Use this page to view and configure a TCP transport channels. This type of transport channel handles inbound TCP/IP requests from a remote client.
To view this administrative console page, click Servers > Application servers > server_name > Ports > . Click on View associated transports for the port associated with the TCP transport channel whose settings you want to view.
Specifies the name of the TCP transport channel.
The name field cannot contain the following characters: # \ / , : ; " * ? < > | = + & % '
This name must be unique across all channels in a WebSphere Application Server environment. For example, an HTTP proxy inbound channel and a TCP transport channel cannot have the same name if they reside within the same system.
Data type | string |
Specifies the TCP/IP port this transport channel uses to establish connections between a client and an application server. The TCP transport channel binds to the hostnames and ports listed for the Port property. You can specify the wildcard * (an asterisk), for the hostname if you want this channel to listen to all hosts that are available on this system. However, before specifying the wildcard value, make sure this TCP transport channel does not have to bind to a specific hostname.
Data type | string |
This field only applies for i5/OS and distributed platforms. Select from the drop-down list of available thread pools the thread pool you want the TCP transport channel to use when dispatching work.
Specifies the maximum number of connections that can be open at one time.
Data type | Integer between 1 and 128,000 inclusive |
Default | 20,000 |
Note: The value specified for this property might be overridden by the wait times established for channels above this channel. For example, the wait time established for an HTTP transport channel overrides the value specified for this property for every operation except the initial read on a new socket.
Data type | Integer |
Default | 60 seconds |
Lists the IP addresses that are not allowed to make inbound connections.
Use a comma to separate the IPv4 or IPv6 or both addresses to which you want to deny access on inbound TCP connection requests.
All four numeric values in an IPv4 address must be represented by a number or the wildcard character * (an asterisk). Following are examples of valid IPv4 addresses that can be included in an Address exclude list:
*.1.255.0 254.*.*.9 1.*.*.*
All eight numeric values of an IPv6 address must be represented by a number or the wildcard character * (an asterisk). No shortened version of the IPv6 address should be used. Even though a shortened version is processed with no error given, it does not function correctly in this list. Each numeric entry should be a 1- 4 digit hexadecimal number. Following are examples of valid IPv6 addresses that can be included in an Address exclude list:
0:*:*:0:007F:0:0001:0001 F:FF:FFF:FFFF:1:01:001:0001 1234:*:4321:*:9F9f:*:*:0000
Note: The Address include list and Host name include list are processed before the Address exclude list and the Host name exclude list. If all four lists are defined:
Lists the IP addresses that are allowed to make inbound connections. Use a comma to separate the IPv4 or IPv6 or both addresses to which you want to grant access on inbound TCP connection requests.
All four numeric values in an IPv4 address must be represented by a number or the wildcard character * (an asterisk). Following are examples of valid IP addresses that can be included in an Address include list:
*.1.255.0 254.*.*.9 1.*.*.*
All eight numeric values of an IPv6 address must be represented by a number or the wildcard character * (an asterisk). No shortened version of the IPv6 address should be used. Even though a shortened version is processed with no error given, it does not function correctly in this list. Each numeric entry should be a 1- 4 digit hexadecimal number. Following are examples of valid IPv6 addresses that can be included in an Address include list:
0:*:*:0:007F:0:0001:0001 F:FF:FFF:FFFF:1:01:001:0001 1234:*:4321:*:9F9f:*:*:0000
Note: The Address include list and the Host name include list are processed before the Address exclude list and the Host name exclude list. If all four lists are defined:
List the host names that are not allowed to make connections. Use a comma to separate the URL addresses to which you want to deny access on inbound TCP connection requests.
A URL address can start with the wildcard character * (an asterisk) followed by a period; for example, *.Rest.Of.Address. If a period does not follow the wildcard character, the asterisk will be treated as a normal non-wildcard character. The wildcard character cannot appear any where else in the address. For example, ibm.*.com is not a valid host name. Following are examples of valid URL addresses that can be included in a Host name exclude list:
*.ibm.com www.ibm.com *.com
Note: The Address include list and Host name include list are processed before the Address exclude list and the Host name exclude list. If all four lists are defined:
Lists the host names that are allowed to make inbound connections. Use a comma to separate the URL addresses to which you want to grant access on inbound TCP connection requests.
A URL address can start with the wildcard character * (an asterisk) followed by a period; for example, *.Rest.Of.Address. If a period does not follow the wildcard character, the asterisk will be treated as a normal non-wildcard character. The wildcard character cannot appear any where else in the address. For example, ibm.*.com is not a valid hostname. Following are examples of valid URL addresses that can be included in a hostname include list:
*.ibm.com www.ibm.com *.com
Note: The Address include list and Host name include list are processed before the Address exclude list and the Host name exclude list. If all four lists are defined: