ipsec command SERVAUTH profile
Security product authorization (for example, RACF®) is required to use the ipsec command. You must define a profile in the SERVAUTH class to enable
control over the ipsec command function. You can
define separate profiles during installation to control access to
different aspects of the ipsec command. The format
of the profile when accessing a local stack is as follows:
EZB.IPSECCMD.sysname.stackname.command_typeWhere: - sysname
- The name of the system on which the ipsec command is allowed to run.
- stackname
- The tcpprocname value of the local TCP/IP stack for which the ipsec command is authorized. Specify the stackname value DMD_GLOBAL to authorize the use of the global defensive filter option (-G). The wildcard value asterisk (*) authorizes the use of the global defensive filter option and authorizes all stacks.
- command_type
- The ipsec command type; either DISPLAY or CONTROL
| Resource names in SERVAUTH class | ipsec options |
|---|---|
| EZB.IPSECCMD.sysname.stackname.* | All ipsec options |
| EZB.IPSECCMD.sysname.stackname.DISPLAY | -f display
-F display -m display -k display -y display -t -i -o |
| EZB.IPSECCMD.sysname.stackname.CONTROL | -f default
-f reload -F add -F delete -F update -m activate -m deactivate -k deactivate -k refresh -y activate -y deactivate -y refresh |
| EZB.IPSECCMD.sysname.DMD_GLOBAL.DISPLAY | -F display -G
|
| EZB.IPSECCMD.sysname.DMD_GLOBAL.CONTROL | -F add -G
-F delete -G -F update -G |
| EZB.IPSECCMD.sysname.stackname.CONTROL (for each stack to which the global command applies) | -F add -G
-F delete -G -F update -G |
When accessing a remote stack using the NSS server, the
following format applies:
EZB.NETMGMT.sysname.clientname.IPSEC.command_typeWhere:
- sysname
- The system name on which the ipsec command is allowed to run.
- clientname
- The name of an NSS client.
- command_type
- The ipsec command type; either DISPLAY or CONTROL.
Requirement: You must define these profiles on the system where the NSS server and the ipsec command are running
| Resource names in SERVAUTH class | ipsec options |
|---|---|
| EZB.NETMGMT.sysname.clientname.IPSEC.* | All ipsec options |
| EZB.NETMGMT.sysname.clientname.IPSEC.DISPLAY |
|
| EZB.NETMGMT.sysname.clientname.IPSEC.CONTROL |
|
Restriction: You cannot display and manage defensive filters for an NSS client that is managed by the NSS server.
Use the following format when querying IKED for NSS configuration
information using the ipsec -w command:
EZB.NETMGMT.sysname.sysname.IKED.DISPLAYWhere: - sysname
- The name of the system on which the ipsec command is allowed to run.
The format of the profile when accessing the NSS server
using the ipsec -x command is:
EZB.NETMGMT.sysname.sysname.NSS.DISPLAYWhere: - sysname
- The name of the system on which the ipsec command is allowed to run.
If the security product is RACF, you can use the control statements in the sample JCL job that is provided in SEZAINST(EZARACF) to define these authorizations. If the SERVAUTH class is not active or if a matching SERVAUTH policy is not found, the ipsec request is rejected.
Tip: Authorization is not required for the help option (ipsec -?).