1. Home
  2. Docs
  3. SecureAccess Appliance
  4. E Series Appliance Overview
  5. Deployment Topologies

Deployment Topologies

The diagrams that follow are intended to provide a reference for IT administrators or architects. The examples provide a few scenarios for common aspects of Celestix Edge appliance deployment, while the potential options are certainly numerous.

DirectAccess Deployment with Manage-Out

Access for external users with strong authentication that allows system administrators to support and manage remote clients.


  • Secure remote access for managed Windows 7 and Windows 8 clients.
  • Anytime, anywhere access to applications and data on the organization network.
  • Compliance mandate for One-Time Password (OTP) authentication.
  • System administrators inside the organization network need connectivity to initiate remote desktop sessions and push software updates to remote clients.

image eseries7 Deployment Topologies

Illustration  E Series Connectivity Features

Virtual Private Network (VPN)

Access for external users that includes a wide range of systems, like PCs, Macs, tablets, and smart phones.


  • Secure remote access for non-managed clients that include commonly used operating systems (Windows, Linux, OS X, Android, and iOS).
  • Remote access to applications and data on the organization network.
  • Web-based applications need users to be pre-authenticated at the edge.
  • Applications individually provisioned based on user roles.

image eseries8 Deployment Topologies

Illustration:VPN Role With Web Application Proxy


Cross-premises network connectivity for internally hosted and cloud resources.

Requirement: Seamless connectivity between an on-premises data center and virtual machines hosted in the public cloud.

image eseries9 Deployment Topologies

Illustration: Remote Desktop Services Role