IBM Tivoli Monitoring > Version 6.3 Fix Pack 2 > Installation Guides > Installation Guide > Firewalls
IBM Tivoli Monitoring, Version 6.3 Fix Pack 2
Determine which option to use
To determine which option is needed in a particular the firewall environment, four factors must be considered.
- Flow of connection establishment
- Permission at the firewall
- Server address continuity
- Number of internet zones
- Flow of connection establishment
Products based on Tivoli Management Services typically establish connections in a traditional client-server flow: connect requests flow from a client in the public network to a server in the trusted network. If the network configuration allows this connection flow, permissions at the firewall are the next consideration in determining how interoperability is achieved.
- Permission at the firewall
If the network configuration allows traditional connection flow, the next consideration is what firewall permissions, if any, are required of the firewall that separates the private, trusted server network from the public, untrusted client network. For simplicity the firewall between these disjoint networks is referred to as the barrier firewall.
- Server address continuity
If the barrier firewall has no restrictions and all ports are permitted, the next factor to consider is server address continuity.
- Number of internet zones
The final factor to be taken into consideration is the number of internet zones, that is, how many barrier firewalls must be crossed.
Parent topic:
Firewalls