Vig Series User’s Guide
108
provided for widest compatibility. The default value is
PAP
.
The password will be encrypted in CHAP but not in PAP.
.
Service Name
Assign a service name required for some ISP services.
PPTP Local Address
Assign a local IP address.
PPTP Subnet Mask
Assign a subnet mask value of IP address.
PPTP Remote Address
Assign a remote IP address of PPTP server.
Detect Interval
Assign an interval time for detecting if the WAN connection
is on or off.
No-Reply Count
Assign detecting times to ensure the connection of the WAN.
After passing the times you set in this field and no reply
received by the router, the connection of WAN interface will
be regarded as breaking down.
Apply
Click
Apply
to go back to the WAN Interface Configuration
page. To apply all settings, click
Apply
on the WAN Interface
Configuration page and reboot your router.
Reset
Click this button to clear all the configurations for this page.
D
D
M
M
Z
Z
C
C
o
o
n
n
f
f
i
i
g
g
u
u
r
r
a
a
t
t
i
i
o
o
n
n
In computer networks, a DMZ (De-Militarized Zone) is a computer host or small network
inserted as a neutral zone between a company’s private network and the outside public
network. It prevents outside users from getting direct access to company network. A DMZ is
an optional and more secure approach to a firewall and effectively acts as a proxy server as
well. In a typical DMZ configuration for a small company, a separate computer (or host in
network terms) receives requests from users within the private network for access to Web
sites or other companies accessible on the public network. The DMZ host then initializes
sessions for these requests on the public networks. However, the DMZ host is not able to
initiate a session back into the private network. It can only forward packets that have already
been requested. Users of the public network outside the company can access only the DMZ
host.
The DMZ may typically also have the company’s Web pages so these could be
served to the outside world.
If an outside user penetrated the DMZ host’s security, only the
Web pages will be corrupted but other company information would not be exposed.
The service provider must provide the exact settings for this mode.
Содержание Vigor3300V+
Страница 1: ......
Страница 2: ...Vigor3300V Series User s Guide ii ...
Страница 18: ...Vigor3300V Series User s Guide 10 ...
Страница 219: ...Vigor3300V Series User s Guide 211 ...
Страница 229: ...Vigor3300V Series User s Guide 221 This page is left blank ...