29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

User<br />

Outside World DMZ Internal Network<br />

I<br />

N<br />

T<br />

E<br />

R<br />

HTTP/HTTPS<br />

R<br />

N<br />

E<br />

T<br />

Protocol Firewall<br />

DMZ secure<br />

Proxy<br />

System A<br />

Figure 5-7 Topology using a DMZ secure proxy server<br />

Cluster<br />

System B<br />

The following sections indicate the minimum software configuration steps you<br />

need to perform for the topology shown in Figure 5-7. In this example, we are<br />

assuming that the DMZ secure proxy is set up with security level HIGH and<br />

therefore supports only static routing.<br />

System A<br />

Perform the following steps to configure System A.<br />

1. Install the DMZ secure proxy software package.<br />

2. Create an <strong>Application</strong> <strong>Server</strong> Profile using the<br />

/profileTemplates/secureproxy template.<br />

Domain Firewall<br />

nodeagent<br />

<strong>Application</strong><br />

<strong>Server</strong> 1<br />

<strong>Application</strong><br />

<strong>Server</strong> 2<br />

<strong>Application</strong><br />

<strong>Server</strong> 3<br />

System C<br />

Deployment<br />

Manager<br />

Administrative<br />

agent<br />

Config-Only<br />

DMZ secure<br />

proxy<br />

Directory and<br />

Security<br />

Services<br />

Existing<br />

applications<br />

and data<br />

Chapter 5. Topologies 157

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!