Security considerations for limiting TCP/IP roaming

If your system is connected to a network, you may want to limit your users’ ability to roam the network with TCP/IP applications.

One way to do this is to restrict access to the following client TCP/IP commands:
Note: These commands might exist in several libraries on your system. They are in both the QSYS library and the QTCP library, at a minimum. Be sure to locate and secure all occurrences.
Your users’ possible destinations are determined by the following: You need to control who can add entries to these tables and change your configuration. You also need to understand the implications of your table entries and your configuration.
Be aware that a knowledgeable user with access to an ILE C compiler can create a socket program that can attach to a TCP or UDP port. You can make this more difficult by restricting access to the following sockets interface files in the QSYSINC library: For service programs, you can restrict use of socket and SSL applications that are already compiled by restricting use of these service programs: The service programs are shipped with public authority *USE, but the authority can be changed to *EXCLUDE (or another value as needed).