At each successive release of CA NSM, an attempt is made to optimize the communication methodologies, thus reducing the security and administrative concerns. The following primary communication protocols are used with CA NSM:
Each of these methods has different security considerations, such as which ports are required to be open, whether or how they encrypt data, and so forth.
The following sections clarify the usage and considerations for each of these methodologies. For additional information regarding port configuration, see "Utilizing and Configuring Ports."
|
Copyright © 2010 CA.
All rights reserved.
|
|