AS/400 TCP/IP Configuration is Easier Than You Think

  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Editor’s note: We at Midrange Computing recently installed a new AS/400 in our California office. Daniel Green, one of MC’s best technical editors and a TCP/IP expert, oversaw the installation and reconfigured our AS/400 TCP/IP setup from scratch. The following are Daniel’s notes and words of advice for getting TCP/IP up and running on your AS/400.

The installation and configuration processes I’ll be describing in this article were performed on a RISC AS/400 running V4R3, but most commands function similarly on lower releases. Before you start configuring TCP/IP on your AS/400, you should design a plan that includes information about the network hardware you have installed, especially the type of LAN or WAN equipment. You can use the Work with Hardware Resources (WRKHDWRSC *CMN) command to find out what kind of LAN hardware is installed on your system and the port that supports your LAN type. I’ll be using an Ethernet LAN in this example, but you can use Token-Ring, X.25, wireless LANs, frame relay, and other communications adapters. (See Appendix A in OS/400 TCP/IP Configuration and Reference V4R3 [SC41-5420-02] for hardware options.) Prior to configuration, also ensure that TCP/IP Connectivity Utilities for AS/400 (program product 5769TC1) is installed on your AS/400. Determining if 5769TC1 is installed is easily accomplished using the following steps:

1. Enter the command GO LICPGM on any command line to access the Work with Licensed Programs menu.

2. Select option 10 (Display installed licensed programs).
3. Page though the licensed programs display until you find 5769TC1-TCP/IP Connectivity Utilities for AS/400.

4. Make sure the Installed Status is *COMPATIBLE. If you can’t find the 5769TC1 program product, you’ll need to install it from an authorized IBM CD-ROM or tape. (See AS/400 Software Installation V4R3 [SC41-5120-
02] for installation details.) After you have confirmed that the 5769TC1 program has been successfully installed on your AS/400, you’re ready to start enabling TCP/IP communications. I suggest you

allocate the QSYSOPR message queue to your interactive job in *Break mode while performing the following tasks in case there are any problems.

First, you should become familiar with two menus: the green-screen Configure TCP/IP menu (type GO CFGTCP) and the TCP/IP Administration menu (GO TCPADM). These menus contain all the commands I will be describing to get TCP/IP up and running. (In many cases, there are two or three ways to complete a TCP/IP configuration task.) In my example, I will be using an Ethernet LAN connected to a new computer, but your line type could be entirely different. (TCP/IP operates over a variety of physical line types. See Appendix A in OS/400 TCP/IP Configuration and Reference V4R3 for line types and corresponding creation commands.) If you already have a LAN set up on your system, you may be able to skip some of these steps.

The first chore in setting up TCP/IP is to configure a physical line description for the type of AS/400 LAN adapter card you have identified for TCP/IP use in the previous steps. In my case, I found that CMN04 was my Ethernet port; yours could be entirely different, but the port name will start with CMN if it was automatically configured. I can use the Create Line Desc (Ethernet) (CRTLINETH) command shown in Figure 1 to create the Line that TCP/IP will use. (Notice the resource name is the port I found when I used the Work with Hardware Resources command, WRKHDWRSC.) You can define a controller and device description for this line by hand, but TCP/IP will automatically create these objects when activated, so there’s really no reason to worry about them unless you have some special needs. Just fill in the line description and the resource name and press Enter to create the line. Use the OS/400 defaults for all the other parameters.

The Heart of TCP/IP

Now that you have configured a TCP/IP line, you’ll need to identify at least one unique Internet address that is associated with the line by creating a TCP/IP interface. You can use almost any address you want if you’re not going to be using the interface to connect with computers outside your local network (e.g., the Internet). If you want to access other networks, you’ll have to obtain a unique address from Network Solutions. (For more information on TCP/IP addresses, see “Breaking Down TCP/IP Addressing” on page 4.)

