Operation Manual

2.1.3 DMZ Hosting
DMZ (De-militarized Zone) hosting (also commonly referred to as ¡Exposed Host¡) allows
you to specify the ¡default¡ recipient of WAN traffic that NAT is unable to translate to a
known local PC. This can also be described as a computer or small sub-network that sits
between the trusted internal private LAN and un-trusted public Internet. The DMZ Host
page is shown below.
You may configure one PC to be the DMZ host. This setting is generally used for PC¡s
using ¡problem¡ applications that use random port numbers and do not function correctly
with specific port triggers or port forwarding setups mentioned earlier.
If a specific PC is set as a DMZ Host, remember to set this back to ¡0¡ when finished with
the needed application, since this PC will be effectively exposed to the public Internet,
though still protected from Denial of Service (DoS) attacks via the Firewall.
Enter the computer's IP address and click "Apply" to activate the DMZ host.
Clear the IP address field and click "Apply" to deactivate the DMZ host.
With some problem applications (using random port numbers that may be undefined), the
user may have to DMZ the Specific Host PC in order to get the application to work correctly.
This allows a guarantee that any application can work behind the firewall/NAT application
in the DV-2010.