Get started with AVEVA DMZ Secure Link
- Last UpdatedJul 15, 2025
- 1 minute read
The following examples are suggested high level architectural layouts for setting up DMZ Secure Link for an existing network.
Example 1
In this example, separate control and business networks each have a secure firewall. The two firewalls are separated by a DMZ. DMZ Secure Link is installed on a computer in the DMZ, and is allowed direct access to the internet. Requests from the control network are allowed through the firewall to DMZ Secure Link, which blocks any requests that are not on the allowlist.

Example 2
In this example, the control and business networks are separated by a firewall. DMZ Secure Link is installed on a computer connected to the business network, and all requests on the business network are filtered through an existing proxy server for security. Requests from the control network are allowed through the firewall to DMZ Secure Link, which blocks any requests that are not on the allowlist, and forwards the allowed requests to the optional proxy server.
