The difference between Level 30 and Level 40 is that 30 allows calls to
undocumented system API's whilst 40 doesn't.  If you have some bad
program(mer)s you may find that your applications fall over under 40 whereas
they will work under 30.  You can use the system auditing to enable checking
for this sort of activity.

You can use the security wizard from Client Access Express Operations
Navigator - it's great, informative and friendly.

Dwayne Lindner
Senior Analyst - Data Centre
Wesfarmers Rural Division
184 Railway Parade, Bassendean WA 6054
Ph: (08) 9273 5365    Mob: 0407 386 693

-----Original Message-----
From: Frank Reiss []
Sent: Tuesday, 23 January 2001 00:20
Subject: AS/400 Security

What is the difference between level 30 and 40 - I had always thought that
40 was a better choice. Also, what are some of the basic security concerns
on the AS/400, on a system that has no connection to the internet, but does
have PC file transfers. 
If there is a FAQ on all this kindly direct me to it.

Do You Yahoo!?
Yahoo! Auctions - Buy the things you want at great prices.
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to
| To subscribe to this list send email to
| To unsubscribe from this list send email to
| Questions should be directed to the list owner/operator:

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.