Export (0) Print
Expand All
0 out of 3 rated this helpful - Rate this topic

How to Set Up a Front-End and Back-End Topology with a Front-End Server in a Perimeter Network

 

Topic Last Modified: 2005-05-24

You can create a front-end and back-end topology with a front-end server in a perimeter network. The following figure illustrates the front-end and back-end scenario with a front-end server in a perimeter network. In this scenario, you place the front-end server between the Internet firewall and the internal firewall.

Front-end server in Perimeter Network

Before you perform the procedure in this topic, it is important that you first read the following:

  1. Configure the outer (Internet) firewall for a firewall in this environment, limiting access to only the ports required and to only the designated front-end server.

  2. Configure the inner (intranet) firewall to have certain ports open to support authentication, DNS, and Active Directory access. The exact list depends on the balance of security and features that each corporation chooses.

For information about how to configure Internet and intranet firewalls, see Configuring Firewalls.

 
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft. All rights reserved.