<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html lang="en-us" xml:lang="en-us"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="security" content="public" /> <meta name="Robots" content="index,follow" /> <meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' /> <meta name="DC.Type" content="concept" /> <meta name="DC.Title" content="Security considerations for using REXEC server" /> <meta name="abstract" content="These articles discuss methods for securing the REXEC server for authorized users and preventing access to the REXEC server." /> <meta name="description" content="These articles discuss methods for securing the REXEC server for authorized users and preventing access to the REXEC server." /> <meta name="DC.Relation" scheme="URI" content="rzamvtcpsetupsecurity.htm" /> <meta name="DC.Relation" scheme="URI" content="rzamvtcpstoprexec.htm" /> <meta name="DC.Relation" scheme="URI" content="rzamvtcpsecrexec.htm" /> <meta name="copyright" content="(C) Copyright IBM Corporation 2006" /> <meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" /> <meta name="DC.Format" content="XHTML" /> <meta name="DC.Identifier" content="tcprexec" /> <meta name="DC.Language" content="en-us" /> <!-- All rights reserved. Licensed Materials Property of IBM --> <!-- US Government Users Restricted Rights --> <!-- Use, duplication or disclosure restricted by --> <!-- GSA ADP Schedule Contract with IBM Corp. --> <link rel="stylesheet" type="text/css" href="./ibmdita.css" /> <link rel="stylesheet" type="text/css" href="./ic.css" /> <title>Security considerations for using REXEC server</title> </head> <body id="tcprexec"><a name="tcprexec"><!-- --></a> <!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script> <h1 class="topictitle1">Security considerations for using REXEC server</h1> <div><p>These articles discuss methods for securing the REXEC server for authorized users and preventing access to the REXEC server.</p> <p>The Remote EXECution server (REXEC) receives and runs commands from an REXEC client. A REXEC client is typically a PC or UNIX<sup>®</sup> application that supports sending REXEC commands. The support that this server provides is similar to the capability that is available when you use the RCMD (Remote Command) sub-command for the FTP server.</p> </div> <div> <ul class="ullinks"> <li class="ulchildlink"><strong><a href="rzamvtcpstoprexec.htm">Prevent REXEC access</a></strong><br /> This article discusses the steps for preventing users from accessing the REXEC server.</li> <li class="ulchildlink"><strong><a href="rzamvtcpsecrexec.htm">Secure the REXEC server</a></strong><br /> This article provides recommendations for securing the REXEC server.</li> </ul> <div class="familylinks"> <div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvtcpsetupsecurity.htm" title="The following information guides you through the process of setting up TCP/IP security.">Set up TCP/IP security</a></div> </div> </div> </body> </html>