13.11.1 Range of communication that can be encrypted by the communication encryption function
The following figures and tables explain the range of communication that can be encrypted by the communication encryption function.
The numbers in the figure correspond to the numbers in the following table.
No. |
Location of communication |
Description |
|
---|---|---|---|
Connection source |
Connection target |
||
1 |
Web browser (integrated operation viewer) |
Intelligent Integrated Management server#1 |
Used for connection from the viewer (integrated operation viewer) to JP1/IM - Manager (Intelligent Integrated Management Base) |
2 |
Intelligent Integrated Management server#2 |
Authentication server |
Used for user authentication |
The parenthesized numbers in the figure correspond to the numbers in the following table.
No. |
Location of communication#1 |
Description |
|
---|---|---|---|
Connection source |
Connection target |
||
1 |
Central Console viewer |
Event console service#2 |
Used for connection from JP1/IM - View to JP1/IM - Manager (event console service) |
2 |
Central Console viewer |
Command execution#2 |
Used when commands are executed from JP1/IM - View |
3 |
jcochstat command#2 |
Event console service (another host)#2 |
Used when the jcochstat command with another host specified in the -h option is executed |
4 |
Event console service#3 |
Authentication server#3 |
Used for user authentication |
5 |
Event console service#4 |
Event service (agent host) #4 |
Used for connection from the event console service to the event service of the agent host |
The parenthesized numbers in the figure correspond to the numbers in the following table.
No. |
Location of communication#1 |
Description |
|
---|---|---|---|
Connection source |
Connection target |
||
1 |
Central Scope viewer |
Central Scope service#2 |
Used for connection from JP1/IM - View to JP1/IM - Manager (Central Scope service) |
2 |
Central Scope service#3 |
Authentication server#3 |
Used for user authentication |
The parenthesized numbers in the figure correspond to the numbers in the following table.
No. |
Location of communication#1 |
Description |
|
---|---|---|---|
Connection source |
Connection target |
||
1 |
IM Configuration Management viewer |
IM Configuration Management service#2 |
Used for connection from JP1/IM - View to JP1/IM - Manager (IM Configuration Management service) |
2 |
IM Configuration Management service |
IM Configuration Management service on a lower manager#2 |
Used when IM connections are synchronized |
3 |
IM Configuration Management service#3 |
Authentication server#3 |
Used for user authentication |