Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Issues with connecting servers in various ways

Posted on 2002-05-29
2
Medium Priority
?
123 Views
Last Modified: 2010-04-13
I have to get the following done but am not sure of the best way to do it or issues involved.

We have a web server.  We have a network with a database server.  There is a need to have the web server to connect and talk to the database server.  

Proposed solution is to have a second ethernet card in the web server and a second card in the db server and connect them directly via a cross over cable.  The ip/subnet would then be set up different than the intranet.

If we do this, we will set up an odbc to connect to the database.  This would connect via a user that only has read only to the db.  

Obiously we want to limit security issues if we can.  What other things must we do or think about to try to keep someone from getting to the db server via the web server but still allow the odbc connection to exist?
0
Comment
Question by:mindarch
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 32

Accepted Solution

by:
jhance earned 600 total points
ID: 7042394
In general that's a good solution and is widely used.  Since the web server to DB server link is private there is no exposure risk since the DB server is not accessible by any system other than the web server.  If no IP forwarding or routing services are setup on the web server, no web traffic will be getting to the DB server.  This also keeps the web server to DB traffic from getting bogged down with other network traffic that may exist.
0
 

Author Comment

by:mindarch
ID: 7042832
Thanks jhance.  Do we need to set up anything other than the odbc?  

Stephen
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this article, I’ll show how research, determination, and use of modern technology helped me solve a DNA mystery.
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question