Few applications truly require the use of the DMZ host. Following are examples of when a DMZ host
might be required:
•
A host needs to support several applications that might use overlapping ingress ports such that
two port forwarding rules cannot be used because they would potentially be in conflict.
•
To handle incoming connections that use a protocol other than ICMP, TCP, UDP, and IGMP
(also GRE and ESP, when these protocols are enabled by the PPTP and IPSec ALGs ).
Enable DMZ
Putting a computer in the DMZ may expose that computer to a variety of security risks. Use of this
option is only recommended as a last resort.
DMZ IP Address
Specify the LAN IP address of the LAN computer that you want to have unrestricted Internet
communication.
30