Title: Making Unicenter talk through a Firewall
1Making Unicenter talk through a Firewall
- Unicenter NSM
- Revised August 11 2003
2Agenda
- Introduction
- WorldView Discovery
- Destination Port Customization
- From Port Selection
- DSM Routing
- Scenarios
- Different Architecture Reviews
- Enterprise Management
- CAM / CAFT , CCI , Event Management
- Unicenter Options
- ITRM covered separately
3Objectives
- Deployment of working through a firewall will
vary for different sites - The architecture will be highly dependent on
- Level of risk accepted
- Rules dictated by the firewall administration.
- Rules governing blocking and unblocking of ports.
- This presentation walks through different
scenarios. - Scenarios selected covers most of the
requirements dictated by different security
administrations
4Firewall Requirements
- Considerations for Firewall
- Reduce the number of ports to be unblocked
- Minimize port Contention
- Block UDP ports
- Minimize the number of hosts that requires ports
to be unblocked - Block traffic initiated from outside firewall
5Need for Firewalls
- Exponential growth on Cyber Crime
- Hackers, cyber criminals, e-terrorists
- Problem caused by recent denial of service
attacks, high-lighted the need for a resilient
and secure DMZ environment. - Secure Internet environments requires Firewalls
6DoS
- Any software deployed in DMZ requires protection
against malicious access or denial of service
attacks. This requires review of security
solutions to prevent these attacks which is out
of scope of this presentation
7What is a Firewall?
- In general terms a Firewall stops a fire from
spreading - An internet-Firewall acts more like a moat by
preventing dangers from the internet spreading to
your internal network - It serves multiple purposes-
- It restricts people to entering at a carefully
controlled point - It prevents attackers from getting close to other
defenses - It restricts people to leaving at a carefully
controlled point - The firewall typically sees all data flowing into
or out of your network and so has the opportunity
to ensure the traffic is acceptable
8What cant a Firewall do?
- Firewalls are not invulnerable
- It does not protect against people already inside
- It does not protect against connections which do
not go through it - It cannot protect against unknown new threats
- Cannot provide complete protection against
viruses - Even the best defenses may be breached
- It works best if combined with other internal
defenses (i.e. TNG Security, SSO etc) - Considerably expensive (time and effort)
- Can cause considerable annoyance to authorized
users
9What can a Firewall do?
- A Firewall is a focus for security decisions
- a single checkpoint for all access - allows you
to concentrate security measures at this point - more efficient than spreading security measures
through-out the organization - secure (possibly more expensive) software and
hardware at a single point will reduce overall
costs - A Firewall can enforce security policy
- Most services across the Internet are insecure -
firewalls can see all access and so can enforce
the agreed policies - A Firewall can log internet activity
- misuses internally, attempted unsuccessful
accesses, statistics etc - A Firewall limits your exposure
- Firewalls can be used to reduce the impact of
security breaches and by installing firewalls
between departments the security risks can be
greatly reduced
10How do you configure a firewall?
- Firewalls can be configured in many different
ways - Firewalls can be viewed as the collection of
techniques (I.e. packet filtering, proxy
services, physical architecture etc) which are
used to overcome different problems. - The problems the firewall needs to overcome are
dependant on the services which must be supplied,
the level of risk which is acceptable and
ultimately how much money can be spent. - Firewall Architectures
- Dual Homed Host Architecture
- Screened Host Architecture
- Screened Subnet Architecture
- Combinations .
