Rob,
When a PC connects to System I A it is a client of System I A and System I A is the PC's host. Before the connection to System I A is made the PC is the host.
System I A wants to connect to Systemb. Before the connection is made System I A is the host and Systemb is the target.
Gary Monnier
IT Software Engineer II
T 425.895.6457
F 425.556.8777
E Gary.Monnier@xxxxxxxxx
Terex Aerial Work Platforms
18465 NE 68th St.
Redmond, WA 98052
www.genielift.com
-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of rob@xxxxxxxxx
Sent: Thursday, May 17, 2012 12:58 PM
To: Midrange Systems Technical Discussion
Subject: RE: RMTCMD's security?
Gary,
What do you mean by "host"? I really don't mean this as sarcasm.
Rob Berendt
--
IBM Certified System Administrator - IBM i 6.1 Group Dekko Dept 1600 Mail to: 2505 Dekko Drive
Garrett, IN 46738
Ship to: Dock 108
6928N 400E
Kendallville, IN 46755
http://www.dekko.com
From: "Monnier, Gary" <Gary.Monnier@xxxxxxxxx>
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx>,
Date: 05/17/2012 03:46 PM
Subject: RE: RMTCMD's security?
Sent by: midrange-l-bounces@xxxxxxxxxxxx
Rob,
Nope. Are you blind?
I'm just amazed at responses seemingly disregarding host system security.
I just want to make sure I understand what is being said before I call
B***t.
Gary Monnier
-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx [
mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of rob@xxxxxxxxx
Sent: Thursday, May 17, 2012 12:17 PM
To: Midrange Systems Technical Discussion
Subject: RE: RMTCMD's security?
Gary,
did your email reader chop this off from the bottom of Scott's message:
On 5/17/2012 11:27 AM, rob@xxxxxxxxx wrote:
Should you be securing the "from" machine (ie the system they initiate
the remote command from), or should you be securing the "to" machine?
Rob Berendt
--
IBM Certified System Administrator - IBM i 6.1 Group Dekko Dept 1600 Mail
to: 2505 Dekko Drive
Garrett, IN 46738
Ship to: Dock 108
6928N 400E
Kendallville, IN 46755
http://www.dekko.com
From: "Monnier, Gary" <Gary.Monnier@xxxxxxxxx>
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx>,
Date: 05/17/2012 03:13 PM
Subject: RE: RMTCMD's security?
Sent by: midrange-l-bounces@xxxxxxxxxxxx
Scott,
By "to" machine do you mean the target system or the host system?
Gary Monnier
-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx [
mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Scott Klement
Sent: Thursday, May 17, 2012 11:12 AM
To: Midrange Systems Technical Discussion
Subject: Re: RMTCMD's security?
You should always secure the "to" machine. Securing the "from" machine
isn't even worthy of being called "security".
On 5/17/2012 11:27 AM, rob@xxxxxxxxx wrote:
Should you be securing the "from" machine (ie the system they initiate
the remote command from), or should you be securing the "to" machine?
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe,
unsubscribe, or change list options,
visit:
http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a
moment to review the archives at
http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.