![Vonage V-Portal Скачать руководство пользователя страница 58](http://html.mh-extra.com/html/vonage/v-portal/v-portal_user-manual_1049192058.webp)
Vonage V-Portal User Guide
DMZ Host
A DMZ host is a network device that is visible directly from the public Internet. This device has
unrestricted access to and from the Internet. When enabling this service the firewall settings for
the DMZ host will be disabled.
A DMZ Host is often setup when running software applications that use random port numbers and
do not function correctly when using Port Forwarding or Port Triggering. This may be useful if a
user wants to use some special service such as an Internet game or videoconferencing. Use this
option with caution, as the device setup as a DMZ Host is exposed to the public Internet. If
possible use Port Forwarding. Port Forwarding is a more secure method because it only opens
the ports you want and not all the ports as in DMZ hosting.
Setting up a DMZ Host
To setup a DMZ Host:
From the home page, click on the Advanced Setup tab. The Port Setting screen will be
displayed. The DMZ Host section is at the bottom of that screen:
•
Enter
the
DMZ Address – the IP Address of the device you want to have complete
access to and from the Internet.
•
Click
Apply
NOTE: Remember to disable the DMZ host when the application that needed it is no longer
the MAC address is a unique 12-digit hexadecimal number that identifies a
interface. Just as your social security number uniquely identifies you, a MAC address
tifies a hardware interface on a network. All hardware components in a network
ly let that particular device connect to the Internet
Ps to know who is accessing their service. It also allows them to restrict
do not have MAC addressed registered with the ISP.
ster your MAC address and your Vonage device will be directly
If your ISP does not require you to register your MAC Address or you are installing
our Vonage device behind your existing router, then there is no need to clone or spoof your
.
running.
Ethernet Options
In a network,
hardware
niquely iden
u
including routers, cards, printers, gaming consoles and adapters have MAC addresses.
When you sign up for Internet service some ISPs register the MAC address of the device
(com ut
you will be using and on
p er or router)
service This allows t
.
he IS
access from devices that
I
c
f your ISP required you to regi
onnected to your modem, then you will need to perform ‘MAC Cloning’ or ’MAC Spoofing’. This
will essentially copy the MAC address you registered with the ISP onto the Vonage device, so
you can avoid a call to your ISP to change the registered MAC address to the Vonage V-Portal's
MAC address.
y
MAC address
View the Terms of Service by visiting the Vonage website at www.vonage.com/tos. Pay particular attention to
Section 11 which explains limitations on Warranty, Remedy and Liability.
58