network_design_-_where_to_setup_lucy
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
network_design_-_where_to_setup_lucy [2018/05/31 11:10] – [Introduction] lucy | network_design_-_where_to_setup_lucy [2019/03/01 11:14] – lucy | ||
---|---|---|---|
Line 31: | Line 31: | ||
**License: | **License: | ||
- | For testing purposes please send us the workstation ID (http:// | + | For testing purposes please send us the workstation ID (http:// |
**Where to place LUCY in an onsite installation? | **Where to place LUCY in an onsite installation? | ||
You can place LUCY in the intranet or within a secured zone (DMZ). If you setup LUCY within the intranet you will have to consider the following challenges: | You can place LUCY in the intranet or within a secured zone (DMZ). If you setup LUCY within the intranet you will have to consider the following challenges: | ||
- | * Mail integration: | + | * Mail integration: |
{{ setup_lan.png? | {{ setup_lan.png? | ||
- | * DNS integration: | + | * DNS integration: |
- | * HTTP/HTTPS access: The landing pages and the E-learning needs to be accessible via http or https (see [[ssl_configuration|this chapter]] for SSL configuration). If users from the internet have to access those pages, you need to make sure that you have setup an according port forwarding rule on your firewall together with a NAT entry, that points to LUCY. | + | * HTTP/HTTPS access: The landing pages and the E-learning needs to be accessible via http or https (see [[ssl_configuration|this chapter]] for SSL configuration). If users from the internet have to access those pages, you need to make sure that you have set up an according port forwarding rule on your firewall together with a NAT entry, that points to LUCY. |
- | * Security products and whitelisting: | + | * Security products and whitelisting: |
* Securing the access: Once you finished the setup, you might want to prevent users from accessing the web based administration. In [[security_considerations|this chapter]] we discuss a few tips on how to secure LUCY. | * Securing the access: Once you finished the setup, you might want to prevent users from accessing the web based administration. In [[security_considerations|this chapter]] we discuss a few tips on how to secure LUCY. |
network_design_-_where_to_setup_lucy.txt · Last modified: 2019/10/14 15:45 by lucy