Group access policies identify distinct user groups for a connection, and allow you to apply common connection attributes and security settings to the entire group. You can use group policies, along with IP filtering, to permit and restrict access to specific IP addresses on your network.
Your network has several groups of distributed users, each of whom needs access to different resources on your corporate LAN. A group of data entry users needs access to the database and several other applications. A group of people from other companies needs dial-up access to HTTP, File Transfer Protocol (FTP), and Telnet services, but for security reasons, this group must not be allowed access to other TCP/IP services or traffic. Defining detailed connection attributes and permissions for each user duplicates your efforts, and providing network restrictions for all the users of this connection profile does not ensure enough control. You want a way to define connection settings and permissions for several distinct groups of users who routinely dial into this system.
You need to apply unique IP filtering restrictions to two different groups of users. To accomplish this, you create group access policies and IP filter rules. Group access policies reference IP filter rules, so create your filter rules first. In this example, you need to create a PPP filter to include IP filter rules for the IBM Business Partner Group Access Policy. These filter rules permit HTTP, FTP, and Telnet services, but restrict access to all other TCP/IP traffic and services through the system. This scenario only shows the filter rules needed for the sales group; however, you can also set up similar filters for the Data Entry group.
Finally, you need to create the group access policies (one per group) to define your group. A group access policy enables you to define common connection attributes to a group of users. By adding a group access policy to a validation list on the system, you can apply these connection settings during the authentication process. The group access policy specifies several settings for the user's session, including the ability to apply IP filtering rules that restrict the IP addresses and TCP/IP services available to a user during the session.
To set up a sample configuration from iSeries™ Navigator, follow these steps:
If you want to create a new group access policy, right-click Group Access Policies and select New Group Access Policies. Complete the General tab. Then select the TCP/IP Settings tab and continue with step e below.
The IP addresses in the following example are globally routable, and are for example purposes only.
###The following 2 filters will permit HTTP (Web browser) traffic in & out of the system. FILTER SET services_rules ACTION = PERMIT DIRECTION = INBOUND SRCADDR % = * DSTADDR = 192.18.2.3 PROTOCOL = TCP DSTPORT = 80 SRCPORT % = * FRAGMENTS = NONE JRN = OFF FILTER SET services_rules ACTION = PERMIT DIRECTION = OUTBOUND SRCADDR % = 192.18.2.3 DSTADDR = * PROTOCOL = TCP DSTPORT = * SRCPORT = % 80 FRAGMENTS = NONE JRN = OFF ###The following 4 filters will permit FTP traffic in & out of the system. FILTER SET services_rules ACTION = PERMIT DIRECTION = INBOUND SRCADDR % = * DSTADDR = 192.18.2.3 PROTOCOL = TCP DSTPORT = 21 SRCPORT % = * FRAGMENTS = NONE JRN = OFF FILTER SET services_rules ACTION = PERMIT DIRECTION = OUTBOUND SRCADDR % = 192.18.2.3 DSTADDR = * PROTOCOL = TCP DSTPORT = * SRCPORT = % 21 FRAGMENTS = NONE JRN = OFF FILTER SET services_rules ACTION = PERMIT DIRECTION = INBOUND SRCADDR % = * DSTADDR = 192.18.2.3 PROTOCOL = TCP DSTPORT = 20 SRCPORT % = * FRAGMENTS = NONE JRN = OFF FILTER SET services_rules ACTION = PERMIT DIRECTION = OUTBOUND SRCADDR % = 192.18.2.3 DSTADDR = * PROTOCOL = TCP DSTPORT = * SRCPORT = % 20 FRAGMENTS = NONE JRN = OFF ###The following 2 filters will permit telnet traffic in & out of the system. FILTER SET services_rules ACTION = PERMIT DIRECTION = INBOUND SRCADDR % = * DSTADDR = 192.18.2.3 PROTOCOL = TCP DSTPORT = 23 SRCPORT % = * FRAGMENTS = NONE JRN = OFF FILTER SET services_rules ACTION = PERMIT DIRECTION = OUTBOUND SRCADDR % = 192.18.2.3 DSTADDR = * PROTOCOL = TCP DSTPORT = * SRCPORT % = 23 FRAGMENTS = NONE JRN = OFF
###The following statement binds (associates) the 'services_rules' filter set with the PPP filter ID "permitted_services." This PPP filter ID can then be applied to the physical interface associated with a PPP connection profile or Group Access Policy. FILTER_INTERFACE PPP_FILTER_ID = permitted_services SET = services_rules
Related concepts
Configuring a group access policy Group policy support