Copyright ©ZYCOO All rights reserved. V1.0
71
DMZ config:
In order to make some intranet equipment support better service for extranet, and make internal network security
more effectively, these equipment open to extranet need be separated from the other equipment not open to
extranet by the corresponding isolation method according to different demands. We can provide the different
security level protection in terms of the different resources by building a DMZ region which can provide the network
level protection for the equipment environment, reduce the risk which is caused by providing service to distrust
customer, and is the best position to put public information
The following chart describes the network access control of DMZ.
Содержание CooFone-D30
Страница 1: ......
Страница 38: ...Copyright ZYCOO All rights reserved V1 0 34 ...
Страница 52: ...Copyright ZYCOO All rights reserved V1 0 48 ...