O'Reilly logo

Microsoft® Lync® Server 2013 Unleashed Second Edition by Randy Wintle, Alex Lewis, David Ross, Tom Pacyk

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Three-Legged Firewall

A three-legged firewall approach can be used when it is not feasible to have two physically separate firewall devices separating traffic from the different network segments. Typically, a smaller organization does not have or want to manage a back-to-back firewall, so a single device is used instead to logically construct the same functionality as a back-to-back firewall provides. This single firewall device is generally at least three physical network interfaces or “legs” that are all connected to different networks: one to the public Internet, one to the perimeter network, and one to the internal network.

In this scenario, the Edge Server has two network adapters connected within the perimeter network, but these should ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required