Table of Contents
Preface ...........................................................................................................................................................................4
Part II. ZoneRanger Concepts.....................................................................................................................................13
Chapter 2: Address Patterns.....................................................................................................................................15
Chapter 3: Address Transforms...............................................................................................................................16
Chapter 4: Audit.......................................................................................................................................................18
Chapter 5: Backups/Profiles....................................................................................................................................20
Chapter 6: Destination Groups................................................................................................................................22
Chapter 7: Device Groups.......................................................................................................................................23
Chapter 8: GVI/RGVI..............................................................................................................................................25
Chapter 9: Joining....................................................................................................................................................32
Chapter 10: Licensing..............................................................................................................................................34
Chapter 11: Managed Nodes...................................................................................................................................35
Chapter 12: Node Groups........................................................................................................................................36
Chapter 15: Proxy Caching.....................................................................................................................................46
Chapter 16: Proxy Map............................................................................................................................................48
Chapter 17: Server Groups......................................................................................................................................54
Chapter 18: Whitelist...............................................................................................................................................57
Part III. ZoneRanger Services.....................................................................................................................................58
Chapter 19: Discovery.............................................................................................................................................58
Chapter 20: Forwarding...........................................................................................................................................61
Chapter 21: FTP Proxy............................................................................................................................................65
Chapter 22: HTTP/HTTPS Proxy...........................................................................................................................67
Chapter 23: ICMP Proxy.........................................................................................................................................73
Chapter 24: NTP Proxy............................................................................................................................................74
Chapter 25: Polling..................................................................................................................................................77
Chapter 26: Root Cause...........................................................................................................................................79
Chapter 27: SNMP Proxy........................................................................................................................................80
Chapter 28: TCP Proxy............................................................................................................................................91
Chapter 29: Telnet/SSH Proxy................................................................................................................................93
Chapter 31: TFTP Proxy........................................................................................................................................108
Chapter 32: Traffic Monitoring.............................................................................................................................110
Chapter 33: Whitelisting........................................................................................................................................111
Part V. ZoneRanger Applications..............................................................................................................................340
Chapter 38: HP OM...............................................................................................................................................341
Chapter 39: Web File.............................................................................................................................................347
Appendices.................................................................................................................................................................353
A. SNMP Agent.....................................................................................................................................................353
C. SOCKS..............................................................................................................................................................365
D. IP Address Aliasing...........................................................................................................................................367
ZoneRanger 5.5 User's Guide
6