Chapter 4. Implementation scenario: Tivoli Firewall Security Toolbox 117
We demonstrate how the Remote Control Proxy will allow remote control
connections through the firewall with minimal impact on the connect ion policies
enforced by the firewall itself. We explain the seamless integration the Remote
Control Proxies have with the Tivoli Firewall Secur ity Toolbox and its ability to
handle concurrent sessions.
Complex network may impose the usage of Remote Control across multiple
firewalls. Since Remote Control uses the TFST technology, it can take
advantage of the Relay component of TFST to bridge two proxies across multiple
firewalls. Relays cannot be shared in integrated scenario between Remote
Control Proxy and TFST, so we need to have two different Relay entities; one will
be used by the Remote Control Proxy, and the other one by the TFST. In this
case it is necessary to install another Relay instance on the environment. All
those Relay instances must be installed on the same physical machine. For
additional information, refer to Chapter 2, Implementation planning on page 57.
4.2.1 Technical infrastructure
This section provides a detailed description of our TFST environment, showing
the machine type, operating system, and Tivoli resources we installed on each
machine.
Figure 4-1 illustrates the general testing scenario used in our la b.