DMZ config:
In order to make some intranet equipment support better service for extranet,
and make internal network security more effectively, these equipment open to
extranet need be separated from the other equipment not open to extranet by the
corresponding isolation method according to different demands. We can
provide the different security level protection in terms of the different resources
by building a DMZ region which can provide the network level protection for
the equipment environment, reduce the risk which is caused by providing
service to distrust customer, and is the best position to put public information
The following chart describes the network access control of DMZ.
Содержание C58
Страница 45: ......
Страница 60: ......
Страница 71: ...8 3 5 2 SOFTKEY SOFTKEY You can configure different functions in different screens for every softkey ...