28
particular computer on your local network. This computer becomes the DMZ host.
A virtual DMZ, however, should be used only in very specific situations. The computer that hosts the
virtual DMZ is fully exposed to the Internet, and is thus susceptible to malicious attacks and
unauthorized access. If a hacker were to upload a virus to the virtual DMZ, the virus could spread to all
the computers on your network.
Please click
Setting
button to enter into
Virtual DMZ
configuration:
Add
:
Clicking Add botton to step up the machine you want to transparent. The configuration will show
the place to let you fill the IP Address
.
Note: The ping command can
’
t be used to call the machine set to transparent mode.
Edit
:
select the IP transparented
,
clicking Edit to modify the IP Adderss. Remember to save after
changing.
Delete
:
select the IP transparented
,
clicking delete to remove the machine you don
’
t want to
transparent.
Return
:
Go back to the last page
.
Address Mapping vs. Virtual DMZ
The standard framework of the Intranet
The figure below is the simplest way to construct the intranet. User can access the single server used
public IP address provided by enterprise
Summary of Contents for IPX-1000
Page 1: ...Internet Telephony PBX System IPX 1000 User s manual ...
Page 35: ...31 ...