A.05.70 HP Insight Remote Support Advanced and Remote Device Access Security Overview (October 2011, 5900-1735)
Figure 2-2 Proactive Services System Architecture
2.12.2 Proactive Configuration Collection Components Installed on the CMS
• Remote Support Configuration Collector (RSCC)
The Remote Support Configuration Collector (RSCC) schedules and consolidates configuration information
collections from entitled servers and devices using standard collection agents (Level 2 collectors) like
WBEM and SNMP, it can also collect information using (Level 3 collectors) proprietary agents like the
HP-UX ACC (Advanced Configuration Collector). RSCC can also collect information using SSH or Telnet
to a device to manually execute a command and capture the results. The RSCC is updated regularly
to extend support for new products as they become available.
This component is configured in the Remote Support Configuration and Services option in HP SIM.
NOTE: For more details on how to configure configuration collections, please refer to the
HP Insight
Remote Support Advanced Central Management Server Configuration Guide
at http://www.hp.com/
go/insightremoteadvanced-docs.
• Remote Support Configuration Collector Extension
This component is designed to extend the capabilities of the Remote Support Configuration Collector
for SAN Environments by enabling remote execution capabilities for Windows SAN management
servers to allow collection of SAN environment configuration and status information.
2.12.3 Proactive Configuration Collection Components Installed on Managed Systems
Advanced Configuration Collector (ACC) Depot for HP-UX 11.X
The HP-UX ACC is used to collect configuration information for proactive reporting. Proactive reporting is a
premium service for mission critical support agreements. The HP-UX ACC is installed on the HP-UX managed
systems and is accessed via the System Management Homepage. Collection data is sent to HP for analysis.
Reports are generated and delivered via an HP account team representative.
2.12.4 Security Credentials
Digital Certificates
Certificates generated by HP Systems Insight Manager and the Web Agents are by default self-signed. Public
Key Infrastructure (PKI) support is provided so that certificates may be signed by an internal certificate server
or a third-party Certificate Authority (CA). In addition, System Management Homepage also creates self-signed
certificates and maintains a key store where it stores these certificates for the purposes of exchange with
CMS nodes.
RSCC utilizes both HP SIM and HP SMH keys for signing and authentication of messages as well as for
browser to system HTTPS access. HP SIM and HP SMH self-signed digital certificates are set to expire ten
years from the time of creation. If a certificate expires, the UC system will sense that the certificate has expired
2.12 Proactive Services 33