From: Linea Recta on
"Jack [MVP-Networking]" <jack(a)discussiongroup.com> schreef in bericht
news:uvtY82BkKHA.6096(a)TK2MSFTNGP02.phx.gbl...
> Hi
> The DMZ configuration save one step in the setting of a server by
> bypassing the need to open ports through the Router's Firewall. It take a
> little time to learn how to open ports.
> People who can Not learn, or are too lazy to, solve the need for port
> opening by using the DMZ.
> DMZ puts the computer in front of the Router's NAT Firewall. As a result
> the computer is connected directly to the Internet and have No protection.
> About port opening through a router, http://www.ezlan.net/routers1.html
> Jack (MS, MVP-Networking).


Thanks very much for the link Jack. I'll have a look at it asap.



--
regards,

|\ /|
| \/ |@rk
\../
\/os


From: Linea Recta on
"VanguardLH" <V(a)nguard.LH> schreef in bericht
news:hi5vhc$uvh$1(a)news.albasani.net...
> Linea Recta wrote:
>
>> From other users I understood not to use DMZ as it is a security hazard.
>> Of course I'd like more advice on how to do that. I'm novice with subnets
>> and other mysterious router options...
>
> DMZ might mean different things to different users. It depends on the
> features available in your router. I used to have one where any host that
> was connected to the router but allocated to the DMZ meant that host
> (which
> is my host) could not connect to any of my other hosts (outside the DMZ).
> That meant any attack at that DMZ host couldn't result in a compromised
> host
> getting connected to my other hosts.


Hi,
I'm using a Sitecom WL-174, which came with a brief manual, describing (some
of) the settings:
http://www.sitecom.com/support-product/productid/538#manuals


By now I've been able to solve the changing internal IP issue with
information from this web site:
http://www.portforward.com/networking/static-xp.htm



>
> Below is the description of the DMZ feature in my Linksys router:
>
> DMZ Host
> The DMZ Host setting can allow one local PC to be exposed to the
> Internet.
> If a local user wishes to use some special-purpose service such as an
> Internet game or video-conferencing, Enable DMZ, fill in the IP address,
> and click the Save Settings button. Select Disable for DMZ, deactivates
> this feature. When enabling this setting, the Router firewall protection
> of the local DMZ host will be disabled.
>
> Because you are opening the host to Internet access, the router's firewall
> is not applied. The host is open to external connections so you don't
> need
> to use port forwarding. Obviously this needs to be a hardened host.
>
> What I have not tested with this router's implementation of DMZ is if it
> will block all communications between a DMZ host and all other hosts,
> hubs,
> or switches connected to that router. For any DMZ host, I don't want it
> to
> connect to or from any other host connected to that same router. If a
> host
> in the router's DMZ wasn't isolated from all other hosts connected to that
> same router, I wouldn't use that router's DMZ feature. Basically you
> would
> have a local untrusted network that you don't want to let connect to any
> hosts in your trusted network. If the router isn't capable of effective
> DMZ
> management then I'd not bother using it (and instead use a router
> appliance,
> or gateway host with a better firewall, to manage the DMZ and non-DMZ
> hosts).
>
> http://en.wikipedia.org/wiki/DMZ_(computing)



Thanks for the info. I'll do my homework asap.



--
regards,

|\ /|
| \/ |@rk
\../
\/os