11Standard Firewall Configuration
External Server
External Network
Bastion Host (with Firewall software)
Exterior Router
Perimeter Network (Not Secure)
Interior Router
Interior Network (Secure)
NT Workstation
NT Workstation
NT Server
Workstation
NT Server
12Testing Environment
13Typical Client Requirements
- Minimize ports
- Restrict hosts for which ports are opened
- Only allow initial access from within firewall to
outside firewall - Allow port access only after another
communication has occurred - Can overcome restriction number 3
- Requires you to know more about how Unicenter
works and makes you dependant upon details
14Standard TNG Operation
- Unicenter will operate out-of-the-box through a
firewall - Details of the actual ports required are
available most of these can be configured -
these ports must be opened through the firewall - The standard out-of-the-box configuration does
not aim to minimize the number of ports - Components can be configured/deployed to minimize
ports used - Browsers can be directed to use minimum ports
- Options can be deployed to minimize ports used
- Use TCP/IP for SQL not default of named pipes
15Unicenter Component Placement
- Unicenter Components can be placed anywhere
- Where is the firewall and what is it protecting -
client issue? - Following examples
- Agents only outside firewall
- Agents and DSM outside Firewall
- Monitor Through Firewall Discovery , EM and DSM
16Component Placement 1 - Agents outside FIREWALL
CORE Host
Admin Host
TCP 1433 (SQL)
DSM
WV Gateway
3 Ports Open but one is SNMP (UDP 162)
Common Services
UDP 161, ICMP Ping
UDP 162 - Traps
UDP 6665
FIREWALL
Host A
Common Services
17Component Placement 2 - Agents DSM outside
FIREWALL
CORE Host
TCP 1433 (SQL)
TCP 7774
FIREWALL
DSM
WV Gateway
2 Ports Open .. one is SQL
Common Services
UDP 162 - Traps
UDP 161, ICMP Ping
18Component Placement 3 - Monitoring Through a
Firewall - Discovery, EM DSM
Auto- Discovery
ABROWSER
Enterprise Management
CORE Host
CCI
Common Services
SQL 1433
ICMP, UDP, Telnet, FTP
TCP 7774
FIREWALL
TCP 7001
Enterprise Management
DSM
WV Gateway
Common Services
CCI
UDP 162 - Traps
UDP 161, ICMP Ping
Host A
CCI
Common Services
EM Agent
19World View Discovery
20WV Discovery
- Discovery Considerations
- Initiate discovery from inside firewall
- Initiate discovery from outside firewall but CORE
inside Firewall - Temporary Unblock Ports for AutoDiscovery
- NAT implication
21WV DiscoveryInitiated within Firewall
dscvrbe r ..
CORE
22WV DiscoveryInitiated within Firewall
23WV DiscoveryPing Sweep
- Discovery initiated within Firewall
- Pingsweep
24WV DiscoveryClassification
- SNMP (161) Required for Classification
25WV DiscoveryClassification
- Additional Ports may be required if Check
Additional Ports selected
26WV DiscoveryUnicenter NSM
27WV DiscoveryInitiated Outside Firewall
No UDP through Firewall
CORE
SQL 1433
dscvrbe r ..
28WV Discovery Limited Unblocking
- During the auto-discovery process objects are
classified using SNMP therefore the SNMP port
should be opened. - Once auto-discovery is complete the port can be
closed. - It is also possible to run discovery outside the
firewall then move the data via trix inside the
firewall this is not best practice and the
customization is more difficult than is apparent
29DestinationPORT Customization
30aws_orb Port Selection
aws_orb binds to 7774 for 2.4 and above. 7770 for
release 2.1
31aws_orb 2.1 System
- If 7774 is blocked, retries the connection with
7770 incase the managed host is 2.1 system
32orb to orb Connectivity
- Update quick.cfg to select orb port
- tng\services\config\aws_orb\quick.cfg
- defaults to 7774
- No customization available for FROM port
- Selects first available TCP source port
33Orb and Named Pipes
- By Default orb uses named pipes
34Named pipes
- Remove Named pipe usage
- comment plugin awm_qikpipe_dll aws_orb22
35orb to orb Connectivity
- abrowser -_at_ -r -c browser.SysAgtNT
-h DAWYA01 -s admin
Connects to Remote Orb
36orb to orb Connectivity
- Orb to Orb introduces Heartbeat
- Can disable Heartbeat if required
- Can change frequency if required
37aws_sadmin Port Selection
aws_dsm aws_snmp
6665
162
CORE
Manager issues SNMP requests to managed host.
aws_sadmin binds to 6665 by default. Can be
configured to use to different port
Traps from managed hosts , defaults to port 162
38Aws_sadminPort Configuration
- Configure the port that aws_sadmin binds for
incoming SNMP requests - Defaults to 6665
- To change the default port, update aws_sadmin.cfg
and add line - SNMP_PORT xxxx
- where xxxx is the port aws_sadmin binds.
