O'Reilly logo

IBM WebSphere: Deployment and Advanced Configuration by Roland Barcia, Keys Botzum, Tom Alcott, Bill Hines

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Edge Topology

Let's begin by reviewing basic network topology and components. A basic topology, as shown in Figure 23-1, consists of the following (we have left out devices such as routers and switches because they are not relevant to our discussion):

  • Firewalls— There are normally two firewalls—an Internet-facing firewall, sometimes referred to as the domain firewall, and a rear firewall, referred to as the protocol firewall. The former generally only permits HTTP traffic on ports 80 and 443 (SSL) to come into the DMZ, and the latter ideally only permits traffic coming from the WAS HTTP plug-in (or other designated devices in the DMZ) on known ports/protocols to flow through to the backend “secure” zone.

  • DMZ— The area in between the domain and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required