Firewalls and blocked ports
There is a variety of possibilities regarding network and firewall configurations. Only some of typical firewall configurations are described. A user knowledgeable about networking can infer the required ports and protocol settings needed for more complex configurations.
Network configuration using a single firewall
The first firewall is located between the Internet and the internal network
This is the first line of protection from the world wide web. All information passed through the Content Manager web sites or web services are based on the HTTPS protocol.
The techniques described in the section for HTTPS (SSL) could be required depending on the task of the Content Manager server.
Network configuration using two firewalls
The first firewall is located between the Internet and the DMZ as described above and the second is located between the DMZ and the intranet
The second line of protection protects servers which are open to the general public from the more critical company intranet servers. The zone between the first and second line of protection is also called the DMZ (DeMilitarized Zone).
- SMTP - when SMTP communication is required
- Database engines
- Microsoft SQL Server access is required
- Oracle database access is required
- HTTP(S)