22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The user can also connect to Lotus Sametime-powered meeting capabilities in<br />

this phase. The user can attend online meetings, and schedule meetings without<br />

being prompted to log in again. The user can even launch the Sametime “Java<br />

Connect” client to chat with other users within the <strong>Redbooks</strong> company, and not<br />

be prompted for authentication.<br />

Figure 13-4 QuickPlace Server<br />

Finally, the user can connect directly to the QuickPlace capabilities provided in<br />

this phase as well. The user can also create QuickPlace and manage his<br />

QuickPlace without being prompted for authentication.<br />

The overall solution in this phase is referred to as a “single zone architecture.”<br />

<strong>Redbooks</strong>Co only has one network zone which is their corporate, or private,<br />

zone. They have no presence on the Internet, and all servers can only be<br />

reached while connected to the corporate LAN. This provides the best security<br />

since all servers are shielded from the Internet. The LAN is only vulnerable to<br />

internal security attacks.<br />

13.3 Stage 2: Remote access to e-mail<br />

In the next phase it is determined that <strong>Redbooks</strong>Co employees often work from<br />

home and would like to be able to access their mail from the Internet. To support<br />

this, the <strong>Redbooks</strong>Co IT manager has decided to implement a firewall to keep<br />

the company’s internal servers protected. However, the IT manager is concerned<br />

with putting confidential data on the Internet and does not wish to have the data<br />

vulnerable to hackers and corporate spies.<br />

He decides the best way to give access to internal servers is via reverse proxy<br />

functionality. This will place the reverse proxy on only the Internet side of the<br />

firewall in a DMZ zone, as the reverse proxy has no internal data and only acts<br />

as a relay. The corporate servers will be placed behind the firewall, and only<br />

Chapter 13. Sample scenario described 585

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!