Using VPN Tunneling - trillium_quality - Latest

Trillium Director Guide

Product type
Software
Portfolio
Verify
Product family
Trillium
Product
Trillium > Trillium Quality
Version
Latest
Language
English
Product name
Trillium Quality
Title
Trillium Director Guide
Copyright
2024
First publish date
2008
Last updated
2024-10-18
Published on
2024-10-18T15:24:10.895371

Data security is of increasing concern to many organizations. In most cases, data security should be handled with multiple approaches. The first approach is to only transmit or store required information. Another approach is to encrypt the transmitted data. Your IT staff may choose to use a Virtual Private Network (VPN) package or an SSH tunnel for remote access, which will encrypt data. Trillium Director allows you to select a data security package that is appropriate for your organization.

If you are using VPN Tunneling software, you can set up the IP address to be used by Directors, cleansers, and matchers in one of two ways.

or,

  • Modify the Windows registry to specify the IP address to be used.

The registry format is automatically created and, as a general rule, users should not modify registry data. To use a tunneling protocol, however, you can use the Registry Editor to add a new string value to the following registry key:

HKEY_LOCAL_MACHINE

    \System\CurrentControlSet\Services\ serviceName \Parameters

Add a string value for:

CleanserHost - host or IP address that a cleanser server will use to handle requests.

MatcherHost - host or IP address that a matcher cleanser will use to handle requests.

This allows the use of an IP address that is different from the default IP address. This might be used if the default IP address is incorrect due to use of VPN software or if a Tunneling protocol is required.

Another option that may be useful is to start cleanser or matcher servers with the -P option, described in -P cleanser_port, which sets a specific port on which the cleanser or matcher will listen for service requests from the client.