39Aws_sadminPort Configuration
40aws_sadmin.cfg
- If aws_sadmin is changed to bind to a different
port, ensure pollset reflects correct port
41pollset
- pollset port must match aws_sadmin.cfg port
42abrowser
- If aws_sadmin port changed, Agent view needs to
be customized to use correct port
43From PORT Customization
44aws_snmpFrom Port Selection
- SNMP gateway sends its request on 6665 port and
binds with the random source port. - The agent then responds back on the random source
port - If random source port is not acceptable, then
customize aws_snmp.cfg - Specify from source port for aws_snmp
- Consider range to avoid port contention
45aws_snmpFrom Port Selection
- AgentWorks_Dir\services\config\aws_snmp\aws_snmp
.cfg - Aws_snmp defaults to random source port
46aws_snmp From Port Selection
Aws_snmp customized to use port 8001-8002
47aws_snmpFrom Port Selection
- aws_snmp sends request over 6665 (UDP)
- Agent responds back on 8001
48Agentview (abrowser)From Port Selection
- Agentview sends its request on 6665 port and
binds with the random source port. - The agent then responds back on the random source
port - If random source port is not acceptable, then
customize aws_snmp.cfg - Specify from source port for abrowser
- Consider range to avoid port contention
-
49Abrowser From Port Selection
abrowser customized to use port 8011-8020
50AgentView (abrowser)From Port Selection
- abrowser -c browser.SysAgtNT -h -s
admin - abrowser sends request over UDP port 6665
- Agent Responds back on 8011
51aws_sadminFrom Port Selection
For aws_sadmin (SNMP Administrator) you specify a
single "from" port which is used when
aws_sadmin sends traps to a manager
aws_sadmin from port set to port 8000
52DSM Routing
53DSM Routing -r
- Abrowser sends request on TCP port 7774 to Remote
DSM on managed system - Remote DSM talks to agent on UDP Port 6665
- Configurable port (aws_sadmin.cfg)
- Agent replies back to Remote DSM on UDP port 8001
- Configurable in aws_snmp.cfg
- SNMP_PORTS aws_sadmin 8000
- SNMP_PORTS aws_snmp 8001-8002
- SNMP_PORTS mibbrowse 8003-8010
- SNMP_PORTS abrowser 8011-8020
- SNMP_PORTS utilities 8021-8030
- Remote DSM on managed system replies back to
abrowser via TCP port 7774 - Customer only has to open TCP port 7774 (Uni 3.0
fix needed to not require port 9990)
54Agentviewwithout DSM Routing
Worldview EM Obrowser Abrowser
Binds to first available port
7774
DSM
Responds back on source port
6665 UDP
Managed System
Managed System
Responds back on source port
55AgentViewwithout DSM Routing
UDP call from abrowser machine to managed Host
56Agentviewwith DSM Routing
Worldview EM Obrowse Abrowse
Binds to first available port
Responds back on source port
DSM
7774
UDP
6665
Managed System
Managed System
57Remote DSM
Nodeview / Agentview syntax for Remote DSM
abrowser -_at_ Outside_DSMip -c browser.SysAgtUnix
-h agenthost -s public abrowser r -_at_
Outside_DSMip -c browser.SysAgtUnix -h agenthost
-s public -r for dsm
routing e.g abrowser -r -_at_ RMTDSM -c
browser.SysAgtNT -h ukslsag02 -s admin where
RMTDSM - remote dsm ukslsag02 -
Agent managed by RMTDSM abrowser
issued from dawya01 which is inside the
firewall nodeview -_at_ Outside_DSM_host
-target agenthost_at_dsmhost
58AgentView Menus
Update Policy to default r for dsm routing
59ViewAgent WorldView Menu
Add -r for dsm routing
60Architecture Reviews
61Scenario 1
Client has a requirement to deploy agent
technology in DMZ environment but wish to
customize the port numbers that are to be
unblocked?
62Scenario 1 Solution
- Customize ports by updating
- agentworks_dir\services\config\aws_snmp\aws_snmp.
cfg - agentworks_dir\services\config\aws_sadmin\aws_sad
min.cfg - agentworks_dir\services\config\aws_orb\aws_orb.cf
g
63Scenario 2
Client has a requirement to deploy agent
technology in DMZ environment but has concerns
of opening UDP ports. How can Agent Technology
be deployed in DMZ environment without the
requirement to unblock UDP ports?
64Standard Deployment
- What are the UDP issues with the standard
deployment? - DSM discovers Agents by sending UDP requests to
SNMP or 6665 port - Agents send the alerts over UDP port
- Agentview (abrowser) will send its request on
6665 port and with the pre selected TCP source
ports. The agent then responds back on the source
port
65Standard Deployment
- Standard Deployment
- Agent send traps over UDP port 162
- Requires 162 to be unblocked
66Standard Deployment
SNMP Trap
67Standard DeploymentAgentView
- abrowser -c browser.SysAgtNT -h -s
admin - Destination UDP port 6665
- Source Port 8011
68Solution
- Set up a Remote DSM to control the DMZ Agents and
funnel all of their UDP traffic through the DSM
via TCP Port 7774. - Devices in the DMZ managed by the remote dsm.
