
74 IBM Tivoli Remote Control Across Firewalls
Figure 2-1 Planning overview for RC Proxy in a Standalone environment
Figure 2-2 shows the entire installation process, which includes the supporting
application and the required firewall configurations phases for a IBM Tivoli
Remote Control Proxy RCProxy-TFST environment.
1. Install a TRM Server
2. Define the IOM Range port and configure your Fi rewall
3. Install Endpoint Gateways in the more and less secure zone.
4. Deploy the Endpoints in the more and les s secure zone
Phase 1Firewall
2
TMR Server
1
Endpoint GW
3
Endpoint
4
5. Install a Remote Control Server
6. Create a new Policy Region with the Remote Control managed
resource
7. Create a new Remote Control Tool and configure the Remote
Control policies to force the usage of the Remote Control Proxy.
Phase 2PR
6
RC Server
5
RC Tool
7
8. Define the communication ports between the RC P roxies and the
type of communication (uni or bidirectional) a nd configure the Firewall
9. Install the Target Proxy and define i f it will be the Parent or t he Child
10. Install the Cont. Proxy and define if it will be the Child or the Parent
Phase 3aTarget Proxy
9
Firewall
8
Controller Proxy
10
8. Define the communication ports between the RC Proxies and the
type of communication (uni or bidirectiona l) and configure the multiple
Firewalls
9. Install the Target Proxy and de fine if it will be the Pa rent or the Child
10. Install the TFST Relay(s)
11. Install the Cont. Proxy and define if i t will be the Child or the Parent
Phase 3bTarget Proxy
9
Firewall
8
Relay TFST
10
Controller Proxy
11