Use the Add TCP/IP Interface (ADDTCPIFC) command shown in Figure 2 to add a TCP/IP interface to your system. (Remember that these are logical, not physical interfaces, so more than one interface can be added to a line.) Most parameters can be left at the defaults, but you must enter the Internet address, the line description to attach this interface to, and the subnet mask. The subnet mask is important because it indicates the size and structure of your network. I am using because it is a default value showing that I have between 1 and 254 computers on my network. TCP/IP supports multihoming, which means you can describe multiple interfaces per line description defining different network connections. You can also use option 1 (Work with TCP/IP interfaces) on the Configure TCP/IP menu (reached by the command GO CFGTCP, shown in Figure 3) to add, change, remove, start, and end AS/400 TCP/IP interfaces. If you want to reach remote networks (or subnetworks) using your TCP/IP interface, you must create at least one route (a routing entry) using option 2 (Work with TCP/IP routes) on this menu. If your AS/400 is attached to a single network with no IP routers, you don’t need any routes. (Consult the OS/400 TCP/IP Configuration and Reference V4R3 for details on routes.)

Defining Your Local Domain Name and Host Name

The next step in this odyssey is to define the primary name associated with your system. This name is the one by which your AS/400 is identified within the TCP/IP domain (the Internet). This primary name is a combination of the local domain name and the host name. The local domain name identifies where your system resides within a hierarchy of systems. It contains labels separated by periods ( The host name is unique within the domain and can be used to translate an Internet address for remote servers. Together they form the fully qualified host name in the form of a host.domain,

which identifies a specific system to users outside the local domain. The local domain name can be used by sockets to facilitate host name resolution by the Domain Name System (DNS), an optional method of resolving a host name to an Internet address. In large networks, it’s easier to use DNS servers than to have a complete copy of the host table on every server. In order to use Post Office Protocol (POP) and Simple Mail Transfer Protocol (SMTP) mail servers, you must configure the local domain and host name.

To configure a local domain name and host name, choose option 12 (Change TCP/IP Domain) on the Configure TCP/IP menu (Figure 3). As shown in Figure 4, you enter the host name (MCRISC in this example) and the local domain name. In this example, the local domain name is but in a large network, the domain could look like system1.rochester. The local domain name is descriptive of your organization and indicates its purpose with the labels you use. indicates that this organization is midrangecomputing and it is a commercial venture (.com). On this panel, you can also indicate up to three remote DNS servers used by this system and the default protocol used to communicate with these servers. The fully qualified name defined for this system is

The last step you need to complete before actually starting TCP/IP is to configure your TCP/IP host table, which allows you to associate remote host names with TCP/IP addresses. This requirement is analogous to the HOST table that must be set up on a PC that uses TCP/IP. The table contains a list of the hosts on your network that your AS/400 will communicate with and their related TCP/IP addresses. To add an entry to your host table, use the Add TCP/IP Host Table Entry (ADDTCPHTE) command as shown in Figure 5 to associate a host name with an IP address you have assigned to it.

You can also use option 10 (Work with TCP/IP host table entries) on the Configure TCP/IP menu (Figure 3), to add, change, or remove entries. In this case, I am using MCRISC as the identity of my system (the short form), but I could have used the fully qualified name (which I configured in the last step) if I wanted to identify the system to people outside the local LAN. It’s extremely important to have one administrator keep track of host and domain configurations so that conflicts don’t arise and security is not compromised.

Start Communicating with TCP/IP

Now the details of configuring TCP/IP are behind you. Even if you decide to add new hosts, interfaces, or domains, you have a working knowledge of the process and it should be a breeze. You can either use line commands to start and control TCP/IP or you can use the TCP/IP Administration (TCPADM) menu (Figure 6) to perform administration tasks. Before you start TCP/IP, you must execute the Start Host Server (STRHOSTSVR) command (using the *ALL parameter) to start the servers that will allow communication with your server clients. After issuing this command, start TCP/IP either with the Start TCP/IP (STRTCP) command, or select option 3 on the TCPADM menu. There are only two parameters to this command: Start application servers and Start TCP/IP interfaces. Leave the default of *YES on each parameter unless TCP/IP is already started and you want to start only a specific interface or server. Once you press Enter, you can check QSYSOPR Message Queue to see that the following TCP/IP application severs are started: SNMP, TELNET, FTP, SMTP, and LPD.

