The broad idea
First things first: let’s unpack Moxa’s original diagram on setting up a Demilitarized Zone (DMZ).

What we see above:
- Industrial Network – This is the operational core of a business, where manufacturing and control systems reside. It includes essential equipment like machines, robots, and production lines, which are critical for maintaining productivity and safety. Protecting this network is paramount, as it directly impacts the industrial process.
- Enterprise Network – The enterprise network covers the administrative side of the organization, including servers, employee workstations, and communication systems. Often directly connected to the Internet or Cloud, it supports business functions like project management, HR, and finance. Separation from the industrial network is crucial to maintain both security and operational efficiency, as internet access increases exposure to potential threats.
- DMZ (Demilitarized Zone) – The DMZ acts as a buffer between the industrial and enterprise networks, controlling and filtering the flow of data. Typically, it includes systems that need to communicate with both networks without holding critical operational data — such as data historians, SCADA gateways, and aggregation systems. By allowing controlled data exchange, the DMZ ensures only necessary information crosses between networks, keeping sensitive areas protected.
Key Questions About DMZ
Now that we understand the basic functionality of a DMZ, let’s explore some fundamental questions in more detail.
Question 1: Where Is the DMZ Physically Located?
The DMZ is not necessarily a physical location, such as a separate building, room, or floor. Instead, it’s a conceptual network segmentation.
For example, in a factory:
- Industrial Network hosts machines, robots, conveyors, and other production equipment.
- Enterprise Network hosts employee computers, HR, and financial systems.
The DMZ is the “buffer” between these two networks, reducing the likelihood of direct interaction between the enterprise network (or the Internet) and the industrial network. Physically, the DMZ might be implemented using a separate VLAN or isolated network segment, managed by industrial routers and firewalls.
Question 2: What Is Located Inside the DMZ, and Why Are Systems Like SCADA Gateways Placed There?
The DMZ typically hosts systems that need to interface with both the industrial and enterprise networks but are carefully designed to avoid exposing critical operational data.
For example:
- Data historians or SCADA gateways: These systems aggregate and transmit operational data to enterprise applications without exposing sensitive control functionalities.
- Data exchange: By locating data historians or gateways in the DMZ, critical production data can be securely shared with enterprise networks for reporting, monitoring, or analysis.
Why Not Place SCADA Systems Directly in the DMZ?
Placing SCADA systems directly in the DMZ is generally not recommended. Instead:
- SCADA systems remain in the industrial network to maintain control over critical operations.
- The DMZ serves as a secure zone for systems that interface with SCADA, ensuring operational data can be shared without risking exposure to external threats.
This approach enhances security by ensuring that critical systems are protected while enabling efficient data sharing.
Question 3: Why Is the DMZ Necessary, and What Happens Without It?
The DMZ is crucial for separating access levels and mitigating threats. Without a DMZ:
- Higher Risk of Breach: If the enterprise network is compromised (e.g., via phishing or malware), attackers could gain direct access to production systems, disrupting operations or causing accidents.
- Weaker Security Layers: A DMZ adds layers of security, making it much harder for attackers to reach critical systems.
In short, the DMZ acts as a “border zone,” protecting vital industrial systems while enabling secure data exchange.
Question 4: Complete Isolation vs. DMZ – Why Use a DMZ?
While full isolation might seem like the safest option, it’s not always practical or efficient. Here’s why:
- Data Access and Sharing: Modern businesses need real-time access to production data for decision-making, forecasting, and process optimization.
- Monitoring and Analytics: SCADA and monitoring systems need to transmit data safely without exposing industrial assets.
- Remote Support: Secure remote access allows technical support without costly on-site visits.
- Regulatory Compliance: Standards like IEC 62443 recommend DMZ implementation for network segmentation.
- Scalability: The DMZ allows flexible access adjustments as business needs evolve, avoiding costly infrastructure changes required by full isolation.
In essence, the DMZ strikes a balance between isolation and connectivity, enabling secure data sharing without compromising critical assets.
How Can the DMZ Be Strengthened with Moxa’s Secure Routers?
Moxa’s EDR and EDF Series secure routers enhance the DMZ’s effectiveness while aligning with IEC 62443 standards for industrial cybersecurity.
Key Features Include:
- Integrated Firewall: Controls data flow and enforces strict access policies.
- VPN Support: Enables secure communication between trusted networks.
- Advanced Traffic Management: Manages and monitors all data entering or leaving the DMZ.
These purpose-built devices are designed for industrial environments, offering a robust defense against unauthorized access and cyber threats. Moxa’s secure routers ensure that the DMZ functions as a reliable bridge for secure data exchange, safeguarding both industrial and enterprise networks.
To explore Moxa’s full range of secure network solutions, visit our dedicated page.
APulsar Technologies: Your Partner in Industrial Network and Security Solutions
At APulsar, we don’t just provide cutting-edge products; we offer end-to-end engineering services to design, plan, and implement robust industrial networks and security solutions tailored to your unique needs. Our expertise spans from creating secure architectures based on Defense-in-Depth principles to deploying technologies that ensure compliance with standards like IEC 62443.
Whether you need assistance with network segmentation, implementing firewalls and IDS/IPS, or integrating centralized management platforms like MXsecurity, our engineers provide hands-on support to ensure every layer of your network is optimized for both performance and security. With years of experience in industrial automation and OT cybersecurity, APulsar is your trusted partner for building secure, resilient infrastructures.

This is the heading
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.