jeudi 26 septembre 2013

System topology recommendations

Dynamics AX 4.0

3 out of 4 rated this helpful
Before implementing an Microsoft Dynamics AX system, you should carefully plan the system topology.
NoteNote
This topic describes network and system topologies, not how a Microsoft Dynamics AX system communicates internally. For information on architecture, see Microsoft Dynamics architecture.
  1. With your customer, define and document:
    • Number of transactions
    • Number of users
    • Uses of system (modules and features to be implemented)
    • External user access required
    • Web access required
    • Required availability
    • Projected growth rate
    • Number of sites
  2. Evaluate and document the existing infrastructure:
    • Bandwidth
    • Operating system
    • Databases present
    • Applications to integrate
  3. With this information in hand, you can start to determine how to structure the system. Key decisions are:
    • Whether any Microsoft Dynamics AX computer roles can be combined on a single computer, and if they can, which to combine
    • Whether to create network load-balanced clusters to host the Application Object Server (AOS)
    • Whether to create network load-balanced clusters to host the database
    • Whether to have a cold, warm or hot backup system for the database
If your customer does not have users outside their domain (external users) that need to access data, you can use one of the following basic topologies.
NoteNote
Although you can install Microsoft Dynamics AX on a single computer for development and trial purposes, we recommend that you do not install a production system on a single computer.
The figure below shows one of the more common topologies that uses three computers:
Core system
The figure below shows a core system topology running on clustered servers.
NoteNote
If you choose to install the application file server on the AOS cluster, it should only be installed on a single computer in the cluster.
Core scaled
Enterprise Portal can be set up to run for an intranet-only scenario, or it can be set up to run in an Internet-facing scenario.

Intranet-only Enterprise Portal

The figure below shows a topology for a simple intranet-only Enterprise Portal.:
Enterprise portal Internal
The figure below shows a larger-scale intranet-only Enterprise Portal.
Enterprise Portal large scale

Internet-facing Enterprise Portal

There are two recommended topologies for Internet-facing Enterprise Portal--which you use depends on the configuration of the perimeter network.
The primary difference between the two topologies is how access to Enterprise Portal is managed for external users.
The following sections describe two options for configuring a perimeter network to support Microsoft Dynamics AX.

Standard perimeter network

In this configuration, called a standard perimeter network, the Active Directory domain contains:
  • All internal users to be added to Microsoft Dynamics AX.
  • Special users required for Microsoft Dynamics AX functionality.
  • An organizational unit containing any users from outside the organization that require Enterprise Portal access. These users' rights must be restricted in the following ways:
    • Cannot log on locally
    • Cannot access network
      NoteNote
      The organizational unit can contain other organizational units, as long as the top node is associated with Microsoft Dynamics AX.
The following illustration shows a standard perimeter network configuration.
Standard perimeter network

Traditional perimeter network

This configuration, called a traditional perimeter network, contains two Active Directory domains. The internal domain contains:
  • All internal users to be added to Microsoft Dynamics AX.
  • Special users required for Microsoft Dynamics AX functionality.
  • Group required for application integration server functionality.
The perimeter network contains:
  • A second domain controller with a one-way trust relationship to the first domain controller that contains any users from outside the organization that require Enterprise Portal access. These users cannot have any rights in the internal domain, and their rights must be restricted in the following ways in the perimeter network domain:
    • Cannot log on locally
    • Cannot access network
      NoteNote
      On the Enterprise Portal computer, you must override the group policy set to cannot access network to allow access to that computer.
The following illustration shows a traditional perimeter network configuration.
Traditional perimeter network
Reporting server is installed on an Internet Information Services (IIS) server that is not Internet-facing.
The following illustration shows a simple reporting server topology.
Reporting
An application integration server is installed on an Internet Information Services (IIS) server that is not Internet-facing.
The following illustration shows a simple application integration topology.
Application Integration Framework

Aucun commentaire:

Enregistrer un commentaire