Line Printer Requester (LPR)

Verifies that the user has authority to the spooled file to be sent. This function is
accessed through the AS/400 Send TCP/IPSpooled File (SNDTCPSPLF)
command.

Remote Execution (REXEC) Server

On secured systems REXEC requires the user to provide a user ID and password.
The REXEC protocol definition does not provide a way to encrypt password
information.
Note: There are two exit points provided with the AS/400 REXEC server that allow
you to set up security and validation controls. They are described in
“Appendix E. TCP/IPApplication Exit Points and Programs” on page 535.

Packet Internet Groper (PING)

PING is an internet control message protocol (ICMP) function that allows you to
verify the connection to another system without accessing the data on that system.
Youaccess this function through the AS/400 Verify TCP/IP Connection
(VFYTCPCNN) command.

Simple Mail Transfer Protocol (SMTP)

Is not accessible by user-written programs. SMTP is only accessible through
SNADS, thus mail is always in a known format.

TELNET

Requires the user to provide a user ID and password (if a secure system).
The AS/400 TELNETserver application includes two exit points that allow you to
hook into TELNET’s sign-on and termination logic. Youcan use the AS/400
WRKREGINF (Work with Registration Information) or ADDEXITPGM (Add Exit
Program) commands to associate your custom exit program to an exit point. The
exit points are:
vQIBM_QTG_DEVINIT
vQIBM_QTG_DEVTERM
Customer-Written Programs Security
AS/400 TCP/IP provides a program interface to the TCP and UDPlayers. Use the
Revoke Object Authority (RVKOBJAUT) command to control who can access these
layers. QTMTCINT is the name of the program object in library QTCP that is
shipped with the TCP/IP licensed program. Youcan revoke authority to this object
to secure the user interface to TCP/IP.Then, you can use the Grant Object
Authority (GRTOBJAUT) command to give specific user profiles access to the user
interface to TCP/IP.
User-Supplied Mapping Tables
User-defined mapping tables specified on the attributes command for a particular
application should be created with public authority of *USE. The following list
identifies the attributes commands:
514 OS/400 TCP/IPConfiguration and Reference V4R4
|
|
|
|