Solved

Unable to connect to iSeries.

Posted on 2006-10-25
4
839 Views
Last Modified: 2008-11-22
Hi,

      I have a situation where I am not able to connect to the iSeries box after I  connect through a VPN.  The following are the steps that I do:
1.  Login to a Cisco VPN from my company to a client's company which is successful. Then I try to login to the iSeries where I get a timed out error. I am able to connect to my client outside of my company (from home) following the same steps. Any help in resolving this is appreciated.
0
Comment
Question by:radavappa
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 6

Accepted Solution

by:
paulhekje earned 250 total points
ID: 17809832
PC5250 Emulation needs specifc ip-ports open:

signon(8476)
telnet(23)
central(8470)
Server Mapper(449)

=> What TCP/IP ports does Client Access use?
http://faq.midrange.com/data/cache/147.html
0
 

Author Comment

by:radavappa
ID: 18031525
Look slike these ports are open. Now I am able to connect through VPN and then sign on to AS/400. My colleauges are not able to sign on to AS/400 even though they are able to connect through VPN. They are using MOCHA to connect to AS/400. Any suggestion on this. I switched my laptop to a new one and that is how I got on to the VPN and the AS/400.

Thanks,
Ram
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Suggested Courses

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question