Network Separation and the Demilitarized Zone

A firewall demilitarized zone (DMZ) separates industrial control networksClosed The portion of the control system network where process data is transferred, including Supervisory Control and Data Acquisition (SCADA) to Programmable Automation Controller (PAC) traffic and PAC to PAC traffic from enterprise and other external communication paths. Bounded by a firewall the DMZ provides a security layer to help protect the control room's operations network and the deeper control and device networks:

External requests and data terminate at controlled and dedicated servers and services within the DMZ. Requests and data from the control and operations networks terminate at servers and services in the DMZ. It allows no direct path of communication between the industrial control systems and the enterprise networks. For instance, industrial commands cannot travel from the enterprise to the control networkClosed The portion of the control system network where process data is transferred, including Supervisory Control and Data Acquisition (SCADA) to Programmable Automation Controller (PAC) traffic and PAC to PAC traffic, and industrial messages cannot travel from the control to the enterprise network.

Servers and services within the DMZ can include:

  • Data servers, for example, Historian that collect data from the supervisory control and data acquisition (SCADA) systems and share it with manufacturing execution systems (MES) or other reporting systems.

  • Patch management servers.

  • Proxy servers for web-connectivity or other protocols.

  • Remote authentication dial-in user service (RADIUS) and virtual private network (VPN) servers.

Some variations of the DMZ approach include a dedicated server or proxy within the DMZ to function as the sole conduit for communications between protected and external networks.

DMZ Guidelines

To provide higher levels of security with DMZs:

See Network Segmentation for details.

Last update - February 2026