© Copyright IBM Corp. 2003. All rights reserved. 115
Chapter 4. Implementation scenario:
Tivoli Firewall Security Toolbox
In this chapter we describe the techniques used to implement IBM Tivoli Remote
Control 3.8 in a firewall environment. The scenario we present will help you
understand the requirements for establishing Remote Control sessions when
firewall is involved, using a more secure mechanism, the Remote Control Proxy
technology using the Tivoli Firewall Security Toolbox. These topics are covered:
򐂰Our testing scenario: Remote Control Proxies implementation using the Tivoli
Firewall Security Toolbox (TFST) environment
򐂰Data flow, TCP/IP ports used, and firewall configuration
򐂰Remote Control Proxies installation and configuration
We make the following assumptions:
򐂰You have a working knowledge of the TME architecture and of the IBM Tivoli
Management Framework 4.1
򐂰You have a basic understanding of Tivoli Firewall Security Toolbox 1.3
(TFST). Appendix A, Tivoli Firewall Security Toolbox overview on page 175
provides an overview of the main TFST components.
򐂰You have a basic understanding of large enterprise network architecture,
firewall and proxies.
4