74 IBM Tivoli Remote Control Across Firewalls
Figure 2-1 Planning overview for RC Proxy in a Standalone environment
Figure 2-2 shows the entire installation process, which includes the supporting
application and the required firewall configurations phases for a IBM Tivoli
Remote Control Proxy RCProxy-TFST environment.
1. Install a TRM Server
2. Define the IOM Range port and configure your Firewall
3. Install Endpoint Gateways in the more and less secure zone.
4. Deploy the Endpoints in the more and less secure zone
Phase 1
Firewall
2
TMR Server
1
Endpoint GW
3
Endpoint
4
5. Install a Remote Control Server
6. Create a new Policy Region with the RemoteControl managed
resource
7. Create a new Remote Control Tool and configure the Remote
Control policies to force the usage of the Remote Control Proxy.
Phase 2
PR
6
RC Server
5
RC Tool
7
8. Define the communication ports between the RC Proxies and the
type of communication (uni or bidirectional) and configure the Firewall
9. Install the Target Proxy and define if it will be the Parent or the Child
10. Install the Cont. Proxy and define if it will be the Child or the Parent
Phase 3a
Target Proxy
9
Firewall
8
Controller Proxy
10
8. Define the communication ports between the RC Proxies and the
type of communication (uni or bidirectional) and configure the multiple
Firewalls
9. Install the Target Proxy and define if it will be the Parent or the Child
10. Install the TFST Relay(s)
11. Install the Cont. Proxy and define if it will be the Child or the Parent
Phase 3b
Target Proxy
9
Firewall
8
Relay TFST
10
Controller Proxy
11