Securing the TrueSight Infrastructure Management components

You can upgrade the security in your enterprise environment by using Transport Layer Security (TLS 1.2) to communicate with the various components of the TrueSight Operations Management solution. The following section shows an illustration of the security architecture diagram, and provides the procedure to enable the TLS 1.2 security standards.

Related topics

TLS considerations for TrueSight Capacity Optimization

TLS considerations for TrueSight Operations Management Reporting

Network port schematics for Infrastructure Management

Security Architecture Diagram - TrueSight Infrastructure Management Server and related components


Note: The arrow in the above diagram indicates connection initiation request from client to server.

To configure the TrueSight Infrastructure Management and its components to enable TLS 1.2, see  Securing communication among Infrastructure Management components

Was this page helpful? Yes No Submitting... Thank you

Comments