180 IBM Tivoli Remote C ontrol Across Firewalls
Installation and configuration of TFST
This section explains how to install and configure the components of Tivoli
Firewall Security Toolbox.

Installation of TFST

Refer to the
Firewall Security Toolbox User s Guide
, GC23-4826, for the
prerequisite software and hardware details of Tivoli Firewall Security Toolbox.
To install TFST, decompress the tar file or self-extracting EXE file. Under the
main Proxy directory, the file creates directories for each component and copies
the installation scripts and executables to subdirectories for each platform.

Installing the Endpoint Proxy

To install Tivoli Endpoint Proxy, decompress the tar file or self-extracting EXE
file, and it will create the Endpoint directory under the main Proxy directory:
򐂰To install Endpoint Proxy on a UNIX based machine, run install.sh from the
Endpoint Proxy directory and follow the steps provided in the
Firewall
Security Toolbox User s Guide
, GC23-4826.
򐂰To install Endpoint Proxy on a Windows based machine, run Tivoli Endpoint
Proxy.exe present under Tivoli Endpoint Proxy\w32-ix86 subdirectory, and
the InstallShield starts. Then follow the steps provided in the
Firewall Security
Toolbox User s Guide
, GC23-4826.

Installing the Gateway Proxy

Tivoli Gateway Proxy needs to be installed on a machine that is in the DMZ,
where the Endpoints are located. From the Gateway Proxy directory, go to the
directory for the plat form on which the Proxy will run:
򐂰To install Endpoint Proxy on UNIX based machine, run install.sh from the
Gateway Proxy directory and follow the steps provided in
Firewall Secu rity
Toolbox User s Guide
, GC23-4826.
򐂰To install Endpoint Proxy on windows, run Tivoli Gateway Proxy.exe present
under Tivoli Gateway Proxy\w32-ix86 subdirectory, and the InstallShield
starts. Then follow the steps provided in the
Firewall Security Toolbox User s
Guide
, GC23-4826.