Ingmst
Ingmst
6.4
IBM
GC27-2852-04
Note
Before using this information and the product it supports, read the information in “Notices” on page
73.
This edition applies to version 6, release 4 of IBM Z NetView (product number 5697-NV6 ) and to all subsequent
versions, releases, and modifications until otherwise indicated in new editions.
This edition replaces GC27-2852-03.
© Copyright International Business Machines Corporation 2001, 2022.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM Corp.
Contents
Figures................................................................................................................ vii
About this publication...........................................................................................ix
Intended audience...................................................................................................................................... ix
Publications................................................................................................................................................. ix
IBM Z NetView library............................................................................................................................ ix
Related publications .............................................................................................................................. x
Terminology in this Library..................................................................................................................... x
Using IBM Z NetView online help.......................................................................................................... xi
Accessing publications online............................................................................................................... xi
Ordering publications ............................................................................................................................xi
Accessibility ............................................................................................................................................... xii
Support information................................................................................................................................... xii
Conventions used in this publication......................................................................................................... xii
Typeface conventions .......................................................................................................................... xii
Operating system-dependent variables and paths.............................................................................xiii
Syntax diagrams...................................................................................................................................xiii
Chapter 1. Introduction......................................................................................... 1
Managing NetView Resources with the NetView Resource Manager.........................................................1
Managing Sysplex Resources with the NetView Discovery Manager......................................................... 2
Planning the Installation Process................................................................................................................2
iii
Chapter 4. Installing and Configuring the NetView Management Console for
Graphics..........................................................................................................27
NetView Setup for the NetView Management Console............................................................................ 28
Defining the Status Focal Point............................................................................................................ 28
Security Considerations....................................................................................................................... 29
Workstation Setup for the NetView Management Console...................................................................... 30
Installing and Configuring the NetView Management Console Topology Server............................... 31
Installing the NetView Management Console Topology Console....................................................... 35
Verifying the NetView Management Console Installation........................................................................ 35
Starting the Topology Server................................................................................................................35
Begin Communication with the NetView Management Console Topology Server............................. 35
Starting the Topology Console............................................................................................................. 36
Signing On to the NetView Management Console Topology Console................................................. 36
Customizing the NetView Management Console................................................................................ 36
iv
GMFHS Samples........................................................................................................................................ 59
NetView Management Console Samples.................................................................................................. 60
NetView Resource Manager Samples....................................................................................................... 60
RODM Samples.......................................................................................................................................... 61
FLCARODM Samples............................................................................................................................ 70
Notices................................................................................................................73
Programming Interfaces............................................................................................................................74
Trademarks................................................................................................................................................ 74
Privacy policy considerations.................................................................................................................... 74
Index.................................................................................................................. 77
v
vi
Figures
1. Graphical Components..................................................................................................................................1
vii
viii
About this publication
The IBM Z® NetView® product provides advanced capabilities that you can use to maintain the highest
degree of availability of your complex, multi-platform, multi-vendor networks and systems from a single
point of control. This publication, the IBM Z NetView Installation: Configuring Graphical Components,
provides information about installing NetView graphics.
Intended audience
This publication is for system programmers who install NetView graphics.
Publications
This section lists publications in the IBM Z NetView library and related documents. It also describes how
to access NetView publications online and how to order NetView publications.
Related publications
You can find additional product information on the IBM Z NetView web site at https://www.ibm.com/
products/z-netview.
For information about the NetView Bridge function, see Tivoli NetView for OS/390® Bridge Implementation,
SC31-8238-03 (available only in the V1R4 library).
Ordering publications
You can order many IBM publications online at http://www.ibm.com/e-business/linkweb/publications/
servlet/pbi.wss
You can also order by telephone by calling one of these numbers:
• In the United States: 800-426-4968
• In Canada: 800-879-2755
Accessibility
Accessibility features help users with a physical disability, such as restricted mobility or limited vision, to
use software products successfully. Standard shortcut and accelerator keys are used by the product and
are documented by the operating system. Refer to the documentation provided by your operating system
for more information.
For additional information, see the Accessibility appendix in the User's Guide: NetView.
Support information
If you have a problem with your IBM software, you want to resolve it quickly. IBM provides the following
ways for you to obtain the support you need:
Online
Please follow the instructions located in the support guide entry: https://www.ibm.com/support/
home/pages/support-guide/?product=4429363.
Troubleshooting information
For more information about resolving problems with the IBM Z NetView product, see the IBM Z
NetView Troubleshooting Guide. You can also discuss technical issues about the IBM Z NetView
product through the NetView user group located at https://groups.io/g/NetView. This user group is for
IBM Z NetView customers only, and registration is required. This forum is also monitored by interested
parties within IBM who answer questions and provide guidance about the NetView product. When a
problem with the code is found, you are asked to open an official case to obtain resolution.
