Setting Firewall Rules for DRDA Post-check User Replacement
To view and set rules for post-check user replacement for DRDA connections, select 5. DRDA Post-check user replacement from the Work with Advanced Security screen (STRAUD > 14), as shown in Setting Additional Firewall Rules and Displaying Logs for DDM, DRDA, DHCP, and Other Servers.
The Work with DRDA Post-check User Replacement screen appears:
|                    Work with DRDA Post-check User Replacement  Type options, press Enter.   1=Select 4=Delete   Subset . . .   Source   Source   User for OS/400  Opt Location   User*   Security checks    A   KING1   KING2     AS400NKZ   ITCMN   ITCMN     QQQ   V   VOVA   Bottom  F3=Exit F6=Add new F8=Print F12=Cancel    | 
The body of the screen consists of four fields, starting with an Opt field for entering options. Each line refers to one user or group of users from a particular locations.
The remaining fields are:
Source Location
The name of the system from which the user is connecting.
Source User*
A user name from the remote system. This can be a single name or generic* name or *ALL for all users for whom there are no more specific rules.
User for OS/400 Security checks
The user on the current system whose authority Firewall checks after doing its other checks.
To add Firewall rules for a user and system, press the F6 key. The Add DRDA Post-check User Replacement screen appears, as shown in Adding Firewall Rules for DRDA Post-check User Replacement.
To modify Firewall rules for a user and system, enter 1 in the Opt field for that user and system. The Modify DRDA Post-check User Replacement screen appears, as shown in Modifying Firewall Rules for DRDA Post-check User Replacement.
To delete Firewall settings for a user and system, enter 4 in the Opt field for the user and system. The Delete DRDA Post-check User Replacement screen appears, as shown in Deleting Firewall Rules for DRDA Post-check User Replacement.
