74 IBM Tivoli Remote Control Across Firewalls

Figure 2-1 Planning overview for RC Proxy in a Standalone environment

Figure 2-2 shows the entire installation process, which includes the supporting

application and the required firewall configurations phases for a IBM Tivoli

Remote Control Proxy RCProxy-TFST environment.

1. Install a TRM Server
2. Define the IOM Range port and configure your Fi rewall
3. Install Endpoint Gateways in the more and less secure zone.
4. Deploy the Endpoints in the more and les s secure zone
Phase 1
Firewall
2
TMR Server
1
Endpoint GW
3
Endpoint
4
5. Install a Remote Control Server
6. Create a new Policy Region with the Remote Control managed
resource
7. Create a new Remote Control Tool and configure the Remote
Control policies to force the usage of the Remote Control Proxy.
Phase 2
PR
6
RC Server
5
RC Tool
7
8. Define the communication ports between the RC P roxies and the
type of communication (uni or bidirectional) a nd configure the Firewall
9. Install the Target Proxy and define i f it will be the Parent or t he Child
10. Install the Cont. Proxy and define if it will be the Child or the Parent
Phase 3a
Target Proxy
9
Firewall
8
Controller Proxy
10
8. Define the communication ports between the RC Proxies and the
type of communication (uni or bidirectiona l) and configure the multiple
Firewalls
9. Install the Target Proxy and de fine if it will be the Pa rent or the Child
10. Install the TFST Relay(s)
11. Install the Cont. Proxy and define if i t will be the Child or the Parent
Phase 3b
Target Proxy
9
Firewall
8
Relay TFST
10
Controller Proxy
11