Vigor2960 Series User’s Guide
161
Single Alias
– You have to type one IP address used for IP
Alias.
All
– All the IP address can be treated as IP Alias.
Alias
WAN IP alias that can be selected and used for port
redirection. Before using it, please go to
WAN>>General
Setup
and enable the
wan1
profile. Add several IP addresses
under
Static
mode for wan1.
Protocol
Choose the protocol used for the entry.
Public Port Start/
Public Port End
It is available when
Range to One
or
Range to Range
(port) or Range to Range (IP)
is selected as Port
Redirection Mode.
Type the starting/ending number of the public port.
For Range-to-One, set both Start and End values with the
same value.
Private IP
Specify the private IP address of the internal host providing
the service. Simply type the private IP used for this entry.
Private IP Start /
Private IP End
It is available when
Range to Range (IP)
is selected as Port
Redirection Mode.
Type the starting/ending IP address.
Private Port
Type a port number for such profile.
Apply
Click it to save and exit the dialog.
Cancel
Click it to exit the dialog without saving anything.
4.
Enter all of the settings and click
Apply
.
5.
A new profile has been added onto
Port Redirection
table.
4
4
.
.
4
4
.
.
2
2
D
D
M
M
Z
Z
H
H
o
o
s
s
t
t
In computer networks, a DMZ (De-Militarized Zone) is a computer host or small network
inserted as a neutral zone between a company’s private network and the outside public
network. It prevents outside users from getting direct access to company network. A DMZ is
an optional and more secure approach to a firewall and effectively acts as a proxy server as
well. In a typical DMZ configuration for a small company, a separate computer (or host in
network terms) receives requests from users within the private network for access to Web
sites or other companies accessible on the public network. The DMZ host then initializes
sessions for these requests on the public networks . However, the DMZ host is not able to
initiate a session back into the private network. It can only forward packets that have already
been requested. Users of the public network outside the company can access only the DMZ
host.
The DMZ may typically also have the company’s Web pages so these could be
served to the outside world.
If an outside user penetrated the DMZ host’s security, only the
Web pages will be corrupted but other company information would not be exposed.
Summary of Contents for Vigor2960
Page 1: ......
Page 11: ...Vigor2960 Series User s Guide 3...
Page 28: ...Vigor2960 Series User s Guide 20 This page is left blank...
Page 40: ...Vigor2960 Series User s Guide 32...
Page 66: ...Vigor2960 Series User s Guide 58 This page is left blank...
Page 125: ...Vigor2960 Series User s Guide 117 6 A new profile has been added onto Bind Table...
Page 176: ...Vigor2960 Series User s Guide 168...