Group access policies identify distinct user groups for a connection, and allow you to apply common connection attributes and security settings to the entire group. In combination with IP filtering, this allows you to permit and restrict access to specific IP addresses on your network.
Your network has several groups of distributed users, each of whom need access to different resources on your corporate LAN. A group of data entry users needs access to the database and several other applications, while a people from other companies needs dial-up access to HTTP, FTP and Telnet services, but for security reasons must not be allowed access to other TCP/IP services or traffic. Defining detailed connection attributes and permissions for each user will duplicate your efforts, and providing network restrictions for all the users of this connection profile won't provide enough control. You'd like a way to define connection setting and permissions for several distinct groups of users who routinely dial into this server.
You need to apply unique IP filtering restrictions to two different groups of users. To accomplish this, you will create group access policies and IP filter rules. Group access policies reference IP filter rules, so you need to create your filter rules first. In this example, you need to create a PPP filter to include IP filter rules for the "IBM® Business Partner" Group Access Policy. These filter rules will permit HTTP, FTP and Telnet services, but restrict access to all other TCP/IP traffic and services through the iSeries™ server. This scenario only shows the filter rules needed for the sales group; however, you can also set up similar filters for the "Data Entry" group.
Finally, you need to create the group access policies (one per group) to define your group. Group access policies allow you to define common connection attributes to a group of users. By adding a Group Access Policy to a Validation list on the iSeries server, you can apply these connection settings during the authentication process. The group access policy specifies several settings for the user's session, including the ability to apply IP filtering rules that will restrict the IP addresses, and TCP/IP services available to a user during their session.
###The following 2 filters will permit HTTP (Web browser) traffic in & out of the system. FILTER SET services_rules ACTION = PERMIT DIRECTION = INBOUND SRCADDR % = * DSTADDR = 192.18.2.3 PROTOCOL = TCP DSTPORT = 80 SRCPORT % = * FRAGMENTS = NONE JRN = OFF FILTER SET services_rules ACTION = PERMIT DIRECTION = OUTBOUND SRCADDR % = 192.18.2.3 DSTADDR = * PROTOCOL = TCP DSTPORT = * SRCPORT = % 80 FRAGMENTS = NONE JRN = OFF ###The following 4 filters will permit FTP traffic in & out of the system. FILTER SET services_rules ACTION = PERMIT DIRECTION = INBOUND SRCADDR % = * DSTADDR = 192.18.2.3 PROTOCOL = TCP DSTPORT = 21 SRCPORT % = * FRAGMENTS = NONE JRN = OFF FILTER SET services_rules ACTION = PERMIT DIRECTION = OUTBOUND SRCADDR % = 192.18.2.3 DSTADDR = * PROTOCOL = TCP DSTPORT = * SRCPORT = % 21 FRAGMENTS = NONE JRN = OFF FILTER SET services_rules ACTION = PERMIT DIRECTION = INBOUND SRCADDR % = * DSTADDR = 192.18.2.3 PROTOCOL = TCP DSTPORT = 20 SRCPORT % = * FRAGMENTS = NONE JRN = OFF FILTER SET services_rules ACTION = PERMIT DIRECTION = OUTBOUND SRCADDR % = 192.18.2.3 DSTADDR = * PROTOCOL = TCP DSTPORT = * SRCPORT = % 20 FRAGMENTS = NONE JRN = OFF ###The following 2 filters will permit telnet traffic in & out of the system. FILTER SET services_rules ACTION = PERMIT DIRECTION = INBOUND SRCADDR % = * DSTADDR = 192.18.2.3 PROTOCOL = TCP DSTPORT = 23 SRCPORT % = * FRAGMENTS = NONE JRN = OFF FILTER SET services_rules ACTION = PERMIT DIRECTION = OUTBOUND SRCADDR % = 192.18.2.3 DSTADDR = * PROTOCOL = TCP DSTPORT = * SRCPORT % = 23 FRAGMENTS = NONE JRN = OFF
###The following statement binds (associates) the 'services_rules' filter set with the PPP filter ID "permitted_services." This PPP filter ID can then be applied to the physical interface associated with a PPP connection profile or Group Access Policy. FILTER_INTERFACE PPP_FILTER_ID = permitted_services SET = services_rules