Thank you.

It looks like what I need is described in Appendix A of the Admin Guide, as 
well as section 9.12.

Section 9.13 "Modelling Using SSH/Command" would seem to offer a simple 
solution for my security concerns with a remote server. I'm attempting to 
follow that section now.




-------------------- m2f --------------------

Read this topic online here:
http://community.zenoss.com/forums/viewtopic.php?p=22170#22170

-------------------- m2f --------------------



_______________________________________________
zenoss-users mailing list
[email protected]
http://lists.zenoss.org/mailman/listinfo/zenoss-users

Reply via email to