Netgear FVL328 参照マニュアル

ページ / 234
Model FVL328 ProSafe High-Speed VPN Firewall Reference Manual Revision 2
WAN and LAN Configuration
4-7
May 2004, 202-10030-02
Setting Up a Default DMZ Server
Specifying a Default DMZ Server allows you to set up a computer or server that is available to 
anyone on the Internet for services that you haven't defined. There are security issues with doing 
this, so only do this if you're willing to risk open access. If you do not assign a Default DMZ 
Server, the router discards any incoming service requests that are undefined. 
The default DMZ server feature is helpful when using some online games and videoconferencing 
applications that are incompatible with NAT. The firewall is programmed to recognize some of 
these applications and to work properly with them, but there are other applications that may not 
function well. In some cases, one local PC can run the application properly if that PC’s IP address 
is entered as the default DMZ server.
Incoming traffic from the Internet is normally discarded by the firewall unless the traffic is a 
response to one of your local computers or a service that you have configured in the Ports menu. 
Instead of discarding this traffic, you can have it forwarded to one computer on your network. This 
computer is called the Default DMZ Server.
How to Assign a Default DMZ Server
1.
Click Default DMZ Server check box. 
2.
Type the IP address for that server. 
3.
Click Apply. 
Multi-DMZ Servers
This feature can only be used if your ISP has allocated you multiple fixed Internet IP addresses.
In this situation, you can define a separate DMZ server for each Internet IP address. To use the 
Multi-DMZ feature, follow this procedure for each Internet IP address: 
1.
Enable one of the Multi-DMZ checkboxes. 
2.
To the right of the checkbox, enter the Internet IP address assigned to you by your ISP. 
Note: 
For security, you should avoid using the default DMZ server feature. When a 
computer is designated as the default DMZ server, it loses much of the protection of the 
firewall, and is exposed to many exploits from the Internet. If compromised, the 
computer can be used to attack your network.