× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



IIRC Adding and removing exit points requires at least *ALLOBJ special authority

jte


On Aug 20, 2011, at 5:29 AM, rob@xxxxxxxxx wrote:

...unless there's some way to deregister exit programs from iNav.


Rob Berendt
--
Group Dekko
Dept 1600
Mail to: 2505 Dekko Drive
Garrett, IN 46738
Ship to: Dock 108
6928N 400E
Kendallville, IN 46755
http://www.dekko.com





From: John Earl <john.earl@xxxxxxxxxxxxxxxxxxxx>
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx>
Date: 08/19/2011 09:00 PM
Subject: Re: TELNET Project
Sent by: midrange-l-bounces@xxxxxxxxxxxx



Robert,

The QIBM_QTG_DEVINIT exit point will provide the data you want - and will
also provide you with the ability to deny certain users or IP addresses
with access to Telnet (though the security geek in me feels compelled to
note that this exit point alone will not prevent other network connections
such as FTP, ODBC, etc. from a valid user).

It's a simple interface with a data structure parameter list that provides
a number of fields into the program and a single binary out of the program
(An allow/deny access switch). You can use the input parameters to
capture things like user name, job name, job number, and _I_think_ IP
address. If the parameter list doesn't provide IP address, I know that
information is available in one of the "current job" API calls (Gary
Monnier probably knows for sure) so you might have to make an extra
program call.

The only other thing to do then is arrange the data in a format (File,
Dataq, journal?) that is easy for you to report on. Should be a simple
task.

One word of caution - when you attach the exit program to the exit point,
all future Telnet connections will be regulated by this exit program - so
if it has a bug, no one will be able to make a new connection. Therefore,
when testing, have aan active connection (or 5) that you can use to
unregister the exit point just in case. (Just some been there done that
advice.)

HTH

jte



On Aug 18, 2011, at 8:30 AM, Robert Munday wrote:

Greetings from the sunny south.





I have been tasked with capturing the user profiles and IP addresses
of
those who sign into our system remotely. An analyst has directed me
to
the IBM site for instructions on TELNET processing. It uses a program
at
the Exit Point - QIBM_QTG_DEVINIT, and this is where I am to capture
the
data. I have downloaded and am reviewing the programs from the IBM
site.



Have you worked with this type of data capture? It's new to me and I
seek
your guidance.



Thanks,







Robert Munday

Munday Software Consultants

Montgomery, AL
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.


--
John Earl
President and CEO,
Townsend Security
360-359-4418
townsendsecurity.com
The Encryption Company

--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.


--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.


--
John Earl
President and CEO,
Townsend Security
360-359-4418
townsendsecurity.com
The Encryption Company


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.