Version 2.1 (May 2016)
48
6.7. Configure DMZ
After DMZ is enabled, the computer that is configured as a DMZ host is exposed to the
Internet. For example, when building a server, you can configure the computer providing
external services as a DMZ host, which helps protect other computers on the home
network.
1.
Log in to the web management page.
2.
Choose
Internet
tab.
3.
In the navigation tree, choose
Network Security
.
4.
Select the
DMZ
configuration page.
5.
In
Host address
, select the device that you want to act as a DMZ host, or click
Add
device
to add a new DMZ host.
6.
Set
Enable DMZ
to enable the capability.
7.
Click
Save
.
Picture 6-17 DMZ
6.8. Configure Application Filter
To enable the application filter function on a specified computer, you can block network
attacks from applications to the specified computer.
1.
Log in to the web management page.
2.
Choose
Internet
tab.
3.
In the navigation tree, choose
Network Security
.
4.
Select the
Application Filter
configuration page.
5.
Click
New application filter
.