
© Copyright IBM Corp. 2003. All rights reserved. 115
Chapter 4. Implementation scenario: 
Tivoli Firewall Security ToolboxIn this chapter we describe the techniques used to implement IBM Tivoli Remote 
Control 3.8 in a firewall environment. The scenario we present will help you 
understand the requirements for establishing Remote Control sessions when 
firewall is involved, using a more secure mechanism, the Remote Control Proxy 
technology using the Tivoli Firewall Security Toolbox. These topics are covered:
Our testing scenario: Remote Control Proxies implementation using the Tivoli 
Firewall Security Toolbox (TFST) environment
Data flow, TCP/IP ports used, and firewall configuration
Remote Control Proxies installation and configuration
We make the following assumptions:
You have a working knowledge of the TME architecture and of the IBM Tivoli 
Management Framework 4.1
You have a basic understanding of Tivoli Firewall Security Toolbox 1.3 
(TFST). Appendix A, “Tivoli Firewall Security Toolbox overview” on page 175 
provides an overview of the main TFST components.
You have a basic understanding of large enterprise network architecture, 
firewall and proxies. 
4