Setting Firewall Rules for DRDA Post-check User Replacement

To view and set rules for post-check user replacement for DRDA connections, select 5. DRDA Post-check user replacement from the Work with Advanced Security screen (STRFW > 14), as shown in Setting Additional Firewall Rules and Displaying Logs for DDM, DRDA, DHCP, and Other Servers.

The Work with DRDA Post-check User Replacement screen appears:

                  ​ Work with DRDA Post-check User Replacement​                   
                                                                                
 Type options, press Enter.                                                  ​   
  ​
 1=Select  4=Delete  ​                           ​ Subset . . .​                 
                                                                                
   ​
 Source    ​  Source    ​  User for OS/400​                                    ​ 
Opt​
 Location  ​  User*     ​  Security checks​                                     
    A         ​  KING1     ​   ​ KING2     ​                                        
    AS400NKZ  ​  ITCMN     ​   ​ ITCMN     ​                                        
    QQQ       ​  V         ​   ​ VOVA      ​                                        
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                  ​
       Bottom​ 
 F3=Exit    F6=Add new    F8=Print    F12=Cancel                      ​          
                                                                                
                                                                                

The body of the screen consists of four fields, starting with an Opt field for entering options. Each line refers to one user or group of users from a particular locations.

The remaining fields are:

Source Location

The name of the system from which the user is connecting.

Source User*

A user name from the remote system. This can be a single name or generic* name or *ALL for all users for whom there are no more specific rules.

User for OS/400 Security checks

The user on the current system whose authority Firewall checks after doing its other checks.

To add Firewall rules for a user and system, press the F6 key. The Add DRDA Post-check User Replacement screen appears, as shown in Adding Firewall Rules for DRDA Post-check User Replacement.

To modify Firewall rules for a user and system, enter 1 in the Opt field for that user and system. The Modify DRDA Post-check User Replacement screen appears, as shown in Modifying Firewall Rules for DRDA Post-check User Replacement.

To delete Firewall settings for a user and system, enter 4 in the Opt field for the user and system. The Delete DRDA Post-check User Replacement screen appears, as shown in Deleting Firewall Rules for DRDA Post-check User Replacement.