O'Reilly logo

Microsoft® Lync® Server 2013 Unleashed Second Edition by Randy Wintle, Alex Lewis, David Ross, Tom Pacyk

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Back-to-Back Firewalls

The ideal approach to any perimeter network or DMZ is to utilize two different security devices such that one provides a layer of defense from the Internet to the perimeter network and the other provides another layer of defense by filtering traffic between the perimeter network and the internal network. The Lync Server Edge Servers are situated between the two firewalls in the perimeter network. This approach is illustrated in Figure 31.3.

Image

Figure 31.3. Back-to-back firewalls.

This configuration is generally considered the most secure because even if an attack compromises the external firewall, the internal firewall still ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required