Copying Firewall Settings for Passthrough Logons

Passthrough logons are considered for distinct or generic request patterns, in which a Source User on a Source System requests to connect to the current system as a Target User.

To copy Firewall settings from one request pattern to another, enter 3 in the Opt field for that item on the Passthrough Security screen (STRFW > 13 > 1) as shown in Setting Additional Controls for Passthrough Logons.

The Copy Passthrough Security screen appears:

                          ​ Copy Passthrough Security​                            
                                                                                
  ​
 From:​                                                                        
    ​
 Source system . . . . .​  ​ RAZLEE2 ​                                         
    ​
 Source user . . . . . .​  ​ QSECOFR   ​                                       
    ​
 Target user . . . . . .​  ​ USRTGT    ​                                       
                                                                                
  ​ Automatic Sign-on . . . .​  ​ *ALTLOGON ​                                       
                                                                                
 To copy, type New Source system, New Source user and New Target user,​          
 press Enter.​                                                                   
                                                                                
  ​
 To:​                                                                          
    ​
 New Source system . . .​  ​                  ​ Name, *ALL           ​          
    ​
 New Source user . . . .​  ​                  ​ Name, generic*, *ALL ​          
    ​
 New Target user . . . .​  ​                  ​ Name, *SAME, *ANY, F4 for list​ 
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
 F3=Exit​  ​ F4=Prompt​  ​ F12=Cancel​                                               
                                                                                

The first four fields, in the From: section, show the values for the original request.

Enter information for the new request pattern into the remaining fields, in the To: section:

New Source System

The name of the system from which the user is logging on. This can be a single name or generic* name or *ALL for all systems for which there are no more specific rules.

New Source User

A user name from the remote system. This can be a single name or generic* name or *ALL for all users for whom there are no more specific rules.

New Target User

The user on the current system as whom the remote user would like to log on. This can be a single user name, *SAME to connect as the same user, or *ANY for any user name. For a list of known users, press the F4 key.