Vigor3300 Series User’s Guide
66
Protocol
Select the transport layer protocol. It could be
TCP
,
UDP
, or
All
for selection.
Public IP
Select an IP address (the selections provided here are set in
IP
Alias List
of
Network >>WAN
interface). Local host can use
this IP to connect to Internet.
If you want to choose any on of the Public IP settings, you must
specify some IP addresses in the IP Alias List of the
Static/DHCP Configuration page first. If you did not type in any
IP address in the IP Alias List, the Public IP setting will be
empty in this field. When you click
Apply
, a message will
appear to inform you.
Private IP
Assign an IP address or a subnet to be compared with the
source IP address for incoming packets.
Subnet Mask
Select a value of subnet mask for private IP address.
Click
Apply
to reboot the system and apply the settings.
By the way, user can click
Delete
to remove one current existed NAT entry in the
Advanced –
NAT – Address Mapping
page and click
Delete All
to remove all entries.
D
D
M
M
Z
Z
H
H
o
o
s
s
t
t
In computer networks, a DMZ (De-Militarized Zone) is a computer host or small network
inserted as a neutral zone between a company’s private network and the outside public
network. It prevents outside users from getting direct access to company network. A DMZ is
an optional and more secure approach to a firewall and effectively acts as a proxy server as
well. In a typical DMZ configuration for a small company, a separate computer (or host in
network terms) receives requests from users within the private network for access to Web sites
or other companies accessible on the public network. The DMZ host then initializes sessions
for these requests on the public networks. However, the DMZ host is not able to initiate a
session back into the private network. It can only forward packets that have already been
requested. Users of the public network outside the company can access only the DMZ host.
The DMZ may typically also have the company’s Web pages so these could be served to
the outside world.
If an outside user penetrated the DMZ host’s security, only the Web pages
will be corrupted but other company information would not be exposed.
Summary of Contents for Vigor3300 Series
Page 1: ......
Page 152: ...Vigor3300 Series User s Guide 146 This page is left blank ...