DMZ config:
In order to make some intranet equipment support better service for extranet, and
make internal network security more effectively, these equipment open to extranet
need be separated from the other equipment not open to extranet by the
corresponding isolation method according to different demands. We can provide
the different security level protection in terms of the different resources by
building a DMZ region which can provide the network level protection for the
equipment environment, reduce the risk which is caused by providing service to
distrust customer, and is the best position to put public information
The following chart describes the network access control of DMZ.