A good thing to consider is ISA Server. FE/BE is really only designed for
load distribution so having them both "inside" is fine with only ISA in DMZ.
Then just publish Exchange on ISA. I think Exchange needs to be a Secure NAT
Client.

Just MHO.

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Darin
Sent: Monday, December 09, 2002 5:24 PM
To: Exchange Discussions
Subject: DMZ Options


We are on in the process of planning an exchange migration from GroupWise.
We are looking at how the Front-End Design is going to be regarding OWA.
I have read the Front-End Server Whitepaper and it appears that the best
way is to have Users establish an SSL connection to a Front-End Server in
a DMZ having only port 443 open on the Inter Fireall, then have IPSEC
tunnel between the Front and Back-End Server having ports 51,50, 500/UDP
and 88TCP/UDP open on the Intra Firewall.

Another administrator had the idea of putting both Front and Back End
Servers on the Internal Network and instead putting in an apache server in
the DMZ and have the user create an SSL connection to the Apache Server,
and then have that Server do a mod-proxy SSL connection to the Front-End
Server.  Therefore only having port 443 open on the Inter and Intra
Firewall.

Is this a better design in regards to security?

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]


_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to