Back-to-Back Firewalls

The ideal approach to any perimeter network or DMZ is to utilize two different security devices where one provides a layer of defense from the Internet to the perimeter network and the second provides another layer of defense by filtering traffic between the perimeter network and internal network. The Lync Server Edge Servers are situated between the two firewalls in the perimeter network. This approach is illustrated in Figure 27.4.

Figure 27.4 Back-to-Back Firewalls

image

Tip

This configuration is generally considered the most secure because even if an attack compromises the external firewall, the internal firewall still isolates ...

Get Microsoft® Lync Server 2010 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.