DMZ config
:
In order to make some intranet equipments support better service for extranet,
and make internal network security more effectively, these equipments open to
extranet need be separated from the other equipments not open to extranet by
the corresponding isolation method according to different demands. We can
provide the different security level protection in terms of the different resources
by building a DMZ region which can provide the network level protection for
the equipments environment, reduce the risk which is caused by providing
service to distrust customer, and is the best position to put public information
The following chart describes the network access control of DMZ.