Implementing a 1E DMZ Server

Learn how to implement a 1E DMZ Server to support internet-facing clients. This guide covers the two-stage setup process, firewall considerations, and best practices for deploying Switch and Background Channel components in a secure DMZ environment.

Enabling 1E to support devices that are external to your company network is done by slightly extending the default single-server architecture. To enable external 1E Client devices to interact with 1E , the DMZ requires at least one Background Channel and at least one Switch.

The Responses Stack handles communications between Master Stack and 1E Client devices. The Background Channel and Switch components handle the direct communication with clients, the Core processes the information in both directions between the Master Stack and the Switches.

Assumptions

The steps given on this page assume:

  • If the 1E DMZ Server is domain-joined, it is either in the same domain in which the internal 1E Server resides or there is a two-way trust between domains.

  • The 1E DMZ Server will host only 1E Switch and Background Channel components and is installed in a DMZ.

  • 1E is already installed on the internal (corporate) network, with clients successfully using the internal Response Stack Switch and Background Channel, which the DMZ Server will connect to.

In our example, the DMZ Server has only one Switch, and the internal 1E Server is a single-server configuration with Master and Response Stacks. If your system has different requirements, contact 1E for advice.

Client devices will be configured to swap between being on the internal network and being external to the network and therefore will communicate with the internal 1E Server when connected internally and the external 1E DMZ Server when accessing externally (for example Internet). Client devices must have the appropriate certificates installed. Refer to Certificate requirements.