advertise your website Login Registration
Submission Guidelines Recent Approved Articles Featured Articles
Submit Free Article
Home About Us Advertising GuideLines Do's & Don't T & C FAQ Contact us
  Home Computers & Technology Articles Software Articles
HostJinni Promotions
Articles Category
Arts & Entertainment
Computers & Technology
Food & Drink
Health & Fitness
Home & Family
Home Based Business
Home Improvement
Just for Women
Kids & Teens
News & Society
Online Business
Online Tickets
Real Estate
Reference and Education
Self Improvement
Sports & Recreation
Travel & Tourism
  Member Area
Author Login
Free Registration
Authors From Country
  Helpful Topics
How to Write Articles
Free Early Approval Tips
Why Article Submission
  Best of Webzine
Leader Board
Most Viewed Articles
Top Rated Articles
  WebZine Status
Total Articles -25190
Registered Authors - 4482
Featured Articles - 340
Articles added this
month - 97

FTP To Mainframe

FTP or File Transfer Protocol, is a standard architecture to transfer files in a TCP-based network on various platforms including z/OS, Unix, AS/400 and Windows. As on any other platform the common Mainframe FTP features are -

•For downloading and uploading files get and put commands are used.
•To share system's workload multiple CPUs come under the scope of FTP simultaneously in a Sysplex.
•Both USS or UNIX files and MVS datasets are transferred through FTP.

Because of network based file transfer FTP is always associated with some risks -

•Exposing the User ID and password might cause unwanted access to critical data.
•Access to MVS datasets as well as USS files.
•Submission of Batch jobs through the JES interface for executing the programs.
•Access to DB2 data.
•Access to sensitive data in Printouts.

To address the above mentioned risks some security tools are developed for FTP. These are -

•System Authorization Facility or SAF for invoking the Mainframe security software RACF, Top Secret or ACF2.
•Control File Options to control the access to MVS datasets and USS files based on both mainframe server IP, client computer IP and port number. In general, FTP uses the ports 20 and 21.
•Exits to modify FTP logic by adding additional security checks.
•Encryption to secure user ID, password and data.
•Policy Agent Software which includes functions like Firewall for filtering messages.

Here the FTP security tools are described in detail -

•System Authorization Facility
•FTP uses System Authorization Facility to call the security software. The resource classes like APPL, TERMINAL and SERVAUTH contain the security software rules. On the other hand the class names and corresponding options are defined in the Resource Descriptor Table (RDT).
•The programs at the receiving computer, which work with received messages are called FTP Daemons. APPL controls login to these FTP Daemons.
•TERMINAL is used to control the login from any specified IP address.
•SERVAUTH is used for the access control to UNIX file system, IP addresses, port numbers and the network itself.

•Control File Options
•The Control file option can be specified either in the TCP/IP Control file or in the FTP Control file.

•TCP/IP Control file options
•IPSEC for creating IPSEC secure tunnel.
•NETACCESS for controlling access to an IP Network, Subnet or host as a RACF resource.
•TCPCONFIG for blocking ports, so that unauthorized FTP access can be prevented.
•PORT, PORTRANGE, RESERVED and DENY for specific port access control.

•FTP Control file options
•ANONYMOUS for controlling anonymous logins.
•JES2INTERFACELEVEL for controlling Batch job execution and access to Printouts.
•DB2 and DB2PLAN for specifying the DB2 subsystem and plan name.
•CIPHERSUITE for specifying encryption algorithm.
•PORTOFENTRY4 for specifying the name of the Port of Entry for any specific FTP.

•FTPCHKIP for controlling new connection.
•FTCHKCMD for controlling the processing of an FTP command.
•FTPOSTPR for controlling the completion of specific commands.
•FTCHKPWD for controlling new passwords.
•FTCHKJES for controlling the submission of batch jobs.

Transport Layer Security (TLS), Secure Sockets Layer (SSL), IPSEC and Kerberos are the mainframe supported encryption protocols. These protocols can be used to identify the user through user ID and password encryption, at the same time it provides data encryption as well. They also protect against sniffer programs, which provides unauthorized access to user ID and password on a LAN. SSL and TLS can create and manage digital certificates and encryption keys, thus providing Public Key Infrastructure support.