TCP/IP application server jobs run in the QSYSWRK subsystem. You can also configure additional TCP/IP servers, such as BOOTP and DHCP, and specify that they automatically start when you start TCP/IP. In addition to looking at QSYSOPR, you can verify that TCP/IP is up and properly running on your AS/400 by using the Work with Active Jobs (WRKACTJOB) command and checking to see that the QTCPIP job is running in the QSYSWRK subsystem.

When first starting TCP/IP, the most reliable method of determining its status is using the Verify TCP/IP Connection (PING) command on your AS/400.

You can either PING LOOPBACK (a default host name created automatically for your TCP/IP card in the Host File when configuring TCP/IP) or PING the qualified system name (MCRISC., in this case). If TCP/IP is not functioning properly, PING will return messages stating there was no response from the host. If you have a problem starting TCP/IP, check the QHST history log, check all QSYSOPR messages, and retrace all your installation steps. Pay special attention to the line description, your host table, and all IP addresses. It’s easy to mistype one digit in a 12- digit address.

I found the basic rules for configuring TCP/IP on a new computer are fairly simple:
• Start with well-defined objectives and design a comprehensive plan to accomplish these objectives.

• Pay close attention to all details of the process and record each configuration step and the values you assign to all network attributes.

• Once you have TCP/IP running, save the configuration files either with the Save Configuration (SAVCFG) command or the Save Object (SAVOBJ) command. Save objects QTOC* and QATM* from QUSRSYS.

• When you decide to connect your AS/400 to the world’s largest network, the Internet, make a thorough study of the security measures you’ll need to implement to keep hackers at bay.

TCP/IP Goes Graphical

Starting with V4R3, IBM has included some new tools with which to configure TCP/IP on a new AS/400. OS/400 V4R3 and above comes with a CD-ROM called EZ- Setup for AS/400e Series. This CD-ROM can be used to automatically install Client Access/400 and basic TCP/IP communications. In the future, IBM may go totally graphical, eliminating much of the frustration of setting up TCP/IP communications manually. Unless you use EZ-Setup, however, most of the steps in the initial setup of TCP/IP currently need to be performed using 5250 emulation on the AS/400. However, a PC that is properly configured with Client Access/400’s or Express client’s Operations Navigator can perform many of the advanced configuration and administration tasks used to maintain TCP/IP network communications. It’s obvious that IBM is slowly molding the AS/400 into a full-fledged GUI environment, and I much prefer to use Operations Navigator instead of a green-screen to administer TCP/IP.

In order to access your TCP/IP controls, open the Operations Navigator window for your AS/400 and double- click the Network icon under the AS/400 you’re manipulating; in this case, MCRISC. Double-click the Protocols icon to bring up a panel similar to Figure 7. Left-click the TCP/IP protocol icon to bring up the pop-up menu shown and select Properties. Using the TCP/IP Properties menu, you can change or add interfaces, start and stop TCP/IP, and configure security rules. Although the OS/400 TCP/IP Administration (TCPADM) menu (Figure 6) is designed to be the primary TCP/IP administration tool, Operations Navigator offers most of the TCP/IP functions you’ll be performing on a day-to-day basis and provides a point-and-click method of TCP/IP administration that you can use after your basic TCP/IP configuration is created.

