Hello experts-
My company's security folks would like to know what are the common configs (very simplified/general) that on-premise companies are actually using?
Example 1:
Zone | Components |
---|---|
External (untrusted) | [Client PC] -> [F5 Big-IP Reverse Proxy] |
DMZ (partially trusted) | [SAP Enterprise Portal] |
Internal (trusted) | [Load balancer], [ESO app server], [ESO DB], [SRM app server], [SRM DB] |
or
Zone | Components |
---|---|
External (untrusted) | [Client PC] -> [F5 Big-IP Reverse Proxy] |
DMZ (partially trusted) | [SAP Enterprise Portal], [Load balancer], [ESO app server], [ESO DB], [SRM app server], [SRM DB] |
Internal (trusted) |
or ????
Zone | Components |
---|---|
External (untrusted) | |
DMZ (partially trusted) | |
Internal (trusted) |
I'm specifically interested in how often a 3rd party reverse proxy is used (such as F5) and the typical zone locations of the app servers.
Thanks in advance.
Mike
PS This isn't a RTFM situation. I know where to find the documentation. Looking for real world info... :-)