Solved

Disaster recovery and public facing

Posted on 2012-03-12
3
407 Views
Last Modified: 2012-03-15
I recently got copied in to a vulnerability assessment report conducted from the outside by a 3rd party company. They were given 2 IP ranges, one seems to be live systems, i.e. mail systems, citrix, website and web apps, and the second range were just called "disaster recovery systems". Why would you have public facing IP range relating to a companies disaster recovery? What purpose would these serve and why would they be open to the public (i.e. public facing)? Would every company have public facing systems that relate to disaster recovery, if so why? I know its "company specific" but I just wondered why any company would have such.
0
Comment
Question by:pma111
  • 2
3 Comments
 
LVL 30

Accepted Solution

by:
IanTh earned 500 total points
ID: 37709231
using disaster recovery means no loss of services so it has to be public facing just like production so the dr can act as production if needed
0
 
LVL 30

Expert Comment

by:IanTh
ID: 37709232
a dr is a copy of production usually
0
 
LVL 3

Author Comment

by:pma111
ID: 37709249
So for example Citrix, Email, Website/apps it would just be a clone of those?
How do they "stay up" if the architecuture within the private network collapses?
Could you perhaps expand in the context of a citrix environment with public facing gateway, how if internal systems went down you could still do business? And how these systems are cloned so if one goes down the other can stay up?
Is it common everyone with say a citrix gateway web app will also have a DR citix access gateway too?
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
sftp vs SendThisFile 9 48
Layer 3 switch recommendation 15 48
Cisco router 4400 and switch connection. 27 46
Certifications 8 36
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question