IBM Support

Configure Host Servers with TLS using Navigator for i

Troubleshooting


Problem

A common security measure to take on an IBM i system is to configure the system to be TLS only. An important component of that is setting up the Host Servers on the system to be able to connect to them using a TLS connection. This guide will cover:
  1. Configuring the Host Servers for TLS connections
  2. Setting up Secure Connections in Navigator such that users are utilizing the TLS Host Server ports
  3. Disabling the Non-TLS Ports (Optional)
Disabling the Non-TLS ports can affect the functionality of some of the older IBM i applications like Web Admin GUI. Digital Certificate Manager also requires additional setup in order to work TLS-only that is not documented in this guide.

Environment

IBM i 7.3 and later

Resolving The Problem

You are in: IBM i Technology Updates  > Navigator for i > Documentation on Functional Areas > Configure Host Servers with TLS using Navigator for i
1. Configuring the Host Servers for TLS Connections
Open Navigator for i and through the side menu goto Network > Servers > TLS ConfigurationScreenshot of selecting TLS Configuration on the side menu
In this table, we can see the Network Servers that can be TLS Configured, as well as the TLS related status of those servers. 
Screenshot of the TLS Configuration table
From here, right click any row, and select Configure TLS Wizard
In the first step, the user can choose which servers are being configured by the current wizard. All the servers in the TLS Configuration table can be configured at the same time.
Screenshot of the first step of the Network TLS Wizard - showing that all servers can be selected for a single run of the wizard
In the second through fourth steps, the user selects a certificate store and certificate for the TLS Configuration. It's important to note that this wizard only works with CMS certificate stores. The *SYSTEM store managed by Digital Certificate Manager is a good option if another certificate store isn't available on the target system.
Screenshot of selecting a Certificate Store in the wizard
On step five, the user is prompted with the option to restart the host servers on completion of the wizard. In order for the assigned certificates to be used by the host servers, they should be restarted first. 
Screenshot of the Restart Servers step of the wizard
On the last step of the wizard a summary of the user's selections are provided.
Screenshot of the summary step of the wizard
Upon completion of the wizard, the user will return to the TLS Configuration table. An easy way to confirm that the configuration has run correctly is to expand the row of a server that was just configured. The user should see the certificate they assigned to that server listed.
Screenshot showing the row expansion & assigned server shown
2. Setup Secure Connections in Navigator
Using secure connections in Navigator is how you configure a user profile to use the TLS enabled host server ports. In the side menu, navigate to Serviceability > Connection Properties
Screenshot of Connection Properties in Navigator side menu
Select TLS Connection on the side menu in the new window to get to the TLS Connection/Nodes tab
Screenshot of the TLS Connection page
In the TLS Enablement column, if the user selects "On" for the target system, that will ensure this user profile will use the TLS ports for the Host Servers on that system. If the current user doesn't see the "Use TLS For All Users" column, that means they don't have the *ALLOBJ special authority. It's recommended to set TLS for all users if planning to disable the unsecure Host Server ports. 
Once TLS Enablement OR TLS for all Users has been set properly, remember to click save at the bottom. It's easy to miss on smaller screens or with a system and user profile with a lot of nodes.
3. Disabling the Non-TLS Ports (Optional)
Note: Disabling the Non-TLS ports can cause problems for older IBM web applications deployed on IBM i. Web Admin GUI will not work, Digital Certificate Manager requires extra steps to be able to run on the secure ports. User profiles that don't have secure connections set up (section 2) will run into difficulties using Navigator with the Non-TLS ports disabled. It is recommended that Secure Connections is set for all users by an *ALLOBJ profile - as mentioned in section 2.
To disable the non-TLS ports, the user needs to get back to the TLS Configuration table. Navigate through the side menu via Network > Servers > TLS Configuration to get there.
Once back to the table, right click on any row and select Disable Unsecure Port
Note: If this option is disabled, that means the current user isn't setup with secure connections. Go back to section 2 if this is the case.
Screenshot of the rightclick menu of the TLS Configuration table
After that, the user will see the Disable Unsecure Port dialog.
Screenshot of disable unsecure port dialog
In this dialog, select all of the Host Servers that are intended to have their unsecure ports disabled. In order for the changes to take effect, the servers need to be restarted after. Make the selections that make sense for the current user & system and click OK. Once the dialog is finished, the result should be seen in the TLS Configurations Table. If after restarting a change isn't seen, try refreshing the table once. 
Screenshot of an inactive unsecure port
4. Re-enabling the Unsecure Ports
Disabling the unsecure host server ports has a lot of room for errors. Here's some background on what's going on and how to "undo" what's been done if something has gone wrong.
Navigator disables the unsecure ports by applying a port restriction on the unsecure ports. We can see this in Navigator at Network > TCP/IP Configuration > TCP/IP Configuration Properties > Port Restrictions. Below is an example where the Unsecure Port was disabled for the Net Print server. 
Screenshot of Port Restrictions
In the above example, the port restriction was applied for just one port. This table in Navigator tends to group port restrictions together. If the user selected all 7 servers, they will see the QWEBADMIN row represent 7 ports (start & end) as opposed to the one above. 
The Host Servers unsecure ports are the range between 8470 - 8476. If a user wants to re-enable these unsecure ports, remove the QWEBADMIN port restrictions on the 8470 - 8476 ports, and then restart the affected Host Servers. Restarting is best done in the TLS Configuration table in Navigator where the status can be checked after each restart. 

[{"Type":"MASTER","Line of Business":{"code":"LOB68","label":"Power HW"},"Business Unit":{"code":"BU070","label":"IBM Infrastructure"},"Product":{"code":"SWG60","label":"IBM i"},"ARM Category":[{"code":"a8m0z0000000CH1AAM","label":"IBM Navigator for i"}],"ARM Case Number":"","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"All Versions"}]

Document Information

Modified date:
19 December 2024

UID

ibm17179054