Enabling Remote Access
IT Administrators have two choices when it comes to enabling remote users access to the Locator search client.
- Require users to login to the company's Virtual Private Network (VPN).
- Expose the Locator server to Internet traffic.
For security purposes, most companies require users to gain access to resources within the company's internal network via the VPN.  When this is done, users who are attempting to access an internal resource, such as the Locator server, must first authenticate with the VPN.  This will then allow them access to internal resources.
However, for those who wish to provide remote users access to perform Locator searches, without first authenticating with the VPN, the Locator server must be exposed to the Internet.  There are many ways to accomplish this, such as using multiple firewalls, and/or using multiple network interface cards.  Whichever method is chosen, it is highly recommended that Secure Sockets Layer (SSL) is configured for Internet Information Services (IIS) running on the Locator server.  Once SSL has been configured, the IT administrator will need to allow Internet traffic to TCP port 443 on the Locator server.
However, for those who wish to provide remote users access to perform Locator searches, without first authenticating with the VPN, the Locator server must be exposed to the Internet.  There are many ways to accomplish this, such as using multiple firewalls, and/or using multiple network interface cards.  Whichever method is chosen, it is highly recommended that Secure Sockets Layer (SSL) is configured for Internet Information Services (IIS) running on the Locator server.  Once SSL has been configured, the IT administrator will need to allow Internet traffic to TCP port 443 on the Locator server.
See also
ayfie