Whether you choose green-screen or graphical TCP/IP configuration, you’ll find that IBM has done an excellent job integrating TCP/IP into the AS/400, providing plenty of intuitive tools for working with the most pervasive IT communications protocol today


OS/400 TCP/IP Configuration and Reference V4R3 (SC41-5420-02, CD-ROM QB3ANL02)

OS/400 AS/400 Software Installation V4R3 (SC41-5120-02, CD-ROM QB3AWG02)

Related URL

AS/400 Online Library: publib.boulder. homeeng1.htm
Related Reading TCP/IP Fastpath Setup V4R1 (SC41-5430-00, CD-ROM QB3A0K00) “Getting the AS/400 Firewall Up and Running,” Midrange Computing, December “Technology Spotlight: Dynamics on the Internet: DNS,” Midrange Computing, October 1998

“Technology Spotlight: IP Security Protocol,” Midrange Computing, September “Technology Spotlight: An Anatomy of SSL,” Midrange Computing, August 1998 “Automate TCP/IP Addressing with BOOTP,” Midrange Computing, August 1998 (www.midrangecomputing. com/MC/ 98/08)

“Technology Spotlight: Inside TCP/IP Addressing,” Midrange Computing, June 1998 (www.midrangecomputing. com/MC/98/06)

“Technology Spotlight: DHCP,” Midrange Computing, March 1998

Breaking Down TCP/IP Addressing

Although TCP/IP is relatively new to the AS/400 world (it was added in V3R1) and is just starting to be used in many midrange shops, its basic concepts have been around for almost 25 years. It’s not an overstatement to say that TCP/IP has driven the rise of an international network: the Internet. Although no one predicted its popularity when TCP/IP was developed by Vinton Cerf in 1973, TCP/IP has imparted a kind of lingua franca to computing, allowing communications between heterogeneous platforms on different networks. TCP/IP is a combination of two protocols:

• the IP protocol (RFC 1166), which uses a hardware-independent addressing scheme based on 32-bit numbers to send packets of data (datagrams) between networks

• the TCP protocol (RFC 793), which is responsible for verifying the correct delivery of the IP packets between network nodes

In order to understand the basics of using TCP/IP, a good place to start is by studying the underlying structure of this protocol: IP addressing. You’ll need at least a rudimentary knowledge of IP addressing to set up TCP/IP on your AS/400.

What’s in an Address?

On top of every local or vendor-specific network address, TCP/IP assigns a unique number to every workstation on Earth that can access the Internet. In the PC world, this task is normally accomplished dynamically by your ISP and you receive a different address every time you dial up the Internet. TCP/IP uses a unique 32-bit (4-byte) number divided into four octets (bytes) that, by convention, is expressed as four decimal numbers in the 0 to 255 range. (Although the range covers 0 to 255 decimal or 00000000 to 11111111 binary, IP addresses starting with 0 or 255 are reserved for special purposes.) Each octet in an address is separated by periods, e.g., Because of the huge number of addresses needed, TCP/IP developers decided to use the first octet in the TCP/IP address to designate five different classes (sizes) of networks. Currently only three classes are in general use: A, B, and C. Class D is reserved for multicast use, and class E is reserved for future use. Each different network class was assigned as many bytes of the address as it needed to represent the number of hosts in its network class. This numbering scheme is shown in Figure 1. Notice that as the number of possible networks addresses increases, the number of possible host addresses decreases and vice versa. This addressing method provides the flexibility and sheer numerical strength needed to manage a worldwide addressing system. Obviously, only the largest worldwide organizations either need, or can obtain, a Class A network. Most large organizations fall into the Class B arena. For instance, Yale University has a Class B license and uses an IP address of
130.132.*.*, allowing it to attach up to 65,000 hosts to its network.



