Routing and WAN connections
BAT54-Rail/F..
Release
7.54
06/08
11.5
Demilitarized Zone (DMZ)
381
11.5.3 Address check with DMZ and intranet
interfaces
To shield the DMZ (demilitarized zone) and the Intranet from unauthorized
attacks, you can activate an additional address check for each interface us-
ing the firewall's Intrusion Detection System (IDS).
The relevant buttons are called 'DMZ check' or 'Intranet check' and can have
the values 'loose' or 'strict':
D If the button is set to 'loose', then every source address is accepted if the
BAT is addressed directly.
D If the switch is set to 'strict', then a return route has to be explicitly avail-
able so that no IDS alarm is triggered. This is usually the case if the data
packet contains a sender address to which the relevant interface can also
route data. Sender addresses from other networks to which the interface
cannot route, or sender addresses from its own address range therefore
lead to an IDS alarm.
Note: For all devices, the default is 'loose'. The default is set to 'strict' for BAT
7011 VPN only, as a more precise address check has already already
been used for this device.
Configuration with LANconfig
You will find the button for activating the DMZ and Intranet address check in
LANconfig in the 'TCP-IP' configuration area on the 'General' tab page.