EasyManua.ls Logo

ActionTec C3000A - IPv6 DMZ Hosting

ActionTec C3000A
48 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
25
Configuring Firewall Settings
Applications
Click Applications from any Firewall screen to generate the Applications
screen. This screen allows the user to designate certain applications to be
forwarded, circumventing the usual firewall security settings. If changes
are made in this screen, click Apply at the bottom of the screen to save
them.
DMZ Hosting
Click DMZ Hosting from any Firewall screen to generate the DMZ
Hosting screen. The DMZ host feature allows one device on the network
to operate outside the firewall to use an Internet service that otherwise
would be blocked, or to expose a networked device to all services without
restriction or security. To activate, click in the Enable radio button, then
type the device’s IP address in the appropriate text boxes.
Caution! A DMZ host is not protected by the firewall and may
be vulnerable to attack. Designating a DMZ host may also put
other computers in the local network at risk. When designating
a DMZ host, consider the security implications and protect it
if necessary.

Table of Contents

Related product manuals