Hi Guys,
Hoping I can get some advice on this.
I am in the process of building a Remote Desktop VDI 2016 environment. I am trying to working out a reasonable topology that is secure but also has a reasonable foot print. So I don't build and maintain servers that are not required.
I am a little surprise that I cannot find one clear document on a good topology. I see documents talking about having a AD in the DMZ and other about only a Gateway in the DMZ with access to the internal AD servers. Both of these don't seem like the best option in terms of security.
My thoughts is to setup a Reverse proxy in the DMZ pointing to the internal Gateway server that can then talk to the broker and enable access, with the webserver being installed on the Broker. (Yes I would configure HA)
So the basic layout is this.
Firewall || Reverse Proxy (ARR) || Firewall || Server 1 (Gateway Server), Server 2 (Webserver, Broker), Server 3 (RD Virtual host)
Would like to hear people thoughts and this and if anyone can see any problems.
Thanks for your time.
Craig G
Craig G