Managing HP servers through firewalls with Insight Management 7.2

White paper| HP Insight Management 7.2
17 | March 2013
CMS
Managed
system
Port
Protocol
1
Description
Y Y 25 TCP
SMTP: used for e-
mail transmission
across
Internet
Protocol (IP)
networks
Y Y 50004 HTTPS/HTTP WBEM event
receiver
(configurable)
1
All ports are for TCP and UDP.
2
The CMS normally has all managed system ports open because the CMS is a managed system
itself. Firewalls can be configured to block these ports if the CMS is not to be managed from
another system.
Deployment and migration
Increase deployment speeds by 12X (20 minutes versus 4 hours) with consistency and reliability
using ProLiant servers. HP Insight Control Server Deployment helps conserve time in the network
through its capabilities. In this case, you must allow protocols between the Management server
and systems.
Control
Staff efficiencies stem from time saved on tasks performed by IT administrators and technicians
and translate into increased productivity benefits in server administration, server deployment,
server asset management, server hardware maintenance, and new application deployment time.
With this type of computing environment, the administrator has to allow the protocols required to
communicate between the systems through the connected firewall.
Integration
A company uses HP Insight Control to help manage its Microsoft Hyper-V environment, especially
to deploy virtual servers. Integrate Insight Control directly into HP Operations Center or with
VMware and Microsoft for single-console access to virtual and physical resources. The Matrix
Operating Environment can move a server profile from one physical blade to another, bringing the
flexibility of virtualization to physical servers. With this type of computing environment, the
administrator has to allow the protocols required to communicate between the systems through
the connected firewall.
Selecting the protocols that must be enabled through the firewall depends on the types of system
to be managed. Issues associated with each protocol are discussed in the following paragraphs.
Ideally, WBEM is used to manage servers located through a firewall.