× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Luis,

We are currently using V5R3 but plan to upgrade to V5R4 this month. We
have been using wrkodbcjob and SECTCP. Both of these tools have been
extremely helpful. Wrkodbcjob does provide a snapshot of the user and
IP accessing a system but it requires someone to keep checking it which
doesn't work for offhours (no logging). SECTCP does produce a log on IP
addresses that access FTP and telnet but does not include the userid.
Like Rob mentioned in his post below, we realize that various sources
can be used to find the information but we really need something that is
combined for easy access to show the auditors.

These are some of the reasons why this has been so difficult to
accomplish. Rob and Luis, thanks for trying to help.

Diana Hicks
Town of Jupiter

midrange-l-request@xxxxxxxxxxxx wrote:------------------------------
From: midrange-l-bounces+bryan_burns=echo-usa.com@xxxxxxxxxxxx
[mailto:midrange-l-bounces+bryan_burns=echo-usa.com@xxxxxxxxxxxx]On
Behalf Of Luis Rodriguez
Sent: Monday, July 09, 2007 9:48 AM
To: Midrange-L
Subject: Re: Log of IP connections with UserId?



Diana,

Which release are you using? AFAIK, until V5R3, this wasn't available
(in the freeware world, at least). Bryan Dietz has a nice utility that
can show you all the ODBC connections. You can find it at:

http://home.columbus.rr.com/jbmmdietz/wrkodbcjob.html

Also, there is an utility called SECTCP at www.easy400.net that can log
all the FTP connections.

Hope this helps.

Regards,

Luis Rodriguez
-----Original Message-----
date: Mon, 9 Jul 2007 11:09:06 -0400
from: rob@xxxxxxxxx
subject: Re: Log of IP connections with UserId?

Something like
NETSTAT OPTION(*CNN)
only, instead of F13-Sort by port number, F14 show port number, showing
you port 23 (telnet) being used by address xx.yy.zz.aa and user QTCP,
and
an option 5 telling you the remote host name is MYLAPTOP and then using
DSPDEVD to determine the device using that IP address, and then
determining who, from that PC is using that 5250 device manually you
want
something to do this all automatically? Good luck with that. Some
things
have changed with V5R4. For example if I do a WRKACTJOB SBS(QSYSWRK) I
can see the user actually doing some of the work and not something like
QTCP and have to look at the joblog to determine who is being
"serviced".
Like this FTP session I currently have active:
Current
Subsystem/Job User Type CPU % Function Status
QTFTP00196 ROB BCH .0 SELW
...


PLEASE NOTE: Florida has a very broad public records law. Most written
communications to or from the Town of Jupiter officials and employees regarding
public business are public records available to the public and media upon
request. Your e-mail communications may be subject to public disclosure. Under
Florida law, e-mail addresses are public records. If you do not want your
e-mail address released in response to a public records request, do not send
electronic mail to this entity. Instead, contact this office by phone or in
writing. The views expressed in this message may not necessarily reflect those
of the Town of Jupiter. If you have received this message in error, please
notify us immediately by replying to this message, and please delete it from
your computer. Thank you.


As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.