Copyright ©ZYCOO All rights reserved. V1.0
DMZ config:
In order to make some intranet equipment support better service for extranet, and make internal network security
more effectively, these equipment open to extranet need be separated from the other equipment not open to
extranet by the corresponding isolation method according to different demands. We can provide the different
security level protection in terms of the different resources by building a DMZ region which can provide the network
level protection for the equipment environment, reduce the risk which is caused by providing service to distrust
customer, and is the best position to put public information
The following chart describes the network access control of DMZ.
71
Need help?
Do you have a question about the CooFone-D30 and is the answer not in the manual?