Chapter 4. Implementation scenario: Tivoli Firewall Security Toolbox 119
For our testing we used the following products and release levels:
Operating systems:
– IBM AIX 5.1
– Microsoft Windows 2000 Advanced Server
– Microsoft Windows 2000 Professional
Tivoli Software:
– IBM Tivoli Management Framework 4.1
– IBM Tivoli Remote Control 3.8
– Tivoli Firewall Security Toolbox 1.3
We interconnected the Hub and Spoke TMR, using a two-way connection, and
exchanged the following Tivoli resources:
Administrator (two-way)
AdministratorCollection (two-way)
ManagedNode (two-way)
Endpoint (two-way)
PolicyRegion (two-way)
ProfileManager (two-way)
EndpointManager (one-way, and only once from the Spoke to the HUB TMR)
For this scenario, we assume that all Administrators are on the more secure side
of our network. Therefore, the Remote Control Server is installed on both of the
TMR Servers; and one of the Endpoints in the more secure zone will be the
Remote Control Controller. The Administrators need to have remote Control
access to the Endpoint located in the less secure zone.
Figure 4-2 shows how we implemented the Remote Control Proxy technology
based on the existing TFST configuration.
Note: We have not exchanged the Remote Control resource because, in our
scenario, there are no controllers connected to the HUB TMR.