For managability reasons, many large network owners (A, B) find it’s more convenient to divide their networks into subnetworks—or subnets—than it is to request additional IP network addresses for each new local network. Basically, subnets provide a technique to subdivide a network into mini-networks to allow more nodes to use a single IP Class license. Subnets also hide the internal network structure from outsiders and facilitate traffic and congestion control. The subnet is identified by combining a network ID, such as
10.103.132, and the subnet ID, which, in this case, allows for 254 subnets ranging from to The last octet in this case refers to the host ID with the subnet. Subnet notation can be a bit confusing since it is based on binary algorithms and some vendors use proprietary notation for their subnets. Certain IP numbers have been assigned special values to facilitate subnetting and local IP communications. These numbers have the same meaning whether used in a subnet or regular IP address. Because there are instances when a computer does not know the IP number of the network it is on, or even its host address, one value—0—has been reserved to represent an unknown byte of the IP address. For example, an IP address of is used to represent a machine that knows only that it is host number 26. (It is not on a subnet.) A message can still be sent to this machine within its local network by using another special IP byte value: 255. This value is used for broadcasts, which are used to send a message that you want every system on a network to see. This value transmits messages to a number of different systems without sending them to each specific IP address. You could reach every host on network 120.8.2 by using a broadcast address of, saving time and money. Another use of this technique is to quickly send messages to all hosts on the local system without looking up any specific IP numbers. In this case, you can just use for the IP address rather than specifying any discreet values. Note that some older implementations also use 0 instead of 255 for broadcast messages.

Certain other IP address bytes are also used for special purposes. Generally, 0, 127, and any number above 223 should never be contained in regular IP addresses. The division of IP address into subnets can be enhanced by using subnet masks to specify the number of bits used for the subnet ID and the host ID. A subnet mask is a 32-bit number that looks very much like an IP address. However, zero bits in the subnet mask indicate positions pointing to the host number, and one bits indicate bit positions ascribed to the subnet number. For example, a subnet mask of 11111111.11111111.11111111.00000000 indicates that the first three bytes refer to the subnet and the fourth byte refers to the host.

Within your own networks, you can assign your own unique TCP/IP addresses, but if you want to connect to the Internet, your network addresses and domain names visible on the Internet must be obtained from a central authority. In the United States, InterNIC handles this chore. Although ISPs usually provide their customers with IP addresses, it’s possible for almost anyone to get a Class C license, even if it’s only for home use. The registration process is not difficult: you can register online at Once you have your IP address, you’re ready to configure your internal hosts using the bytes available to the class you’ve been assigned.

Class A Class B Class C

First Byte in 0 to 127 128 to 191 192 to 233 the IP Address
Additional Bytes None Byte 2 Byte 2, 3 Used to Indicate
Bytes Used to Byte 2, 3, 4 Byte 3, 4 Byte 4 Indicate Hosts
Potential Number 126 16,000 2,000,000 of Networks
Potential Number 16,777,214 65,532 254 of Hosts

Figure 1: Here is the numbering scheme used for creating the three different classes of TCP/IP networks.

Figure 1: Here is the numbering scheme used for creating the three different classes of TCP/IP networks.

AS-_400_TCP-_IP_Configuration_is_Easier_Than_You_Think07-00.jpg 600x344

Figure 1: The Create Line Description (Ethernet) (CRTLINETH) command sets up your communications port as an AS/400 Ethernet line.

Figure 2: Use the Add TCP/IP Interface (ADDTCPIFC) command to add a TCP/IP interface to your communications line.

AS-_400_TCP-_IP_Configuration_is_Easier_Than_You_Think07-01.jpg 600x324

AS-_400_TCP-_IP_Configuration_is_Easier_Than_You_Think08-00.jpg 600x344

Figure 3: For green-screen TCP/IP, the Configure TCP/IP menu is the place to go.

Figure 4: Define your domain and host names to create a fully qualified host name.

AS-_400_TCP-_IP_Configuration_is_Easier_Than_You_Think08-01.jpg 600x324

AS-_400_TCP-_IP_Configuration_is_Easier_Than_You_Think09-00.jpg 600x324

Figure 5: Adding an entry to the Host Table is easy with the Add TCP/IP Host Table Entry (ADDTCPHTE) command.

AS-_400_TCP-_IP_Configuration_is_Easier_Than_You_Think09-01.jpg 600x480

Figure 6: Use the TCP/IP Administration menu to configure other TCP/IP applications.

Figure 7: You can perform graphical administation of your TCP/IP connections through the TCP/IP properties in Operations Navigator.