•Policy Agent Software
Policy Agent is a free mainframe software, that can filter the messages and also detect unwanted access to the messages. Based on the IP address, Port number and content Policy Agent filters the messages.
Like this article..? Rate it here:  Votes | Average: 1 out of 5  Votes | Average: 2 out of 5  Votes | Average: 3 out of 5  Votes | Average: 4 out of 5  Votes | Average: 5 out of 5     0 votes, average: out of 5    
About Author
Articles Stats
  Published Date - August 10 2013
  Total Views - 11
  Total Votes - 0
  Average Rating - 0
  Comments - 0
  Mr. Williams J Peterson
Since 1982, Software Diversified Services (SDS) is providing first-quality software and technical support for IBM mainframes and VM, VSE, and mainframe. SSH SFTP from SDS secures ftp transactions on the mainframe network. At you can find product trials and webcasts of other mainframe software tools from Software Diversified Services.
Particular Article
Author Article
  • Mainframe REXX
  • [2013-08-10 ]
    The Base Control Program (BCP) or MVS is the z/OS base element, which provides essential operating system services to the mainframe users. Read More...
  • Mainframe Software
  • [2013-08-10 ]
    The Enterprises working with mainframe systems should have a comprehensive list of the mainframe software available in the market to meet specific needs. Read More...
  • FTP to Mainframe
  • [2013-08-10 ]
    FTP or File Transfer Protocol, is a standard architecture to transfer files in a TCP-based network on various platforms including z/OS, Unix, AS/400 and Windows. Read More...
  • [2013-08-10 ]
    The core of z/OS, also referred as Multiple Virtual Storage (MVS) basically operates in two environments. Read More...
  • 10 Tips on Preparing to Replace a Policy Administration System
  • [2013-08-10 ]
    Many insurers launched new Policy Administration Systems (PAS) in the late 90’s, and the industry noise level is indicating that it may be time for many to upgrade. Read More...
  • How to Choose Best MSG2EML Converter Tool to Convert MSG to EML File?
  • [2013-07-14 ]
    There are many reasons when user prompts with the need to know how to choose best MSG2EML converter tool for export MSG to EML purpose. The search comes to an end at MSG to EML converter software. Read More...
  • MS Access Corrupt Database Recovery Tool – Ascertain Its Require Amongst Users
  • [2013-06-28 ]
    This segment gives readers a perfect view over various reasons behind the rising demand of MS Access corrupt database recovery tool amongst users and also suggest Access Recovery tool for the solution Read More...
  • Mainframe Security
  • [2013-06-28 ]
    For several decades mainframe is being vastly used in many public and private Organizations to hold business critical data. Read More...
  • MSG To PST Download: Know What Is Beneficial About The Conversion
  • [2013-06-28 ]
    The segment will help you get familiar with creation of MSG files, major reasons that make PST files beneficial over MSG’s, etc for which MSG to PST Converter available with MSG to PST download. Read More...
  • Opt For Reliable MSG2EML Converter for Complete Email Migration
  • [2013-06-28 ]
    The article overviews the situations that compel users to call for MSG2EML converter applications. Also, this section highlights the right way of converting emails from MSG file format to EML. Read More...
  • Securing Mainframe FTP
  • [2013-06-14 ]
    File Transfer Protocol (FTP), built on client-server architecture, is a standard method for transferring files between hosts over a TCP-based network on different platforms as Unix, Z/OS, AS/400. Read More...
  • Common Features of an Effective Property and Casualty Insurance Software System
  • [2013-06-11 ]
    Today\'s Property & Casualty (P&C) insurance software systems utilizing modern technological platforms have gained popularity in the insurance industry. Read More...
  • MSG To PST Converter – Worthy Assistance To Shift MSG Emails To PST
  • [2013-06-11 ]
    Due to some reasons, MSG to PST transition becomes the need of MSG users and to fulfill this requirement MSG to PST Converter can help intelligently. Read More...
  • What is OSA Express?
  • [2013-06-11 ]
    OSA Express is a family of adapters, which provides direct mainframe-to-network attachment. Read More...
  • Convert MSG To PST To Obtain All The Outlook Benefits
  • [2013-06-11 ]
    This article contains information about MSG file and PST file, reasons for convert MSG to PST and source via which conversion can be done. MSG to PST converter can be utilized for this need. Read More...
      Submit Articles - Free Articles - Online Articles Submission  
      WebZine Articles ( is a registered trademark. All Rights Reserved. 2012