Epson 3300 Network Router User Manual


 
Vigor3300 Series User’s Guide
58
Protocol Select the transport layer protocol. It could be TCP, UDP, or
All for selection.
Public IP Select an IP address (the selections provided here are set in IP
Alias List of Network >>WAN interface). Local host can use
this IP to connect to Internet.
If you want to choose any on of the Public IP settings, you must
specify some IP addresses in the IP Alias List of the
Static/DHCP Configuration page first. If you did not type in any
IP address in the IP Alias List, the Public IP setting will be
empty in this field. And when you click Apply, a message will
appear to inform you.
Private IP Assign an IP address or a subnet to be compared with the
source IP address for incoming packets.
Subnet Mask
Select a value of subnet mask for private IP address.
Click Apply to reboot the system and apply the settings.
By the way, user can click Delete to remove one current existed NAT entry in the Advanced –
NAT – Address Mapping page and click Delete All to remove all entries.
D
D
M
M
Z
Z
H
H
o
o
s
s
t
t
In computer networks, a DMZ (De-Militarized Zone) is a computer host or small network
inserted as a neutral zone between a company’s private network and the outside public
network. It prevents outside users from getting direct access to company network. A DMZ is
an optional and more secure approach to a firewall and effectively acts as a proxy server as
well. In a typical DMZ configuration for a small company, a separate computer (or host in
network terms) receives requests from users within the private network for access to Web sites
or other companies accessible on the public network. The DMZ host then initializes sessions
for these requests on the public networks. However, the DMZ host is not able to initiate a
session back into the private network. It can only forward packets that have already been
requested. Users of the public network outside the company can access only the DMZ host.
The DMZ may typically also have the company’s Web pages so these could be served to
the outside world. If an outside user penetrated the DMZ host’s security, only the Web pages
will be corrupted but other company information would not be exposed.