You can use File Transfer Protocol (FTP) exit points to protect the iSeries™ from this topic.
FTP provides a security level based on the i5/OS™ object security. This means that remote users cannot log on to the iSeries FTP server unless they have a valid user profile and password.
You can provide additional security by adding FTP exit programs to the FTP Server and Client exit points to further restrict FTP access to your system. For example, you can restrict FTP logon capability, as well as access to libraries, objects, and the use of commands.
You can write an FTP Server Request Validation exit program to restrict the CL commands and FTP subcommands that users can access.
You can control the authentication of users to a TCP/IP application server with an exit program for the Server logon exit point.
You can write an FTP Client Request Validation exit program for the Client exit point: Request validation. This controls which FTP client functions a user may perform.
Depending on your situation, you might consider limiting access to FTP subcommands using Application Administration Limit Access as an alternative to writing exit programs for the FTP Server Request Validation and FTP Client Request Validation exit points.
To allow the exit programs to work properly, you must Install and register your exit point programs. If your programs are no longer needed, you must properly Remove the exit point programs to prevent their future functioning.