Planning for External User Access

Communications Server 2007 R2

Topic Last Modified: 2009-01-24

This section describes what is required to enable external user access, including the components to be deployed, supported topologies, requirements, and recommended deployment process.

You should deploy your perimeter network after you deploy your internal Enterprise pools or Standard Edition servers, but before you deploy any other features that support or rely on external user access.

Community Additions