© Copyright IBM Corp. 2003. All rights reserved. 93
Chapter 3. Implementation scenario:
Standalone Proxies
In this chapter we explain the techniques used to implement IBM Tivoli Remote
Control 3.8 in a firewall environment. The scenario we describe will help you
understand the requirements for establishing Remote Control sessions when a
firewall is involved, using a more secure mechanism, the Remote Control Proxy
technology in Standalone mode. These topics are covered:
򐂰Our testing scenario: Using Remote Control Proxies in Standalone mode
򐂰Remote Control data flow, TCP/IP ports used, and firewall configuration
򐂰Remote Control Proxies installation and configuration
We make the following assumptions:
򐂰You have a working knowledge of the TME® architecture and of the IBM
Tivoli Management Framework 4.1
򐂰You have a basic understanding of Tivoli Firewall Security Toolbox 1.3
(TFST). Appendix A, Tivoli Firewall Security Toolbox overview on page 175
provides an overview of the main TFST components.
򐂰You have a basic understanding of large enterprise network architecture,
firewall and proxies.
3