- Agents send the SNMP traps to remote dsm
- All UDP traffic within the DMZ environment
- aws_dsm and aws_wvgate require access to CORE
thus SQL port must also be opened - Benefits
- 1 TCP Port
- SQL Port
69Solution 2
CORE Host
TCP 1433 (SQL)
TCP 7774
FIREWALL
DSM
WV Gateway
2 Ports Open .. one is SQL
Common Services
UDP 162 - Traps
UDP 161, ICMP Ping
Host A
Common Services
70CORE
Running remote aws_wvgate does not eliminate the
need for SQL Port. DSM still requires access to
CORE
Remote DSM need access to CORE
Server A
Server B
Worldview EM Obrowse Abrowse
COR
DSM
OS
DSM
Managed System
Inside
DMZ
71Scenario 3
Client has a requirement to deploy agent
technology DSM outside the firewall but wants to
use a Central Core which resides inside the
firewall. Firewall administration has concerns
about SQL intrusion and will not open up SQL
port. How can aws_wvgate be configured to use a
Central CORE without opening a SQL port?
72Solution 3
- Install wvdbt where the CORE resides
- Remote aws_dsm accesses CORE via ORB (port 7774)
- aws_wvgate accesses CORE via ORB
- Check for inform remote option to optimize
heartbeat - Benefit
- No requirement to open up SQL port
73Firewall
NT
NT
Aws_orb aws_store aws_snmp aws_dsm Aws_wvgate
Aws_orb wvdbt
7774
Note Multiple DSMs can connect to the same
remote wvdbt instance running against a single
CORE. aws_dsm uses wvplugin may take about 8 RCBs
on CORE server. This restricts, approx maximum of
about 120 Remote DSM connection.
74Scenario 4
Client is using DSM routing but does not wish to
open port 7774 for all hosts that are required to
respond to abrowser requests? How can this be
minimized?
75Requirements
- To restrict 7774 to be unblocked just for local
DSM - Placing abrowser directly on remote DSM requires
7774 to be opened for the host that issues
abrowser requests
76Agentview RemoteDSM orb
abrowser -_at_ DAWYA01S -r -c browser.SysAgtNT -h
RGT40.ca.com-s admin
7774 to be opened for all hosts that issues
abrowser.
Obrowser Abrowser
Binds to first available port
adminhost
Responds back on source port
remoteDSM
7774
EWB_NTS_03
dawya01s
UDP
6665
Managed System
Managed System
RGT40
77Agentview From adminhost
78Windows Terminal ServerStreamline Requests from
Terminal Server
abrowser -_at_ EWB_NTS_03 -r -c browser.SysAgtNT
-h RGT40.ca.com_at_DAWYA01S -s admin
7774 to be unblocked for local dsm and WTS
Terminal Client
7774
7774
Windows TERMINAL SERVER obrowser Abrowser
remteDSM
7774
UDP
6665
Managed System
79Scenario 5
How to walk through Firewall for a typical FM
site? What are the considerations?
80Scenario 5
Bridge Critical Objects
Client site
DMZ site
Service Center
DSM
Terminal Client
NAT
Windows Terminal Server
81Scenario 5
- Windows Terminal Server eliminates the need to
open Visualizing / browser ports for many hosts - Nodeview / Agent View / 2d Maps all accessed via
Terminal Server - Requires Terminal Services Client 3389 port to be
opened - Critical Objects Bridged from Client site to DMZ
environment
82Scenario 5
- Critical Events forwarded from Client site to FM
site. Requires CCI port to be unblocked - Event Console launched via Terminal Services
Client
83Scenario 5
- To avoid NAT issues, run world view discovery
from client site. - This will have pre Natted address
- Avoids conflict with gwipflt.dat
- Use name melding option to distinguish bridge
objects
84Scenario 6
Firewall Administrator insists on single
directional unblocking of ports. All outbound
ports opened but block all inbound ports. All
network requests should be initiated from within
the firewall zone. No network traffic should be
initiated from DMZ zone How can this be
accomplished?
