Getting Started with Network Security

Before installing Network Security, check the HelpSystems website for any additional information, such as Release Notes.

NOTE: The Powertech installation procedure creates libraries, profiles, authorization lists, commands, objects, and, in some cases, exit points on your system. Changing the configuration of any of these installed application components may result in product failure.

Installation and Activation Introduction

Installation and activation are two separate processes. First, the installation process installs Network Security on your IBM i system. The second process, activation, activates the Network Security exit programs. If you install the software, but do not complete the activation process, Network Security protection and auditing are not active. However, after you have completed both processes, Network Security can actively audit and secure your network traffic. You can install Network Security at any time, but activation requires planning and scheduling.

See Installing or Updating Network Security 7 on the HelpSystems website for installation and update instructions.

NOTE: Powertech Network Security makes two changes to your network attributes during exit program activation. These modifications are necessary so the operating system is aware of the exit programs that have been assigned to the IBM exit points.
 
Parameter Description Before After
DDMACC DDM request access *OBJAUT PTNS0107
PCSACC Client request access *OBJAUT *REGFAC

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
7.17 | 201803210423