© Copyright IBM Corp. 2003. All rights reserved. 115
Chapter 4. Implementation scenario:
Tivoli Firewall Security ToolboxIn this chapter we describe the techniques used to implement IBM Tivoli Remote
Control 3.8 in a firewall environment. The scenario we present will help you
understand the requirements for establishing Remote Control sessions when
firewall is involved, using a more secure mechanism, the Remote Control Proxy
technology using the Tivoli Firewall Security Toolbox. These topics are covered:
Our testing scenario: Remote Control Proxies implementation using the Tivoli
Firewall Security Toolbox (TFST) environment
Data flow, TCP/IP ports used, and firewall configuration
Remote Control Proxies installation and configuration
We make the following assumptions:
You have a working knowledge of the TME architecture and of the IBM Tivoli
Management Framework 4.1
You have a basic understanding of Tivoli Firewall Security Toolbox 1.3
(TFST). Appendix A, “Tivoli Firewall Security Toolbox overview” on page 175
provides an overview of the main TFST components.
You have a basic understanding of large enterprise network architecture,
firewall and proxies.
4