This section describes what is required to enable external user access, including the components to be deployed, supported topologies, requirements, and recommended deployment process.

You should deploy your perimeter network after you deploy your internal Enterprise pools or Standard Edition servers, but before you deploy any other features that support or rely on external user access.

In This Section