And since you are an CCNA, and asking more to learn, I should offer a little more…
Over time, many firewall vendors have added a DMZ port to their firewalls. In these cases, it hard to generalize about whether something is “behind” the firewall, in front of it, or simply beside it.
But what can be said generally, is that the DMZ is a segment which receives less security than the internal network. It is where you normally would place servers that are intended to be accessed from the Internet, such as a mail server or web server.
This helps with configuring policy on the firewall. You might deny all web requests to the internal network, but allow all web requests to the DMZ (from internal or Internet). You may deny all management port requests from the Internet, and allow management port requests from the Internal networks.
But since DMZ hosts are more subject to attack and compromise, you would probably limit their ability to initiate requests into the internal network.
Hope that helps.
k2dave, I’m not surprised to learn that the Linksys device calls itself a firewall. I simply call that marketing. Since it does NAT (network address translation), and some people (not me) consider that a firewall function, they get away with it. There isn’t a standard definition of “firewall” in the industry, so I may be a bit harsh.
For me, a firewall doesn’t even need to perform NAT, but it must do one of two things: 1) stateful inspection, or 2) proxy. In one sense, the Linksys does maintain state (for port forwarding, for example), but doesn’t maintain state for the purpose of inspecting the contents of packets and rejecting packets that fail some configured policy. And it is unlikely to be acting as a proxy server for you.
If you post the model number, I’d be glad to look up some of its specific functionality. I’m no expert on the Linksys product line, maybe they’ve added a true firewall (but I doubt it).