Administration Guide › Managing SystemEDGE and Application Insight Modules (AIMs) › User Permissions and Access Requirements Reference
User Permissions and Access Requirements Reference
The following sections summarize the access requirements to Install CA Virtual Assurance components and monitor your environments using CA Virtual Assurance. Each section includes information about the required communication ports. If a distributed manager installation ranges across firewalls, you can use this list to verify that the required communication ports are open.
This documentation is intended for:
- Administrators who install, configure, and use CA Virtual Assurance to manage virtual environments.
- Operators who use CA Virtual Assurance to monitor virtual environments.
More information:
Active Directory and Exchange Server (ADES)
Cisco UCS
Citrix XenServer
Hyper-V
IBM High Availability Cluster Multiprocessing
IBM PowerVM
Microsoft Cluster Server
Oracle Solaris Zones
Red Hat Enterprise Virtualization
Agent Remote Deployment
Remote Monitoring
SystemEDGE and Advanced Encryption
VMware vCenter
VMware vCloud