Prev: Wireless in a hotel room XP - Internet Explorer asks for user name
Next: Local Area Connection Network Cable Unplugged
From: Linea Recta on 8 Jan 2010 13:32 "Jack [MVP-Networking]" <jack(a)discussiongroup.com> schreef in bericht news:uvtY82BkKHA.6096(a)TK2MSFTNGP02.phx.gbl... > Hi > The DMZ configuration save one step in the setting of a server by > bypassing the need to open ports through the Router's Firewall. It take a > little time to learn how to open ports. > People who can Not learn, or are too lazy to, solve the need for port > opening by using the DMZ. > DMZ puts the computer in front of the Router's NAT Firewall. As a result > the computer is connected directly to the Internet and have No protection. > About port opening through a router, http://www.ezlan.net/routers1.html > Jack (MS, MVP-Networking). Thanks very much for the link Jack. I'll have a look at it asap. -- regards, |\ /| | \/ |@rk \../ \/os
From: Linea Recta on 8 Jan 2010 13:43
"VanguardLH" <V(a)nguard.LH> schreef in bericht news:hi5vhc$uvh$1(a)news.albasani.net... > Linea Recta wrote: > >> From other users I understood not to use DMZ as it is a security hazard. >> Of course I'd like more advice on how to do that. I'm novice with subnets >> and other mysterious router options... > > DMZ might mean different things to different users. It depends on the > features available in your router. I used to have one where any host that > was connected to the router but allocated to the DMZ meant that host > (which > is my host) could not connect to any of my other hosts (outside the DMZ). > That meant any attack at that DMZ host couldn't result in a compromised > host > getting connected to my other hosts. Hi, I'm using a Sitecom WL-174, which came with a brief manual, describing (some of) the settings: http://www.sitecom.com/support-product/productid/538#manuals By now I've been able to solve the changing internal IP issue with information from this web site: http://www.portforward.com/networking/static-xp.htm > > Below is the description of the DMZ feature in my Linksys router: > > DMZ Host > The DMZ Host setting can allow one local PC to be exposed to the > Internet. > If a local user wishes to use some special-purpose service such as an > Internet game or video-conferencing, Enable DMZ, fill in the IP address, > and click the Save Settings button. Select Disable for DMZ, deactivates > this feature. When enabling this setting, the Router firewall protection > of the local DMZ host will be disabled. > > Because you are opening the host to Internet access, the router's firewall > is not applied. The host is open to external connections so you don't > need > to use port forwarding. Obviously this needs to be a hardened host. > > What I have not tested with this router's implementation of DMZ is if it > will block all communications between a DMZ host and all other hosts, > hubs, > or switches connected to that router. For any DMZ host, I don't want it > to > connect to or from any other host connected to that same router. If a > host > in the router's DMZ wasn't isolated from all other hosts connected to that > same router, I wouldn't use that router's DMZ feature. Basically you > would > have a local untrusted network that you don't want to let connect to any > hosts in your trusted network. If the router isn't capable of effective > DMZ > management then I'd not bother using it (and instead use a router > appliance, > or gateway host with a better firewall, to manage the DMZ and non-DMZ > hosts). > > http://en.wikipedia.org/wiki/DMZ_(computing) Thanks for the info. I'll do my homework asap. -- regards, |\ /| | \/ |@rk \../ \/os |