Setting Additional Firewall Controls for Specific Servers
You can set additional controls for specific servers. These rules can substitute different user IDs for some types of logons, manage licenses, and specify times during which these connections might be made.
These specifications are grouped under Additional Control on the Firewall Main Menu:
GSFWPMNU Firewall iSecurity System: RLDEV Basic Security Analysis 1. Activation and Server Settings 41. Log, Queries, What-If Analysis 2. IP, Systems Basic Filtering 42. Reporting of Definitions 3. Users and Groups 4. Native Objects 45. Rule Wizards 5. IFS Objects 46. Test Security Rules Additional Control 11. FTP/REXEC 12. Telnet 13. Passthrough Maintenance 14. DDM, DRDA, SSH, Port... 81. System Configuration 15. Incoming/Outgoing Socket Connections 82. Maintenance Menu 17. Free Style Rules 89. Base Support 18. PC Application Security Selection or command ===> F3=Exit F4=Prompt F9=Retrieve F12=Cancel F13=Information Assistant F16=System main menu |
To set controls for FTP and REXEC under both IPv4 and IPv6, select 11. FTP/REXEC. The FTP/REXEC Login Security screen appears, as shown in Setting Additional Controls and Displaying Logs for FTP/REXEC.
To set controls for Telnet Logons under both IPv4 and IPv6, select 12. Telnet. The Telnet Security screen appears, as shown in Setting Additional Controls and Displaying Logs for Telnet.
To set controls for Passthrough Logons, select 13. Passthrough. The Passthrough Security screen appears, as shown in Setting Additional Controls and Displaying Logs for Passthrough Logons.
To set controls for DDM, DRDA, DHCP, and SSHD, as well as setting TCP/IP port restrictions and managing licenses for other products, select 14. DDM, DRDA, SSH, Port... The Work with Advanced Security screen appears, as shown in Setting Additional Firewall Rules and Displaying Logs for DDM, DRDA, DHCP, and Other Servers.
To set controls for Incoming and Outgoing Socket Connections, select 15. Incoming/Outgoing Socket Connections. The Incoming/Outgoing Connection Rules screen appears, as shown in Setting Firewall Rules for Socket Connections.
To control access to PC Applications, select 18. PC Application Security. The Work with Client-Application Security screen appears, as shown in Securing PC Client Applications.