Epson 3300 manual DMZ Host, Subnet Mask

Models: 3300

1 158
Download 158 pages 27.76 Kb
Page 62
Image 62

Protocol

Select the transport layer protocol. It could be TCP, UDP, or

 

All for selection.

Public IP

Select an IP address (the selections provided here are set in IP

 

Alias List of Network >>WAN interface). Local host can use

 

this IP to connect to Internet.

 

If you want to choose any on of the Public IP settings, you must

 

specify some IP addresses in the IP Alias List of the

 

Static/DHCP Configuration page first. If you did not type in any

 

IP address in the IP Alias List, the Public IP setting will be

 

empty in this field. And when you click Apply, a message will

 

appear to inform you.

Private IP

Assign an IP address or a subnet to be compared with the

 

source IP address for incoming packets.

Subnet Mask

Select a value of subnet mask for private IP address.

Click Apply to reboot the system and apply the settings.

By the way, user can click Delete to remove one current existed NAT entry in the Advanced – NAT – Address Mapping page and click Delete All to remove all entries.

DMZ Host

In computer networks, a DMZ (De-Militarized Zone) is a computer host or small network inserted as a neutral zone between a company’s private network and the outside public network. It prevents outside users from getting direct access to company network. A DMZ is an optional and more secure approach to a firewall and effectively acts as a proxy server as well. In a typical DMZ configuration for a small company, a separate computer (or host in network terms) receives requests from users within the private network for access to Web sites or other companies accessible on the public network. The DMZ host then initializes sessions for these requests on the public networks. However, the DMZ host is not able to initiate a session back into the private network. It can only forward packets that have already been requested. Users of the public network outside the company can access only the DMZ host.

The DMZ may typically also have the company’s Web pages so these could be served to

the outside world. If an outside user penetrated the DMZ host’s security, only the Web pages will be corrupted but other company information would not be exposed.

58

Vigor3300 Series User’s Guide

Page 62
Image 62
Epson 3300 manual DMZ Host, Subnet Mask