To DMZ or not-DMZ on new web site

Someone asked on Server Fault:

We are about to release a web application for our users, and are trying to figure out if others put their servers in a DMZ, or just keep it off the domain behind the firewall and greatly restrict access via firewall rules? Has anyone here found any cons to just restricting access via firewall rules and O/S perms?

Note that this site is an ASP.NET MVC front-end with SQL Server back-end.

Also - this is an HR/Finance application, and the database back-end contains our most valuable data. From a security perspective, I’d rather give the world root access to intranet than allow access to the database server. As a result, my original plan was to skip using a DMZ and only opening up port 443 on the firewall to the web server … this seemed no worse than putting the db server on the DMZ with the web server.

I posted the following answer, which was chosen as the accepted answer and received 4 upvotes:

Typically, the configuration is like this:

Internet facing servers connected to Firewall's DMZ Port
Trusted servers (SQL, AD, etc) connected to Firewall's Trusted/LAN Port
Internet connected to Firewall's WAN port

Then, the Firewall is configured to route between those subnets, and allow access according to the ACLs you define.

Notable comments

Nate (0 upvotes): That said, you can get a LOT of throughput on a medium size firewall for a few thousand dollars.

Nate (0 upvotes): Yes. It does. You need an enterprise grade firewall if you expect to push lots of traffic through.


Originally posted on Server Fault — 4 upvotes (accepted answer). Licensed under CC BY-SA.

signed letter b

Dad. Geek. Gamer. Software developer. Cloud user. Old Car enthusiast.  Blogger.


Top Posts


profile for Nate on Stack Exchange, a network of free, community-driven Q&A sites
a proud member of the blue team of 512KB club
Thoughts, opinions, and ideas shared here are my own. © 2026 Nate Bross.