RPGIV @ Work

A unique site for RPG and System i Lovers


Hi, this site will provide all what you need in System i and RPG developments.

My Name is Chamara Withanachchi, System i Expert and RPG Developer. And in the field for last 11 years.

I hope you will find lot of valuable information from this site

V5R4 i5/OS Intrusion Detection System Print E-mail
User Rating: / 1
Written by Chamara Withanachchi   
V5R4 i5/OS Intrusion Detection System

For many years, the System i has let you build or buy network server exit programs to audit and control network access through tools such as FTP, DDM, ODBC, and Remote Command. But the system has never had the capabilities of what is generally referred to as Intrusion Detection, until now.

In V5R4, IBM introduces the i5/OS Intrusion Detection System (IDS). The IDS is an integrated part of the operating system and can detect the following types of attacks and probes:

  • Denial of service attacks
  • Port scans
  • Malformed packets
  • IP fragments
  • Restricted IP options and protocols
  • Internet Control Message Protocol (ICMP) redirect messages
  • Perpetual echo attacks on User Datagram Protocol (UDP) port 7 (the echo port)

How do I run the IDS?

It takes several steps to configure and monitor your system's IDS. The steps are nicely documented in a new IBM manual and a new Redbook referenced at the end of this article.

Generally, here are the configuration steps involved:

1) Change TCP attributes to IP QoS enablement *YES

2) Start auditing *ATNEVT by adding *ATNEVT to the QAUDLVL System value

3) In the IFS, create a usable IDS Policy file, IDSPOLICY.CONF

4) Start the TCP/IP Server *QoS

5) Review the Intrusion Monitor by reviewing the IM-type journal entries from the QAUDJRN journal. You can either buy a commercial solution for reporting QAUDJRN security events or use the following methods:


This copies IM entries, if any, to qtemp/qauditim.


This queries the IM entries from qtemp/qauditim.