Solved

Disaster recovery and public facing

Posted on 2012-03-12
3
408 Views
Last Modified: 2012-03-15
I recently got copied in to a vulnerability assessment report conducted from the outside by a 3rd party company. They were given 2 IP ranges, one seems to be live systems, i.e. mail systems, citrix, website and web apps, and the second range were just called "disaster recovery systems". Why would you have public facing IP range relating to a companies disaster recovery? What purpose would these serve and why would they be open to the public (i.e. public facing)? Would every company have public facing systems that relate to disaster recovery, if so why? I know its "company specific" but I just wondered why any company would have such.
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 30

Accepted Solution

by:
IanTh earned 500 total points
ID: 37709231
using disaster recovery means no loss of services so it has to be public facing just like production so the dr can act as production if needed
0
 
LVL 30

Expert Comment

by:IanTh
ID: 37709232
a dr is a copy of production usually
0
 
LVL 3

Author Comment

by:pma111
ID: 37709249
So for example Citrix, Email, Website/apps it would just be a clone of those?
How do they "stay up" if the architecuture within the private network collapses?
Could you perhaps expand in the context of a citrix environment with public facing gateway, how if internal systems went down you could still do business? And how these systems are cloned so if one goes down the other can stay up?
Is it common everyone with say a citrix gateway web app will also have a DR citix access gateway too?
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question