Appendix B: Servers and Functions

Network Security supports the following servers.

Exit Point Server Description
*CLI Call Level Interface
*DDM Distributed Data Management Server
*DRDA Distributed Relational Database
*DQSRV Data Queue Server
*FILESRV File Server
*FTPCLIENT IBM i FTP Client
*FTPSERVER IBM i FTP Server
*NDB Native Database Request
*RMTSRV Remote Command and Distributed Program Call Server
*RTVOBJINF SQL Retrieve Object Information
*SQL Database Server Initialization
*SQLSRV SQL Server
*TELNET Telnet Device Initiation/Termination
*DATAQSRV Optimized Data Queue Server
*FTPREXEC FTP Execute Remote Command (REXEC)
*REXEC_SO Remote Execute Command Signon Server
*TFRFCL File Transfer Server
*TFTP Trivial FTP Server
*VISTA ShowCase *VISTA Servers
*VISTAPRO ShowCase *VISTAPRO Server
*CNTRLSRV License Management Central Server
*FTPSIGNON FTP Logon Server
*LMSRV License Management Server
*MSGFCL Message Function Server
*RQSRV Remote SQL Server
*SIGNON Signon Server
*VPRT Virtual Print Server
DATADIST ShowCase DATADIST server
QNPSERV Network Print Server
VISTA_ADMI ShowCase VISTA_ADMI Servers

Network Security also provides access control and monitoring for socket exit points:

Exit Point Server Description
QSOLISTEN Socket Listen server
QSOCONNECT Socket Connect server
QSOACCEPT Socket Accept server

Network Security also provides access control and monitoring for exit points that are specific to the ShowCase software suite. See the table of ShowCase Servers shown below:

Exit Point Server Description
*VISTA
A Showcase corporation server.
ShowCase *VISTA Clients
*VISTAPRO
A Showcase corporation server.
ShowCase *VISTAPRO Clients
DATADIST
A Showcase corporation server.
ShowCase DATADIST Clients
VISTA_ADMI
A Showcase corporation server.
ShowCase VISTA_ADMI Clients

Understanding Servers

Networked clients, including Client Access, can communicate with several servers on IBM i for network access. Network Security integrates with these servers, at the exit-point level, to allow you to specify your own access rules. You should have a clear understanding of what these servers do to develop and implement an effective network security plan.

In general, each server corresponds with a client function, such as file transfer, FTP, or remote command. In some cases, IBM created two servers for some functions. It is important to secure both servers to completely secure your IBM i.

Network Security allows you to set rules for how to secure each server. The following table lists the servers used by the various client functions. Note: The mapping of client function to server is subject to change by IBM. For the latest information from IBM, go to the Information Center Web site at www.iseries.ibm.com/infocenter. Click the Client Access Express link, select Administering Client Access Express, and then select Host Server Administration.

Client Function OS/400 Server IBM Server ID
File Transfer Transfer Function Server 
Database Server
*TFRFCL 
*SQL
*NDB
*SQLSRV
*RTVOBJINF
ODBC Remote SQL Server 
Database Server
*RQSRV
*SQL
*NDB
*SQLSRV
*RTVOBJINF
Shared Folders Distributed Data Management Server 
File Server
*DDM 
*FILESRV
Virtual Print Virtual Print Server 
Network Print Server
*VPRT 
QNPSERVR
Data Queue API Original Data Queue Server 
Optimized Data Queue Server
*DQSRV 
*DATAQSRV
Remote Command Distributed Data Management Server 
Remote Command and Distributed
Program Call Server
*DDM 
*RMTSRV
Message Function Message Function Server *MSGFCL
License and Client Management License Management 
Central Server
*LMSRV 
*CNTRLSRV
FTP FTP Client 
FTP Execute Remote Command
FTP Server FTP Signon Trivial FTP
*FTPCLIENT 
*FTPREXEC 
*FTPSERVER 
*FTPSIGNON 
*TFTP
Distributed Relational
Database
DRDA Server 
CLI Connect Server
*DRDA 
*CLI
Signon Signon Server *SIGNON
Distributed Program
Call
Remote Command and Distributed
Program Call Server 
Remote Execution Signon
*RMTSRV  
*REXEC_SO
Telnet Telnet *TELNET

When a networked client makes a request of a server, it requests the server to execute a particular function. For example, when you prompt for a list of files in the Client Access data transfer function, it sends a request to the File Transfer Server to execute the EXTRACT function. When you request to download a file to a PC, it sends a request for the SELECT function.

Network Security allows you to set security rules for the server as a whole, but also for individual functions within a server.

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
7.17 | 201803210423