CC-SG Access via NAT-enabled Firewall

If the firewall is using NAT (Network Address Translation) along with PAT (Port Address Translation), then Proxy mode should be used for all connections that use this firewall. The firewall must be configured for external connections to ports 80 (non-SSL) or 443 (SSL), 8080 and 2400 to be forwarded to CC-SG since the PC Client will initiate sessions on these ports.

Note: It is not recommended to run non-SSL traffic through a firewall.

Connections using the firewall must be configured to use Proxy mode. See Connection Modes: Direct and Proxy. CC-SG will connect to the various targets on behalf of the PC Client requests. However, the CC-SG will terminate the PC Client to Target TCP/IP connection that comes through the firewall.

See Also

CC-SG Communication Channels

CC-SG and Raritan Devices

CC-SG Clustering

Access to Infrastructure Services

PC Clients to CC-SG

PC Clients to Nodes

CC-SG and Client for IPMI, iLO/RILOE, DRAC, RSA

CC-SG and SNMP

CC-SG Internal Ports

RDP Access to Nodes

VNC Access to Nodes

SSH Access to Nodes

Remote System Monitoring Port