3.2 Description of the system configuration

Chapter 3 describes various system configuration patterns used for determining the system configuration as well as the features of the respective patterns. This section describes the common points to be considered for each system configuration pattern that you need to check before reading the explanation about the system configurations. The legend items that are used in the system configuration figures of this chapter are also explained. Read the following sections after checking these legend items.

Reference note
The legend items described here are also applicable to, 4. Determining the System Configuration (Batch Application Execution Platform), and 4.11.2 Deploying the firewall and the intrusion detection system in the uCosminexus Application Server Security Management Guide.
Organization of this section
(1) Common points to be considered for the system configurations described in this chapter
(2) Legend items used for system configuration figures

(1) Common points to be considered for the system configurations described in this chapter

Note the following common points for each system configuration:

(2) Legend items used for system configuration figures

This subsection shows the legend items used in the system configuration figures of chapter 3 and chapter 4.

Figure 3-6 Legend items used for system configuration figures

[Figure]

The color that indicates the host also indicates the host type for operation management by Management Server.

Figure 3-7 Legend items used for figures in system configuration (classification of the host)

[Figure]

The legend items that are not explained here are given in the respective figures.