Copying Firewall Settings for Passthrough Logons
Passthrough logons are considered for distinct or generic request patterns, in which a Source User on a Source System requests to connect to the current system as a Target User.
To copy Firewall settings from one request pattern to another, enter 3 in the Opt field for that item on the Passthrough Security screen (STRFW > 13 > 1) as shown in Setting Additional Controls for Passthrough Logons.
The Copy Passthrough Security screen appears:
Copy Passthrough Security From: Source system . . . . . RAZLEE2 Source user . . . . . . QSECOFR Target user . . . . . . USRTGT Automatic Sign-on . . . . *ALTLOGON To copy, type New Source system, New Source user and New Target user, press Enter. To: New Source system . . . Name, *ALL New Source user . . . . Name, generic*, *ALL New Target user . . . . Name, *SAME, *ANY, F4 for list F3=Exit F4=Prompt F12=Cancel |
The first four fields, in the From: section, show the values for the original request.
Enter information for the new request pattern into the remaining fields, in the To: section:
New Source System
The name of the system from which the user is logging on. This can be a single name or generic* name or *ALL for all systems for which there are no more specific rules.
New Source User
A user name from the remote system. This can be a single name or generic* name or *ALL for all users for whom there are no more specific rules.
New Target User
The user on the current system as whom the remote user would like to log on. This can be a single user name, *SAME to connect as the same user, or *ANY for any user name. For a list of known users, press the F4 key.