Setting Firewall Rules for DRDA Post-check User Replacement
To view and set rules for post-check user replacement for DRDA connections, select 5. DRDA Post-check user replacement from the Work with Advanced Security screen (STRFW > 14), as shown in Setting Additional Firewall Rules and Displaying Logs for DDM, DRDA, DHCP, and Other Servers.
The Work with DRDA Post-check User Replacement screen appears:
Work with DRDA Post-check User Replacement Type options, press Enter. 1=Select 4=Delete Subset . . . Source Source User for OS/400 Opt Location User* Security checks A KING1 KING2 AS400NKZ ITCMN ITCMN QQQ V VOVA Bottom F3=Exit F6=Add new F8=Print F12=Cancel |
The body of the screen consists of four fields, starting with an Opt field for entering options. Each line refers to one user or group of users from a particular locations.
The remaining fields are:
Source Location
The name of the system from which the user is connecting.
Source User*
A user name from the remote system. This can be a single name or generic* name or *ALL for all users for whom there are no more specific rules.
User for OS/400 Security checks
The user on the current system whose authority Firewall checks after doing its other checks.
To add Firewall rules for a user and system, press the F6 key. The Add DRDA Post-check User Replacement screen appears, as shown in Adding Firewall Rules for DRDA Post-check User Replacement.
To modify Firewall rules for a user and system, enter 1 in the Opt field for that user and system. The Modify DRDA Post-check User Replacement screen appears, as shown in Modifying Firewall Rules for DRDA Post-check User Replacement.
To delete Firewall settings for a user and system, enter 4 in the Opt field for the user and system. The Delete DRDA Post-check User Replacement screen appears, as shown in Deleting Firewall Rules for DRDA Post-check User Replacement.