>CICS of organization "A" is connected (LU6.2 Connection) to CICS of
>organization "B". No problem with that. I looked into the CDRM and found
>some other application of organization "B" defined in VTAMLST of oranization
>"A". Tried LOGON APPLID(xxx) and gpt the GMtran of org. "B" (if it is the
>default, I can travel in this CICS...). I also riched TSO logon etc.
>
>Now, I want to block (at) org "b" ability to get to org "a" applications
>other then the CICS connection that was agreed between Org "A" and "B". Is
>this possible?
>I also want to block the ability to enter logon applid command (may be by
>userid, even of the solution will require entering userid & password). How
>to achive that?
>What other alternatives are offered to connect to vtam applications when 
USS
>tab is displaied, other then LOG APPLID and selecting from the uss tab? I
>mean, is there any bypass to LOG APPLID if blocked?
>
In general, VTAM security has never been implemented because long ago 
when it started everyone thought SNA Pt-to-Pt lines provided it all. Today 
almost all the SNA expertise to even attempt it is extinct, education is even 
lacking. But even for those who have done it, it is only a false sense of 
security. 

Back a few years there was a free VTAM SME exit offered to show you what 
was coming into your VTAM network from SNI connections. Installed it on the 
fly and ran it for 2 hours believing little would show; Wrong-O smart one. It 
scared us silly. Especially with Hercules and MVS 3.8 VTAM which works today 
and can be on the other end, or jumps into the middle of a real connection, it 
is truely frightful. 

So there are companies which offer a SNA Firewall (installs dynamically) to 
truely secure the VTAM SNI connections and lets us sleep sound at night. It is 
imperative the one chosen handles not only SNI but LU6/0/1/2, etc. Another 
benefit is when you are connected to Company A and also Company B. If they 
find out about each other, then A can connect to B using your network saving 
each the expense of making a separate connection. With the Firewall one has 
the ability to look at the BIND and even for connections which are approved, 
it can see the parameters coded and let you know if they are inefficient 
(working fine but eating your lunch). Yes, no one would ever run their TCP/IP 
systems without a Firewall, except I am guessing 99%+ of those who have 
SNA, it never even occurs to them they are highly exposed. 

jim     

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to