P> The name is derived from the term "demilitarized zone", an area between nation states in which military operation is not permitted . </P>

Where is the dmz located on a network