14.02.2014 Views

CommandCenter Secure Gateway - Admin Guide - Version ... - Raritan

CommandCenter Secure Gateway - Admin Guide - Version ... - Raritan

CommandCenter Secure Gateway - Admin Guide - Version ... - Raritan

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Appendix H: FAQs<br />

Question<br />

How will the Windows desktop<br />

be supported in the future?<br />

What are some design<br />

guidelines for large-scale<br />

systems? Any constraints or<br />

assumptions?<br />

Will CC-SG auto-detect and<br />

update the blade chassis<br />

configuration when I move the<br />

blade chassis from one KX2<br />

port to another KX2 port?<br />

How to merge the blade<br />

server node and the virtual<br />

host node if they refer to the<br />

same server?<br />

Answer<br />

Accessing CC-SG from outside the firewall can be<br />

achieved by configuring the right ports on the<br />

firewall. The following ports are standard ports:<br />

80: for HTTP access via web browser<br />

443: for HTTPS access via web browser<br />

8080: for CC-SG server operations<br />

2400: for Proxy mode connections<br />

5001: for IPR/DKSX/DKX/ P2-SC event notification<br />

If there is firewall between two cluster nodes, the<br />

following ports should be opened for cluster to be<br />

worked properly:<br />

8732: for cluster nodes heartbeat<br />

5432: for cluster nodes DB replication<br />

<strong>Raritan</strong> provides two models for server scalability:<br />

the datacenter model and the network model.<br />

The datacenter model uses Paragon to scale to<br />

thousands of systems in a single datacenter. This is<br />

the most effective and cost-efficient way to scale a<br />

single location. It also supports the network model<br />

with IP-Reach and the IP User Station (UST-IP).<br />

The network model scales through use of the<br />

TCP/IP network and aggregates access through<br />

CC-SG, so users don't have to know IP addresses<br />

or the topology of access devices. It also provides<br />

the convenience of single sign-on.<br />

CC-SG does not auto-detect and update the blade<br />

chassis configuration when you move it to another<br />

KX2 port or device. The configuration is lost so you<br />

must configure the blade chassis in CC-SG once<br />

again.<br />

You should configure the Virtualization feature prior<br />

to configuring the blade slots. When configuring the<br />

blade slot, enter the same name as the virtual host<br />

node, and choose to add this interface to the<br />

existing node when a message appears.<br />

307

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!