How to Set Up a Front-End and Back-End Topology with a Front-End Server in a Perimeter Network


Topic Last Modified: 2005-05-24

You can create a front-end and back-end topology with a front-end server in a perimeter network. The following figure illustrates the front-end and back-end scenario with a front-end server in a perimeter network. In this scenario, you place the front-end server between the Internet firewall and the internal firewall.

Exchange front-end server in a perimeter network

Front-end server in Perimeter Network

Before you perform the procedure in this topic, it is important that you first read the following:

  1. Configure the outer (Internet) firewall for a firewall in this environment, limiting access to only the ports required and to only the designated front-end server.

  2. Configure the inner (intranet) firewall to have certain ports open to support authentication, DNS, and Active Directory access. The exact list depends on the balance of security and features that each corporation chooses.

For information about how to configure Internet and intranet firewalls, see Configuring Firewalls.


Community Additions