Installing and configuring perimeter servers

A perimeter server is an optional software tool for communications management. A perimeter server can be installed in a demilitarized zone (DMZ). A DMZ is a computer host or small network inserted as a neutral zone between a company's private network and their public network. A perimeter server requires a corresponding perimeter client.

The perimeter server manages the communications flow between outer layers of your network and the TCP-based transport adapters. A perimeter server can solve problems with network congestion, security, and scalability, especially in high-volume, Internet-gateway environments.

Perimeter server installation methods

You can install perimeter server either in silent mode or in interactive mode. The default installation mode is silent.

In the silent mode, you must specify the details in a silent file, whereas in the interactive mode, you can enter the value each time a prompt appears.

Perimeter server security vulnerabilities

When Sterling B2B Integrator is deployed with a remote perimeter server in a more secure network zone, there is a security vulnerability. An intruder may compromise the host where the proxy resides, and take over the persistent connection to the perimeter server residing in the more secure zone. If this happens, the perimeter server will relay all the intruder's network requests past the firewall into this internal zone.

To prevent an intrusion, limit the activities the remote perimeter server can perform on behalf of the proxy to specifically those activities that the proxy needs to do for its operation.

Control these limitations by using a configuration residing in the secure network zone with the remote perimeter server, inaccessible by the proxy that could become compromised.

Using a perimeter server with a Docker based installation

If you have installed Sterling B2B Integrator by using Docker, you must first complete the steps in Using a perimeter server with the Docker based installation.