来自 DMZ 中 Web 服务器的 ASP.Net 提供商
我们有一个 Intranet ASP.net Web 应用程序,它使用 OOTB ASP.net 成员资格和角色提供程序。
现在我们计划通过将 Web 服务器移动到 DMZ 来将应用程序公开到 Internet,如下面的(蹩脚)文本图所示
External Internal internet --- Firewall --- Web server --- Firewall --- App Server --- Database DMZ Intranet
现在的问题是 Web 服务器上的 ASP.NET 成员资格和角色提供程序无法连接到sql server 因为内部防火墙。
您以前遇到过这样的场景吗? 您是否建议在内部防火墙中开放端口,以便 Web 服务器可以直接连接到 SQL 服务器? 我还有什么其他选择(除了自己编写自定义提供程序)?
We have an intranet asp.net web application which uses the OOTB ASP.net membership and role providers.
Now we are planning to expose the application to internet, by moving the web server to the DMZ as represented in the following (crappy) text diagram
External Internal internet --- Firewall --- Web server --- Firewall --- App Server --- Database DMZ Intranet
Now the problem is that the asp.net membership and role providers on the web server cant connect to the sql server because of the internal firewall.
Have you ever faced such a scenario before? Will you recommend opening up ports in the internal firewall so that the webserver can directly connect to the SQL server? What other alternatives do I have (otherthan wring a custom provider myself)?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
更改 DMZ 策略和开放端口通常非常困难。 做我所做的事情可能会取得更好的成功:在网络内部公开 WCF 服务,并通过端口 80 上的 HTTP 与它进行通信。
与 LAN 人员零摩擦,我只是模仿 .NET 提供的完全相同(尽管很蹩脚)的 API我们:)
编辑:澄清一下,这意味着我有一个 RemoteRoleProvider,配置如下:
Changing your DMZ policy and opening ports is usually REALLY hard. You might have better success doing what I did: expose a WCF service inside the network and communicate with it over HTTP on port 80.
Zero friction with the LAN folks, and I just mimic the same exact (though crappy) API that .NET gives us :)
Edit: to clarify, this means I have a RemoteRoleProvider that is configured like this:
我们在 DMZ 中有几个面向 Internet 的 Web 服务器,并且必须在防火墙中打开隧道返回到它们需要与之交互的专用网络中的 SQL 服务器。 我认为我们使用端口 1433 以外的其他端口进行 SQL 连接。 到目前为止,它运行得很好,没有安全漏洞。
We have a couple of Internet-facing web servers in a DMZ and had to open tunnels in our firewall back to the SQL server in our private network that they need to interact with. I think we used something other than port 1433 for the SQL connections. So far it's worked pretty well, i.e. no security breaches.