Page 96 / 198 Scroll up to view Page 91 - 95
ZXDSL 931WII Operation manual
Note:
A DMZ host is not protected by the firewall and may be vulnerable
to attack. This may also put other computers in the home net work
at risk. Hence, when designating a DMZ host, you must consider
the security implications and protect it if necessary.
You can set up a client in your local network to be the DMZ host,
as shown in
F
i
g
u
r
e
1
1
7
.
F
IGURE
117 DMZ
HOST
Your device then forwards all incoming data traffic from the Inter-
net to this client.
You can, for example, operate your own Web
server on one of the clients in your local network and make it ac-
cessible to Internet users. As the exposed host, the local client is
directly visible to the Internet and therefore particularly vulnera-
ble to attacks (for example, hacker attacks). Activate this function
only when necessary (for example, to operate a Web server) and
when other functions (for example, port forwarding) are inade-
quate. In this case, you should take appropriate measures for the
clients concerned.
90
Confidential and Proprietary Information of ZTE CORPORATION
Page 97 / 198
Chapter 8 NAT Configuration
Note:
Only one PC per public IP address can be set up as an exposed
host.
Adding A DMZ
Host
1.
Select
Advanced Setup > NAT > DMZ Host
to display the
interface as shown in
F
i
g
u
r
e
1
1
8
.
F
IGURE
118 DMZ
HOST
C
ONFIGURATION
2.
Enter the Local IP address of the PC in
DMZ Host IP Address
field, that is to be enabled as an exposed host.
3.
Click
Save/Apply
, a notice will be pop-up as shown in
F
i
g
u
r
e
1
1
9
.
F
IGURE
119 DMZ H
OST
C
ONFIGURATION
N
OTICE
4.
Click
OK
to save the configuration so that the changes can take
effect.
Removing A DMZ
Host
Clear
DMZ Host IP Address
field and click
Save/Apply
to deac-
tivate the DMZ host.
Confidential and Proprietary Information of ZTE CORPORATION
91
Page 98 / 198
ZXDSL 931WII Operation manual
This page is intentionally blank.
92
Confidential and Proprietary Information of ZTE CORPORATION
Page 99 / 198
C
h
a
p
t
e
r
9
Security Configuration
Security is an important function of DSL. It protects resources of a
private network from other networks, and prevents unauthorized
Internet users from accessing private networks connected to the
Internet.
All messages entering or leaving the intranet (that is,
the local network to which you are connected) must pass through
the security checks, which checks each message and blocks those
that do not meet the specific security criteria.
There are three basic types of security techniques, IP packet fil-
tering, circuit-level gateway and MAC frame filtering. 931WII sup-
ports MAC frame filtering only.
Table of Contents
Configure MAC Filtering Policy
.............................................
93
Configure MAC Filtering Rule
...............................................
95
MAC Filtering - Global Policy FORWARDED
.............................
96
MAC Filtering - Global Policy BLOCKED
.................................
97
Configure MAC Filtering
Policy
Select
Advanced Setup > Security > MAC Filtering
to display
the interface as shown in
F
i
g
u
r
e
1
2
0
.
F
IGURE
120 MAC F
ILTERING
O
VERVIEW
Confidential and Proprietary Information of ZTE CORPORATION
93
Page 100 / 198
ZXDSL 931WII Operation manual
Note:
MAC filtering is only effective on ATM PVCs or WAN services based
on PTM configured in Bridge mode.
T
a
b
l
e
1
8
is a description of the different options.
T
ABLE
18 MAC F
ILTER
P
OLICY
C
ONFIGURATION
O
PTIONS
Term
Description
Forward
All
MAC
layer
frames
are
for-
warded except those matching the
specified rules.
Blocked
All MAC layer frames are blocked
except those matching the speci-
fied rules.
Select the
Interface
that needs to change the change the filtering
policy, and click the
Change Policy
.
The interface policy is changed, as shown in
F
i
g
u
r
e
1
2
1
.
F
IGURE
121 MAC F
ILTERING
C
HANGE
P
OLICY
Caution:
Interface policy change will cause all defined rules for that inter-
face to be removed automatically.
You need to create new rules
for the new policy.
94
Confidential and Proprietary Information of ZTE CORPORATION

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top