85Single Directional Unblocking
PRIVATE DSM
DMZ DSM
SQL Port must be bi directional
86Single Directional UnblockingFirewall Rules
Unblock SQL for bi directional
87Obrowser / Abrowser Private ? DMZ zone
- Nodeview / Agentview works fine if initiated from
inside firewall
88Obrowser / Abrowser DMZ ? Private zone
Nodeview / AgentView requests denied if initiated
from DMZ zone.
7774 and 7770 Denied
89Single Directional Unblocking
- If unblocking SQL port is not accepted then
review Bridge Through Firewall presentation
90Scenario 7
Clients wish to minimize the number of ports to
be un-blocked to 1? How can VPN tunneling
feature be used to accomplish this?
91VPN Tunnelling
- Main concept is to tunnel all DMZ requests via
tunnel
92Scenario 7Working with VPN
Unicenter Server
DMZ Server
encrypted
encrypted
Port xxx
unencrypted
Route DMZ Server traffic via VPN tunnel
93Scenario 8
We wish to deploy Windows Terminal Server outside
firewall and wish to connect via Terminal
Services Client from inside the firewall. This
is to reduce different ports to be opened for
visualization? How can we configure this?
94Scenario 8wvdbt
- Remote DSM and Remote aws_wvgate connects to
central core using wvdbt - Agent Views and NodeViews issued from Terminal
Services Client. - TS Client traffic encrypted and requires 3389 to
be unblocked for all TS Clients - WVDBT requires orb connection and thus 7774 port
to be opened for the server where CORE resides
95Scenario 8wvdbt
Abrowser, NodeView and Event Console issued via
WTS
WTS
Terminal Services Client
encrypted
TCP 3389
Port 7774 to be opened for Central DSM only
wvdbt
TCP 7774
6665/7774
access core via wvdbt
2 Ports Open Remote DSM access CORE via wvdbt
96Encrypted TrafficTS Client Port 3389
Encrypted traffic
97Scenario 8SQL
- Remote DSM and Remote aws_wvgate connects to
central core using SQL - Agent View and NodeView issued from Terminal
Services Client. - TS Client traffic encrypted and requires 3389 to
be unblocked for all TS Clients - SQL port 1413 needs to be unblocked for remote
dsm server
98Scenario 8 SQL
abrowser and Nodeview issued via WTS
CORE DSM
TCP 1433 (SQL)
FIREWALL
TCP 3389
2 Ports Open .. SQL to be opened for just
Central DSM
ABROWSER NodeView
UDP 162 - Traps
UDP 161, ICMP Ping
99Solution 8TS Client Denials
TS Client port 3389 must be unblocked
100Scenario 8Local Catalog
- The global catalog resides outside the firewall.
- No CAM port required unless namespace inside
firewall is selected
101Solution 8Local Catalog
3389
Event Console, Agent View, qbrowser
102Scenario 8Global Catalog
- The Global Catalog resides inside firewall.
- When UE is launched from WTS, it syncs catalog
and requires CAM port to be unblocked - TNDREPUPLISH, pings the Global catalog server and
may require ICMP to be opened - CAM should be configured to connect via TCP port
103Solution 8Global Catalog
3389
cam 4105
Event Console, Agent View, qbrowser
104CAM DenialUDP Port
CAM not configured to use TCP
105Solution 8cam.cfg
\TND\CA_APPSW\framework\cam.cfg
This forces specified server to use TCP port and
not default UDP
106Scenario 8Namespace inside Firewall
- Access to nodeview, agentview inside Firewall is
required Launched from UE - Requires TCP 7774 orb port to be unblocked
- Requires UDP 6665 port to be unblocked for host
inside firewall
107Solution 8 NameSpace inside Firewall
4105
7774
6665
Event Console, Agent View, qbrowser
108Node View from UE
Requires orb port 7774
109Node View from UE
Requires orb port 7774
110Unblock Orb 7774
111Node View from UE7774 Unblocked
112Agent View from UE
113Agent View from UE
Agent Technology Service Control Port required.