AS-_400_TCP-_IP_Configuration_is_Easier_Than_You_Think10-00.jpg 600x450



Support MC Press Online





  • White Paper: Node.js for Enterprise IBM i Modernization

    SB Profound WP 5539

    If your business is thinking about modernizing your legacy IBM i (also known as AS/400 or iSeries) applications, you will want to read this white paper first!

    Download this paper and learn how Node.js can ensure that you:
    - Modernize on-time and budget - no more lengthy, costly, disruptive app rewrites!
    - Retain your IBM i systems of record
    - Find and hire new development talent
    - Integrate new Node.js applications with your existing RPG, Java, .Net, and PHP apps
    - Extend your IBM i capabilties to include Watson API, Cloud, and Internet of Things

    Read Node.js for Enterprise IBM i Modernization Now!


  • Profound Logic Solution Guide

    SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation.
    Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
    The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.

    Get your copy of this important guide today!


  • 2022 IBM i Marketplace Survey Results

    Fortra2022 marks the eighth edition of the IBM i Marketplace Survey Results. Each year, Fortra captures data on how businesses use the IBM i platform and the IT and cybersecurity initiatives it supports.

    Over the years, this survey has become a true industry benchmark, revealing to readers the trends that are shaping and driving the market and providing insight into what the future may bring for this technology.

  • Brunswick bowls a perfect 300 with LANSA!

    FortraBrunswick is the leader in bowling products, services, and industry expertise for the development and renovation of new and existing bowling centers and mixed-use recreation facilities across the entertainment industry. However, the lifeblood of Brunswick’s capital equipment business was running on a 15-year-old software application written in Visual Basic 6 (VB6) with a SQL Server back-end. The application was at the end of its life and needed to be replaced.
    With the help of Visual LANSA, they found an easy-to-use, long-term platform that enabled their team to collaborate, innovate, and integrate with existing systems and databases within a single platform.
    Read the case study to learn how they achieved success and increased the speed of development by 30% with Visual LANSA.


  • Progressive Web Apps: Create a Universal Experience Across All Devices

    LANSAProgressive Web Apps allow you to reach anyone, anywhere, and on any device with a single unified codebase. This means that your applications—regardless of browser, device, or platform—instantly become more reliable and consistent. They are the present and future of application development, and more and more businesses are catching on.
    Download this whitepaper and learn:

    • How PWAs support fast application development and streamline DevOps
    • How to give your business a competitive edge using PWAs
    • What makes progressive web apps so versatile, both online and offline



  • The Power of Coding in a Low-Code Solution

    LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks



  • Why Migrate When You Can Modernize?

    LANSABusiness users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.
    In this white paper, you’ll learn how to think of these issues as opportunities rather than problems. We’ll explore motivations to migrate or modernize, their risks and considerations you should be aware of before embarking on a (migration or modernization) project.
    Lastly, we’ll discuss how modernizing IBM i applications with optimized business workflows, integration with other technologies and new mobile and web user interfaces will enable IT – and the business – to experience time-added value and much more.


  • UPDATED: Developer Kit: Making a Business Case for Modernization and Beyond

    Profound Logic Software, Inc.Having trouble getting management approval for modernization projects? The problem may be you're not speaking enough "business" to them.

    This Developer Kit provides you study-backed data and a ready-to-use business case template to help get your very next development project approved!

  • What to Do When Your AS/400 Talent Retires

    FortraIT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators is small.

    This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn:

    • Why IBM i skills depletion is a top concern
    • How leading organizations are coping
    • Where automation will make the biggest impact


  • Node.js on IBM i Webinar Series Pt. 2: Setting Up Your Development Tools

    Profound Logic Software, Inc.Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. In Part 2, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Attend this webinar to learn:

    • Different tools to develop Node.js applications on IBM i
    • Debugging Node.js
    • The basics of Git and tools to help those new to it
    • Using as a pre-built development environment



  • Expert Tips for IBM i Security: Beyond the Basics

    SB PowerTech WC GenericIn this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access

    Don't miss this chance to take your knowledge of IBM i security beyond the basics.



