O'Reilly logo

Microsoft® Lync Server 2010 Unleashed by Tom Pacyk, Andrew Abbate, Alex Lewis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Three-Legged Firewall

A three-legged firewall approach can be used when it is not feasible to have two physically separate firewall devices separating traffic from the different network segments. Typically, a smaller organization does not have or want a back-to-back firewall, so a single device is used instead to logically construct the same functionality as a back-to-back firewall provides. This single firewall device is generally at least three physical network interfaces or “legs” that are all connected to different networks: one to the public Internet, one to the perimeter network, and one to the internal network. In this scenario, the Edge Server has all network adapters connected to the same network segment. Figure 27.5 shows the logical ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required