No DSM Routing
114Agent View from UE
UDP Port to be opened
115Scenario 82dMap inside Firewall
- 2dMap launched from UE accesses CORE inside
firewall - WV Plugin requires CAM port to be unblocked
- No SQL port required for 2dmap accessed via wv
plugin
116Solution 82dMap inside Firewall
4105
wvplugin
4105
SQL Port Not Required
117Architecture ReviewsRecap
- Customize from ports by updating aws_snmp.cfg
- If UDP traffic is to be blocked, install remote
dsm outside the firewall - If SQL port is to be blocked, then review wvdbt
implementation - If bi-directional blocking is not accepted then
review Scenario 5 - If encryption with minimal number of ports to be
unblocked is required, then review Scenario 7
118Scenario 9
Our Firewall Administrator wish to change the orb
port 8774 for DMZ server. Orb port for other
hosts will remain as default port 7774 Is this
possible?
119Multiple Orb Binds
- To support TNG 2.1 release, it permits binding to
multiple ports, 7774 and 7770. - If unable to bind first port, it will then bind
with other ports specified. - Do not use this option unless show stopper
requirements as the feature was not intended to
be exploited in the nature, though it works
120Solution 8Multiple Orb Ports
8774
7774
7774
Aws_orb
121Multiple Orb Ports
First PLUGIN statement must be the one that is
widely used port. If it cannot bind the first
port specified, it then attempt to bind to the
second port
122CAM/CAFT
123Cam/caft
- Default port assignments
- cam.cfg
- udp_port number
- tcp_port number
- cas_port number
- spx_port number
-
-
-
124Cam/caft
- On startup, checks for etc/services for camudp
and camtcp - If not found, then defaults to 4104 (UDP) and
4105 (TCP) - Then checks for cam.cfg for any override
- cas_port and spx_port available for certain
platforms - Some apis do not read config file, thus
etc/services should be changed
125CCI
126CCI
- Review CCI through Firewall presentation for
detailed information
127Event Management
128Event Agent
- Can be customized to use DSB without the need for
sql database - Agent Technology provides function to send
messages to remote Event Management - This eliminates the need for Event Management
running - Not best practice as it limits lot of
functionality
129DSM to Remote Event Management
- Update aws_nsm.cfg
- dsm message sent over to remote via orb
130Options
131Anti Virus Option - AVO
CA Web Site
FTP
Virus
Signature
Downloads
Encryption
Encryption
NT Workstation
AVO Master Download Server
NBSESSION
AVO
NBDATAGRAM
Signature
Download
FIREWALL
Workstation
AVO Domain Server
NBSESSION
NBDATAGRAM
Ethernet
Workstation
PC
Workstation
Workstation
AVO Client
AVO Client
AVO Client
AVO Client
132Advanced Storage Option - ASO
ASO Manager
- Unicenter TNG / ASO Manager
TCP 6051
TCP 6050
Unicenter TNG / ASO Backup Server Central DB
Unicenter TNG / ASO Windows NT Backup Server
TCP 6051
Unicenter TNG / ASO Replicator (NT)
Mainframe backup
133Summary of Ports by Product
Product Component Port Used Unicenter TNG WV
Tools to CORE TCP 1433 (SQL) DSM to CORE TCP
7774 WV Tools to Agents UDP 6665 Auto-discover
y ICMP (Ping), UDP (161) Enterprise
Management TCP 7001 Agent to DSM UDP 162 Remote
Control Option Manager to Agent TCP 799 Software
Delivery Option Admin GUI to Enterprise
Database TCP 1433 (SQL) Admin GUI to Local
Server TCP 1433 (SQL) Enterprise Database to
Local Server DTO (TCP 4101) Local Server and
Agent Share UDP 138 (nbsession) TCP 139
(nbdatagram) Asset Management Option Admin GUI
to AMO Enterprise Data TCP 1433 (SQL) Engine to
AMO Enterprise Database TCP 1433 (SQL) Sector to
Engine Share or RPC Agent to Client Share or RPC
134Summary of Ports by Product
continued
Product Component Port Used Advanced Help
Desk Server and Client TCP 2100 Performance Manag
er to Agent TCP 4101 Share Anti-Virus
Option Virus Signature Database Host TCP 21
(FTP) to CA Virus Signature Web Server Agent
to Virus Signature Machine FTP (for period
signature down-load) Agent Alerts to Alert
Manager NetBUI (Over TCP) Advanced Storage
Option Admin to Backup Manager TCP 6050,
6051 Agent(Client) to Backup Manager NT,
Novell, OS/2 TCP 6050 Unix TCP 6051 Replicator
NT TCP 6060 Replicator to Backup Manager NT TCP
6050 Data Transport Option Manager and Agent
(CAM) TCP 4104, 4105, 4905