Network and Communications Security 
The underlying network infrastructure is very important for the protection of a system or critical components within a system. The network needs to support the communication necessary for business requirements without allowing unauthorized access. A clearly-defined network topology can prevent or eliminate many security risks caused by software errors (on both the operating system and the application level) and attacks on the network, for example, eavesdropping of data streaming. If users cannot log on to your application or database servers at the operating system or database level, then there is no way for intruders to compromise the servers and gain access to the system's database or files. If users cannot connect directly to the servers in the private network, they cannot exploit any known bugs or security gaps on the server.
Note
To ensure secure communication between the different components and an encrypted data storage, for example for access codes, you must also install Cryptographic Libraries on the SAP NetWeaver Enterprise Search systems.

Underlying Network Topology of SAP NetWeaver Enterprise Search
SAP NetWeaver Enterprise Search is based on the SAP NetWeaver platform. Therefore, the security guidelines and recommendations described in the SAP NetWeaver Security Guide also apply to SAP NetWeaver Enterprise Search.
Details that specifically apply to SAP NetWeaver Enterprise Search are described in the following sections:
Security of the Communications Channels
This section describes the communication paths and protocols used by SAP NetWeaver Enterprise Search.
This section describes the network topology for SAP NetWeaver Enterprise Search. It shows the appropriate network segments for the various client and server components.
This section contains a list of the firewall settings that are relevant for SAP NetWeaver Enterprise Search.
This section describes how SAP Web dispatcher, SAProuter, and NAT work together so that the SAP NetWeaver Enterprise Search components appear as a single application to the outside world. It also includes a list of the ports needed to operate SAP NetWeaver Enterprise Search.
This section describes the information needed for the various communication paths, for example, which users are used for which communications.
For more information, see the following sections of the SAP NetWeaver Security Guide: