Documentation Center

Firewalls and blocked ports

There is a variety of possibilities regarding network and firewall configurations. Only some of typical firewall configurations are described. A user knowledgeable about networking can infer the required ports and protocol settings needed for more complex configurations.

Network configuration using a single firewall

The first firewall is located between the Internet and the internal network

This is the first line of protection from the world wide web. All information passed through the Content Manager web sites or web services are based on the HTTPS protocol.

The techniques described in the section for HTTPS (SSL) could be required depending on the task of the Content Manager server.

Network configuration using two firewalls

The first firewall is located between the Internet and the DMZ as described above and the second is located between the DMZ and the intranet

The second line of protection protects servers which are open to the general public from the more critical company intranet servers. The zone between the first and second line of protection is also called the DMZ (DeMilitarized Zone).

The following techniques could be required depending on the task of the Content Manager server
  • SMTP - when SMTP communication is required
  • Database engines
    • Microsoft SQL Server access is required
    • Oracle database access is required
  • HTTP(S)