Skip to main content

Hello,

 

Would the below be a supported topology? It is similar to distributed environment but One of the IIS server would also be the K2 application server. Documented at https://help.k2.com/onlinehelp/k2five/icg/5.2/default.htm#Plan/TOP-Distributed.htm%3FTocPath%3DPlan|Sample%2520Topologies|_____3

 

  • User Machine
    • Network Domain access
  • Server 1
    • IIS - for internal use in domain & Firewall no external access
    • K2 Application Server
  • Server 2
    • IIS - For use outside of the domain (Possible anonymous access, when not in network or on VPN for employees
    • This server may be located in Azure but would have public IP address and network access to Server 1 and Server 3.
  • Server 3
    • MS SQL Server

 

If this is supported what things do i need to take into consideration orkeep an eye out for?

Does anyone have any thoughts here?

Hi  @nequinox;

 

According to your elaboration i noticed you emphasized mostly on security for your external and internal users, and that brought me attention of demilitarized zone,One way to expose your K2 servers to internet users is to use a DMZ to host limited K2 functionality in a secured section of your network. Typically, you host only the necessary K2 sites on a web server in the DMZ, which in turn connects to your internal K2 server.

 

User Machnine(Outside firewall)->Firewall->Webserver(IIS)

User Machine(Inside Firewall)->K2 Application Server

NB: Both A & B =(clustered) to SQL (K2 database)

 

Kindly refer to this link for more information(considerations) https://help.k2.com/onlinehelp/k2five/icg/5.2/default.htm#Plan/TOP-DMZ.htm%3FTocPath%3DPlan%7CSample%2520Topologies%7C_____5

 

Thank you.

 

Should you find the above information of use and or answered your question, kindly mark it as "Kudo and/or Accepted Solution", as this will assist other community members.

 

Kind regards;

Widson.

 


Reply