(BSM) Firewall port aggregation
I am working on a project where customer has HP Openview products setup already running. This customer supports/Develops and Monitor many high profile and secure networks. Customer has a new requirement where they are planning to add 1 more end customer network to monitoring platform with 2 data center locations. Please find the attached architecture diagram for more details. Being this network highly secure and high profile they are planning to have jump server(proxy server) on the edge of the data center where all the HP Openview products are hosted. Customer is planning to route all the traffic through this jump server to the destination network(new customer location). All the traffic reaches on the new network will have single IP address of the jump server.
In this setup HP software solutions will get the real hostname/IP address on the communication. Like if HP PI send a request a network device in the new location till it reaches the jump/proxy server IP address of the source remain same and when it pass through the proxy, source IP will be masked with a new IP. When the reply comes from the device destination details will be the original one and while passing through the proxy/jump server IP address will be translate back to the original source IP. I would like to check this will be a supported/certified setup for all the products mentioned in the attached diagram.
Please find the product version details below
BSM 9.13.120, Build 26
Re: (BSM) Firewall port aggregation
you already received an answer via the BSM email forum:
I believe in this case, all you need is the NAT/PAT translation of the IP address, not necessarily a jump server configuration.
Between, BSM alone cannot perform any task.. mention other components like BPM/RUM/NNMi ???
Thanks & Regards,
If you find that this or any post resolves your issue, please be sure to mark it as an accepted solution.