Примеры использования Perimeter network на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Integrate the VPN server into a perimeter network.
If this site system role is configured in a perimeter network, configure the site server to retrieve the data from the site system.
The federation server proxy is located in the perimeter network.
All the Internet-based site systems are in the perimeter network, and accept connections for clients connecting over the Internet.
Do not put a server locator point in the perimeter network.
One of the forests is located in the organization's perimeter network(also known as a demilitarized zone, extranet, or screened subnet).
They decide to create one new site in the perimeter network.
An intranet firewall is between your perimeter network(the network between your intranet and the Internet) and intranet.
Avoid using the fallback status point in the perimeter network.
All the Internet-based site systems are in the perimeter network and accept connections for clients connecting over the Internet.
The database administrators install andconfigure a SQL Server replica in the perimeter network.
The federation server proxy that is located in the perimeter network of the resource partner organization.
See Network Diagram for Internet-Based Servers- Scenario 4 with Intranet Connections into the Perimeter Network.
The first network is Internet facing(the perimeter network) to provide the needed connectivity.
Scenario 2: Configuration Manager site that doesn't support intranet clients and is in the perimeter network only.
The federation server proxy that is located in the perimeter network of the account partner organization.
The management point that supports Internet-based client communicates with a SQL server replica in the perimeter network.
The design is revised so that a SQL Server replica will be used in the perimeter network, and the database administrators are informed of this requirement.
Create distribution points only on site systems that can be managed within the intranet or the perimeter network.
Jenni installs a new child site in the perimeter network, configuring the Internet-based site system roles on the servers with the Internet FQDN of the site systems registered in the Internet DNS servers.
Although it is supported to configure the PXE service point in a perimeter network, it is not recommended.
For example, if your data center has a perimeter network in a forest other than the site server and site database, you can use this account to read the multicast information from the site database.
The management point that supports Internet-based client communicates with a replica of the site database in the perimeter network.
These range from having the complete Configuration Manager 2007 site contained within the perimeter network(also known as a screened subnet or DMZ) to having the site divided between the perimeter network and the intranet.
Additional servers are installed and hardened with security policies suitable for computers in the perimeter network.
To avoid these in-bound connections from the perimeter network to the intranet, use the export and import method of synchronizing the software updates as described in the following topic: How to Synchronize Updates Using Export and Import.
For Internet-based clients,if you must have site system roles installed in a perimeter network to support Internet-based clients.
In this design, external users, such as customers, can access the Web application by authenticating to the external account federation server,which is located in the perimeter network.
This scenario represents a Configuration Manager 2007 site that doesn't support intranet clients and spans the perimeter network and intranet.
This solution requires that the intranet FQDN of the Internet-based site systems are registered in the intranet DNS servers with the public IP addresses of the servers in the perimeter network.