The sample logs provide examples of different recorded
events. You can compare these samples with your own logs to understand
the events that are being recorded.
Server startup logging
During initialization, the Distributed Access Infrastructure servers unconditionally generate
startup, environment, and configuration log records, as shown in the following example:
2023/12/14 11:49:20.55 00 STARTUP Distributed Access Infrastructure V1.7.0
2023/12/14 11:49:20.55 01 STARTUP Tools Access Server initialization started
2023/12/14 11:49:20.55 TAS#####EC05003E 00 STARTUP Environment:
2023/12/14 11:49:20.55 TAS#####EC05003E 01 STARTUP Job.....DAITAS System...EC05 ASID.....003E
2023/12/14 11:49:20.55 TAS#####EC05003E 02 STARTUP User....USRT001 Group....SYS1 JobNum...STC00079
2023/12/14 11:49:20.55 TAS#####EC05003E 03 STARTUP Local...GMT-08 GMT......2023/12/14 19:49
2023/12/14 11:49:20.55 TAS#####EC05003E 00 PreLoad AIICDM 00007000 AIICDM+20231129+13.34 V1.7.0
2023/12/14 11:49:20.56 TAS#####EC05003E 00 PreLoad AIICMSM 9182ACA0 AIICMSM+20231129+13.34+B0160
2023/12/14 11:49:20.56 TAS#####EC05003E 00 PreLoad AIICMSEI 9182A330 AIICMSEI+20231129+13.34+B0160
2023/12/14 11:49:20.94 TAS#####EC05003E 00 ConfgEXE Parameters given on Job EXEC
2023/12/14 11:49:20.94 TAS#####EC05003E 01 ConfgEXE TYPE=TAS,AIICFG=AIITAS,BPECFG=AIITBPE
2023/12/14 11:49:20.94 TAS#####EC05003E 00 ConfgMem Parameter member name: AIITAS
2023/12/14 11:49:20.94 TAS#####EC05003E 00 ConfgMem TAS configuration member contents
2023/12/14 11:49:20.94 TAS#####EC05003E 01 ConfgMem XcfGroupName(DaiGroup) /* Xcf group name */
2023/12/14 11:49:20.94 TAS#####EC05003E 02 ConfgMem TasServerName(DAI Production TAS) /* Server name */
2023/12/14 11:49:20.94 TAS#####EC05003E 03 ConfgMem SecurityAppl(DAI) /* APPL CLASS name */
System status events
System status events comprise normal operating events such as component startup, component
shutdown, and XCF join and leave status. The following example shows TAS joining the XCF group and
all members in the group at the time the TAS joins:
2023/12/14 11:49:21.53 TAS#####EC05003E 00 STARTUP XCF JOIN Group=DAIGROUP Member=TAS#####EC05003E RC=00000000
2023/12/14 11:49:21.56 TAS#####EC05003E 00 Members Current XCF member information
2023/12/14 11:49:21.56 TAS#####EC05003E 01 Members NTWKTCPSEC050029 Active NTWK TCPSERV DAITCP EC03005
2023/12/14 11:49:21.56 TAS#####EC05003E 02 Members TAS#####EC05003E Active TAS DAITAS EC03005
As other members join and leave the XCF group, their status is recorded in the server log, as
shown in the following example:
2023/12/14 11:58:58.06 TAS#####EC05003E 00 Members SERVTESTEC05002A XCF Member Event=GEMSTATE System=EC03005 Job=TESTTOOL
2023/12/14 11:58:58.06 TAS#####EC05003E 01 Members OldState=Not-Def NewState=Active Type=SERV ID=TESTSERV
Security events
Security events show the connections that are established and terminated, the state of the
connection, the user logon ID on the established connection, and the success and failure of a
client logon.
The format of the IP address displayed in the event log depends on the Internet
Protocol version that is used by the TCP server.
If IPv4 is enabled, the IP address consists of four decimal numbers separated by periods.
For example, 192.0.2.0.
If IPv6 is enabled and the connection request is from an IPv6 client, the IP address
consists of eight hexadecimal numbers separated by colons. For example,
2001:0DB8:0:0:0:0:0:0.
If IPv6 is enabled and the connection request is from an IPv4 client, the IP address
consists of six hexadecimal numbers separated by colons, followed by IPv4 IP address. For
example, 0:0:0:0:0:FFFF:192.0.2.0.
The following examples show these events:
Events for non-secure connections
For a non-secure connection, a TCPIntf (TCP interface) message is displayed indicating that
the connection is not secure.
