Your network infrastructure is extremely important to the protection of your system. Your network must support the communication means necessary for your enterprise and your requirements, without allowing unauthorized access. A clearly defined network topology can remove many security risks caused by software errors (at the level of the operating system or application) or eliminate attacks on the network, such as eavesdropping. If no users are able to log onto your application server or database server at operating system- or database level, it is impossible for intruders to abuse the machines or to access the database of files on the back-end system. If no users can connect with the server LAN (Local Area Network), they cannot exploit any known errors or security gaps in the network services on the servers.
The network topology for SAP MI is based on the topology used by the SAP NetWeaver platform. Consequently, the security guidelines and recommendations described in the Security Guide for SAP NetWeaver also apply to SAP MI. You can find detailed information that is particularly relevant to SAP MI in the following sections:
The section describes the communication path and logs used by SAP MI.
This section contains information on network security.
This section describes the data required for the different communication paths, for example, which user is used for which type of communication.
For more information, see the following sections of the SAP NetWeaver Security Guide:
For more information about the configuration, see Configuration of Security Functions (Optional).