beautypg.com

Epson VIGOR 3300 User Manual

Page 62

background image

Vigor3300 Series User’s Guide

58

Protocol

Select the transport layer protocol. It could be TCP, UDP, or

All for selection.

Public IP

Select an IP address (the selections provided here are set in IP

Alias List of Network >>WAN interface). Local host can use

this IP to connect to Internet.

If you want to choose any on of the Public IP settings, you must

specify some IP addresses in the IP Alias List of the

Static/DHCP Configuration page first. If you did not type in any

IP address in the IP Alias List, the Public IP setting will be

empty in this field. And when you click Apply, a message will

appear to inform you.

Private IP

Assign an IP address or a subnet to be compared with the

source IP address for incoming packets.

Subnet Mask

Select a value of subnet mask for private IP address.

Click Apply to reboot the system and apply the settings.

By the way, user can click Delete to remove one current existed NAT entry in the Advanced –

NAT – Address Mapping page and click Delete All to remove all entries.

D

D

M

M

Z

Z

H

H

o

o

s

s

t

t

In computer networks, a DMZ (De-Militarized Zone) is a computer host or small network

inserted as a neutral zone between a company’s private network and the outside public

network. It prevents outside users from getting direct access to company network. A DMZ is

an optional and more secure approach to a firewall and effectively acts as a proxy server as

well. In a typical DMZ configuration for a small company, a separate computer (or host in

network terms) receives requests from users within the private network for access to Web sites

or other companies accessible on the public network. The DMZ host then initializes sessions

for these requests on the public networks. However, the DMZ host is not able to initiate a

session back into the private network. It can only forward packets that have already been

requested. Users of the public network outside the company can access only the DMZ host.

The DMZ may typically also have the company’s Web pages so these could be served to

the outside world. If an outside user penetrated the DMZ host’s security, only the Web pages

will be corrupted but other company information would not be exposed.