2023/12/14 17:25:21.44 NTWKTCPSC753002A 00 STARTUP TCP communication starting, Port: 5124, Max connections: 18
2023/12/14 17:25:21.44 NTWKTCPSC753002A 01 STARTUP HOME IP: xxx.xxx.xxx.xxx, HOST NAME: SYSTEM1
2023/12/14 17:25:35.32 NTWKTCPSC753002A 00 TcpIntf TCP socket connected. Socket: 1, IP: xxx.xxx.xxx.xxx
2023/12/14 17:25:35.32 NTWKTCPSC753002A 00 TcpIntf Connection is not secured for Socket: 1
2023/12/14 17:25:38.82 NTWKTCPSC753002A 00 Logon User logon, Socket: 1, User: USRT005
2023/12/14 17:25:38.86 NTWKTCPSC753002A 00 Logon User passed security check: USRT005
2023/12/14 17:26:06.30 NTWKTCPSC753002A 00 Logoff User logged off: USRT005
2023/12/14 17:26:07.93 NTWKTCPSC753002A 00 TcpIntf TCP socket disconnect. Socket: 1, IP: xxx.xxx.xxx.xxx, User: Nouser
2023/12/14 17:25:35.32 NTWKTCPSC753002A 00 TcpIntf TCP socket connected. Socket: 1, IP: xxx.xxx.xxx.xxx
2023/12/14 17:25:35.32 NTWKTCPSC753002A 00 TcpIntf Connection is not secured for Socket: 1
2023/12/14 17:25:38.82 NTWKTCPSC753002A 00 Logon User logon, Socket: 1, User: USRT005
2023/12/14 17:25:38.86 NTWKTCPSC753002A 00 Logon User passed security check: USRT005
Events for secure connections
When a secure connection is established by using IBM z/OS Communications Server Application
Transparent Transport Layer Security (AT-TLS), the TCP server examines the type of the
connection, which is established based on AT-TLS policy statements. The type of the connection
is written to the log as a security event after an event log for TCP socket connection
establishment.
2023/12/14 17:25:35.32 NTWKTCPSC753002A 00 TcpIntf TCP socket connected. Socket: 1, IP: xxx.xxx.xxx.xxx
2023/12/14 17:25:35.32 NTWKTCPSC753002A 00 TcpIntf ClientAuth SAFCheck on Socket: 1, certificate is mapped to the user USRT000
2023/12/14 17:25:38.82 NTWKTCPSC753002A 00 Logon User logon, Socket: 1, User: USRT000
2023/12/14 17:25:38.86 NTWKTCPSC753002A 00 Logon User passed security check: USRT000
2023/12/14 17:26:07.93 NTWKTCPSC753002A 00 TcpIntf TCP socket disconnect. Socket: 1, IP: xxx.xxx.xxx.xxx, User: USRT000
When a connection is established successfully, one of the following event texts is written
to the log. Internal ID TcpIntf is printed immediately before the event text
indicating that the TCP interface was called.
Table 1. Event texts when a connection is established successfully
Event text
Meaning
Server Auth request on Socket: nnnnnnnn, server
certificate is validated
Server is set for the HandshakeRole parameter of the AT-TLS policy.
Server certificate is valid.
ClientAuth SAFCheck on Socket: nnnnnnnn,
certificate is mapped to the user uuuuuuuu
ServerWithClientAuth is set for the HandshakeRole parameter of the AT-TLS
policy.
SAFCheck is set for the ClientAuthType parameter of the AT-TLS policy.
The certificate sent from the client has been validated and mapped to the user ID
(uuuuuuuu).
Client Auth request on Socket: nnnnnnnn, AL-TLS
ClientAuthType was PassThru
ServerWithClientAuth is set for the HandshakeRole parameter of the AT-TLS
policy.
PassThru is set for the ClientAuthType parameter of the AT-TLS policy.
Client certificate validation has been bypassed.
Client Auth request on Socket: nnnnnnnn, client
certificate is validated
ServerWithClientAuth is set for the HandshakeRole parameter of the AT-TLS
policy.
Either Full or Required is set for the ClientAuthType parameter of the AT-TLS
policy.
The certificate sent from the client has been validated.
Client Auth request on Socket: nnnnnnnn, client
certificate was not received
ServerWithClientAuth is set for the HandshakeRole parameter of the AT-TLS
policy.
Full is set for the ClientAuthType parameter of the AT-TLS policy.
The certificate has not been validated because it was not presented by
the client.
Connection is not secured for Socket:
nnnnnnnn
AT-TLS is not used.
If an error is detected in the AT-TLS policy or in the client certificate, either of the
following event logs is written. See Diagnostic aids for connection errors to troubleshoot
connection errors.
Table 2. Event texts when an error is detected in the AT-TLS policy or in the client
certificate
Event text
Explanation
User response
An input message error Socket: nnnnnnnn, invalid
format
The TCP server received a request message that it cannot
interpret.
Ensure that Off is set for the ApplicationControlled parameter of the AT-TLS
policy.
When an AT-TLS connection error occurs, only event logs indicating
the establishment and termination of connections are logged.
Identify the cause of the error from the AT-TLS return code and correct the error.
For more information, see the AT-TLS errors section in Diagnostic aids for connection errors.
The following example shows an unsuccessful logon:
2023/12/14 06:32:26.54 NTWKTCPSC753002B 00 Logon User logon, Socket: 1, User: USRT007
2023/12/14 06:32:26.64 NTWKTCPSC753002B 00 ErrorSeg AII0120E RACROUTE REQUEST=VERIFY,ENVIR=CREATE ended with
RC=00000008 Security system RC=X'00000008' Reason=X'00000000'.
Additional messages might be available in JOBLOG for JOB DAITCP (JOB00090)
2023/12/14 06:32:26.64 NTWKTCPSC753002B 01 ErrorSeg User= Group= Target=AIITCP Dir=Tool
Correlator=00000000 00000000
2023/12/14 06:32:26.64 NTWKTCPSC753002B 02 ErrorSeg Cmmt=ErrorSeg Module=AIINSSEC Status=00000000 Reason=00000810
The previous logon error is accompanied by the following entry in the TCP server job log: