ZXDSL 931WII Operation manual
Note:
A DMZ host is not protected by the firewall and may be vulnerable
to attack. This may also put other computers in the home net work
at risk. Hence, when designating a DMZ host, you must consider
the security implications and protect it if necessary.
You can set up a client in your local network to be the DMZ host,
as shown in
F
i
g
u
r
e
1
1
7
.
F
IGURE
117 DMZ
HOST
Your device then forwards all incoming data traffic from the Inter-
net to this client.
You can, for example, operate your own Web
server on one of the clients in your local network and make it ac-
cessible to Internet users. As the exposed host, the local client is
directly visible to the Internet and therefore particularly vulnera-
ble to attacks (for example, hacker attacks). Activate this function
only when necessary (for example, to operate a Web server) and
when other functions (for example, port forwarding) are inade-
quate. In this case, you should take appropriate measures for the
clients concerned.
90
Confidential and Proprietary Information of ZTE CORPORATION