Adding Firewall Rules for IFS Objects with the Rule Wizard
To add firewall rules to filter activity by the IFS objects on which it would operate via the Rule Wizard, press the F6 key from the Plan IFS Security screen, shown in Analyzing Recent Data on IFS Objects with the Rule Wizard (STRFW > 5 > 42).
The Add IFS Object screen appears:
Add IFS Object Type choices, press Enter. User . . . . . . Name, generic*, User Grp, *PUBLIC, F4 for list File Sys⁄Root Dir Name, ⁄, F4 for list Directory⁄File . Name, generic*, *ALL Read Write Rename Delete Move Revised authority . . Y, N Examples for Directory⁄File: *ALL All files in all directories file* File or Generic* file folder⁄file* File or Generic* file in a directory folder⁄ The directory itself F3=Exit F4=Prompt F12=Cancel |
The first three fields on the screen specify the objects and users to which the rule would apply:
User, <GrpPrf or '%GROUP'
The user or group requesting the activity. This can be a user name, a generic* name, a group name, a group profile, or *ALL for all users.
File Sys/Root Dir
The file system or root directory containing the object. This can be a name or the "/" character to indicate the root filesystem. To see a list of possible values, press the F4 key.
Directory/File
The directory and file to which access would be requested. This can be a single name, a generic* name, or *ALL (representing all the objects within the directory or file system.
The Revised Authority fields indicate whether the user or group may perform each of a set of operations (Read, Write, Rename, Delete, or Move) on the object. Set these to Y to accept the requests, S to accept the request, but do not log it, or N to reject them. If a field is left blank, it inherits the value from the next higher group, up through *PUBLIC.