we usually say.
DMZ config:
In order to make some intranet equipment support better service for extranet,
and make internal network security more effectively, these equipment open
to extranet need be separated from the other equipment not open to
extranet by the corresponding isolation method according to different
demands. We can provide the different security level protection in terms of
the different resources by building a DMZ region which can provide the
network level protection for the equipment environment, reduce the risk
which is caused by providing service to distrust customer, and is the best
position to put public information
The following chart describes the network access control of DMZ.
Содержание DW-310P
Страница 1: ......
Страница 48: ......
Страница 75: ...8 3 5 2 SOFTKEY SOFTKEY You can configure different functions in different screens for every softkey...
Страница 92: ...you need input user name and password again...