  • 5 IBM i Security Quick Wins

    SB PowerTech WC GenericIn today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
    There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?
    Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
    Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them.

  • Security Bulletin: Malware Infection Discovered on IBM i Server!

    SB PowerTech WC GenericMalicious programs can bring entire businesses to their knees—and IBM i shops are not immune. It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

    • Viruses, native objects, and the integrated file system (IFS)
    • Power Systems and Windows-based viruses and malware
    • PC-based anti-virus scanning versus native IBM i scanning

    There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI.



  • Encryption on IBM i Simplified

    SB PowerTech WC GenericDB2 Field Procedures (FieldProcs) were introduced in IBM i 7.1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i including PII, PCI, PHI data in your physical files and tables.
    Watch this webinar to learn how you can quickly implement encryption on the IBM i. During the webinar, security expert Robin Tatam will show you how to:

    • Use Field Procedures to automate encryption and decryption
    • Restrict and mask field level access by user or group
    • Meet compliance requirements with effective key management and audit trails


  • Lessons Learned from IBM i Cyber Attacks

    SB PowerTech WC GenericDespite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
    In this webinar, you'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.

    • Learn which security gaps cyber criminals love most
    • Find out how other IBM i organizations have fallen victim
    • Get the details on policies and processes you can implement to protect your organization, even when staff works from home

    You will learn the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.



  • The Power of Coding in a Low-Code Solution

    SB PowerTech WC GenericWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks



  • Node Webinar Series Pt. 1: The World of Node.js on IBM i

    SB Profound WC GenericHave you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.
    Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.
    In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).
    Watch Now.

  • The Biggest Mistakes in IBM i Security

    SB Profound WC Generic The Biggest Mistakes in IBM i Security
    Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage.
    Whether that’s thousands of exposed records, millions of dollars in fines and legal fees, or diminished share value, it’s easy to judge organizations that fall victim. IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes.
    Join this webinar to learn about the biggest errors made when securing a Power Systems server.
    This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA
    Watch Now.

  • Comply in 5! Well, actually UNDER 5 minutes!!

    SB CYBRA PPL 5382

    TRY the one package that solves all your document design and printing challenges on all your platforms.

    Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.

    Request your trial now!

  • Backup and Recovery on IBM i: Your Strategy for the Unexpected

    FortraRobot automates the routine tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:
    - Simplified backup procedures
    - Easy data encryption
    - Save media management
    - Guided restoration
    - Seamless product integration
    Make sure your data survives when catastrophe hits. Try the Robot Backup and Recovery Solution FREE for 30 days.

  • Manage IBM i Messages by Exception with Robot

    SB HelpSystems SC 5413Managing messages on your IBM i can be more than a full-time job if you have to do it manually. How can you be sure you won’t miss important system events?
    Automate your message center with the Robot Message Management Solution. Key features include:
    - Automated message management
    - Tailored notifications and automatic escalation
    - System-wide control of your IBM i partitions
    - Two-way system notifications from your mobile device
    - Seamless product integration
    Try the Robot Message Management Solution FREE for 30 days.

  • Easiest Way to Save Money? Stop Printing IBM i Reports

    FortraRobot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
    Manage your reports with the Robot Report Management Solution. Key features include:

    - Automated report distribution
    - View online without delay
    - Browser interface to make notes
    - Custom retention capabilities
    - Seamless product integration
    Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.

  • Hassle-Free IBM i Operations around the Clock

    SB HelpSystems SC 5413For over 30 years, Robot has been a leader in systems management for IBM i.
    Manage your job schedule with the Robot Job Scheduling Solution. Key features include:
    - Automated batch, interactive, and cross-platform scheduling
    - Event-driven dependency processing
    - Centralized monitoring and reporting
    - Audit log and ready-to-use reports
    - Seamless product integration
    Scale your software, not your staff. Try the Robot Job Scheduling Solution FREE for 30 days.