180 IBM Tivoli Remote C ontrol Across Firewalls
Installation and configuration of TFSTThis section explains how to install and configure the components of Tivoli 
Firewall Security Toolbox.
Installation of TFST
Refer to the 
Firewall Security Toolbox User ’s Guide
, GC23-4826, for the 
prerequisite software and hardware details of Tivoli Firewall Security Toolbox.
To install TFST, decompress the tar file or self-extracting EXE file. Under the 
main Proxy directory, the file creates directories for each component and copies 
the installation scripts and executables to subdirectories for each platform.
Installing the Endpoint Proxy
To install Tivoli Endpoint Proxy, decompress the tar file or self-extracting EXE 
file, and it will create the Endpoint directory under the main Proxy directory:
To install Endpoint Proxy on a UNIX based machine, run install.sh from the 
Endpoint Proxy directory and follow the steps provided in the 
Firewall 
Security Toolbox User ’s Guide
, GC23-4826.
To install Endpoint Proxy on a Windows based machine, run Tivoli Endpoint 
Proxy.exe present under Tivoli Endpoint Proxy\w32-ix86 subdirectory, and 
the InstallShield starts. Then follow the steps provided in the 
Firewall Security 
Toolbox User ’s Guide
, GC23-4826. 
Installing the Gateway Proxy
Tivoli Gateway Proxy needs to be installed on a machine that is in the DMZ, 
where the Endpoints are located. From the Gateway Proxy directory, go to the 
directory for the plat form on which the Proxy will  run:
To install Endpoint Proxy on UNIX based machine, run install.sh from the 
Gateway Proxy directory and follow the steps provided in 
Firewall Secu rity 
Toolbox User ’s Guide
, GC23-4826.
To install Endpoint Proxy on windows, run Tivoli Gateway Proxy.exe present 
under Tivoli Gateway Proxy\w32-ix86 subdirectory, and the InstallShield 
starts. Then follow the steps provided in the 
Firewall Security Toolbox User ’s 
Guide
, GC23-4826.