Perimeter Servers and More Secure Networks
The more common network configuration pattern is for Sterling B2B Integrator to reside in the innermost, secure network zone and the perimeter server to reside in the DMZ. In this case, connection should be established from Sterling B2B Integrator to the perimeter server - that is, from the more secure towards the less secure network zone.
In some cases, it is desirable for Sterling B2B Integrator to communicate to a more secure network zone. In this case you will want to establish the network connection from the perimeter server to Sterling B2B Integrator. The following figure shows this configuration: