OxyGEN
mini
Office
Administrator’s Guide
DMZ Filters
A DMZ (DeMilitarized Zone) is a local subnet that can be accessed from the Internet and is usually used
to host Web servers, FTP servers etc. Being a local subnet, the Ethernet ports that are part of the DMZ
and the IP addressing scheme used for the DMZ subnet are configured, like for every LAN service, using
the relevant configuration options of the
Network
configuration menu (see page 69). From a security
point of view, however, the DMZ is treated like a semi-external network using public IP addresses and
kept totally separated from the Data, Voice and Video private LANs. To be more precise:
1. Connections from the Internet towards the DMZ are filtered through the firewall.
2. Connections from the DMZ towards the Internet are allowed and no NAT is applied.
3. Connections from the DMZ towards the LAN (private VLANs) are filtered through the firewall.
4. Connections from the LAN (private VLANs) towards the DMZ are allowed, but NAT is applied
hiding the internal IP addressing scheme.
The
DMZ Filters
sub-menu controls item 1 of the list above, through the configuration of the services
that are allowed to pass the firewall from the Internet towards the hosts in the DMZ.
Figure 9.7: Internet-to-DMZ Protocol Filters
From the list of services/protocols displayed, check the ones that should be allowed through the
firewall and click
Apply
to activate your settings.
Note
Entries corresponding to all allowed services/applications are automatically added to
the list of
IP Filters
, since the
DMZ Filters
functionality can be considered as a special case
of IP fltering. The
IP Filters
sub-menu gives the administrator the freedom to configure
more complex cases, whereas the
DMZ Filters
configuration page presents, in a simpler
form, only Internet
→
DMZ rules.
Gennet s.a.
100