Typeface conventions
This publication uses the following typeface conventions:
Bold
• Lowercase commands and mixed case commands that are otherwise difficult to distinguish from
surrounding text
• Interface controls (check boxes, push buttons, radio buttons, spin buttons, fields, folders, icons,
list boxes, items inside list boxes, multicolumn lists, containers, menu choices, menu names, tabs,
property sheets), labels (such as Tip:, and Operating system considerations:)
• Keywords and parameters in text
Italic
• Citations (examples: titles of publications, diskettes, and CDs
• Words defined in text (example: a nonswitched line is called a point-to-point line)
• Emphasis of words and letters (words as words example: "Use the word that to introduce a
restrictive clause."; letters as letters example: "The LUN address must start with the letter L.")
• New terms in text (except in a definition list): a view is a frame in a workspace that contains data.
• Variables and values you must provide: ... where myname represents...
Syntax diagrams
The following syntax elements are shown in syntax diagrams. Read syntax diagrams from left-to-right,
top-to-bottom, following the horizontal line (the main path).
• “Symbols” on page xiii
• “Parameters” on page xiii
• “Punctuation and parentheses” on page xiv
• “Abbreviations” on page xiv
For examples of syntax, see “Syntax examples” on page xiv.
Symbols
The following symbols are used in syntax diagrams:
Parameters
The following types of parameters are used in syntax diagrams:
Required
Required parameters are shown on the main path.
Optional
Optional parameters are shown below the main path.
COMMAND_NAME opt_variable_1,,opt_variable_3
You do not need to specify the trailing positional commas. Trailing positional and non-positional commas
either are ignored or cause a command to be rejected. Restrictions for each command state whether
trailing commas cause the command to be rejected.
Abbreviations
Command and keyword abbreviations are listed in synonym tables after each command description.
Syntax examples
The following examples show the different uses of syntax elements:
• “Required syntax elements” on page xiv
• “Optional syntax elements” on page xv
• “Default keywords and values” on page xv
• “Multiple operands or values” on page xv
• “Syntax that is longer than one line” on page xvi
• “Syntax fragments” on page xvi
A required choice (two or more items) is shown in a vertical stack on the main path. The items are shown
in alphanumeric order.
REQUIRED_OPERAND_OR_VALUE_1
REQUIRED_OPERAND_OR_VALUE_2
OPTIONAL_OPERAND
A required choice (two or more items) is shown in a vertical stack below the main path. The items are
shown in alphanumeric order.
OPTIONAL_OPERAND_OR_VALUE_1
OPTIONAL_OPERAND_OR_VALUE_2
KEYWORD1 OPTION=*
COMMAND_NAME
KEYWORD1 OPTION= *
KEYWORD2 VALUE1
KEYWORD3 VALUE2
REPEATABLE_OPERAND_OR_VALUE_1
REPEATABLE_OPERAND_OR_VALUE_2
REPEATABLE_OPERAND_OR_VALUE_3
value_n )
OPERAND7 OPERAND8
Syntax fragments
Some syntax diagrams contain syntax fragments, which are used for lengthy, complex, or repeated
sections of syntax. Syntax fragments follow the main diagram. Each syntax fragment name is mixed case
and is shown in the main diagram and in the heading of the fragment. The following syntax example
shows a syntax diagram with two fragments that are identified as Fragment1 and Fragment2.
COMMAND_NAME Fragment1
Fragment2
Fragment1
KEYWORD_A= valueA KEYWORD_B KEYWORD_C
Fragment2
KEYWORD_D KEYWORD_E= valueE KEYWORD_F
After you install and set up NetView graphics, you can monitor your system and network resources with
a dynamic, color-coded graphical display. NetView graphical displays are based on the Resource Object
Data Manager (RODM), which is an object-oriented data cache. Objects in RODM represent resources in
your network. The data cache is located in the memory of the host processor. Many applications can
interact with a single RODM, and more than one RODM can run on a host processor.
The Graphic Monitor Facility host subsystem (GMFHS) is the host program that works with RODM and
the NetView management console to manage resources. The NetView management console graphically
displays the resources that represent a network, a portion of the network, or a group of networks at
various levels of detail. GMFHS supports resources that can send status updates to the NetView program
in a standard format. GMFHS works with the NetView Resource Manager component and the NetView
management console to manage NetView tasks. GMFHS works with the discovery manager and the
NetView management console to view and manage sysplex TCP/IP stack information.
Figure 1 on page 1 shows the relationships of the graphical components.
This document describes the steps required to install and enable the NetView graphical functions. Also
included are workstation-based components that support graphical or other access.
Chapter 1. Introduction 3
4 IBM Z NetView: Installation: Configuring Graphical Components
Chapter 2. Enabling Graphics Support
The NetView base definitions that enable the graphics functions are contained in the CNMSTYLE member.
Make all changes to CNMSTYLE definitions in the CNMSTUSR or CxxSTGEN member. For information
about changing CNMSTYLE statements, see IBM Z NetView Installation: Getting Started.
CNMSTYLE statements are read during NetView initialization. Some changes to CNMSTYLE statements
require a restart of the NetView program before they take effect. For this reason, make all CNMSTYLE
updates at the same time for the graphics functions that you plan to use as part of this installation. The
following sections provide details on the CNMSTYLE definitions for the various graphics functions.
Note: The member name for the CNMSTYLE member is controlled by the value of NV2I in the NetView
start procedure.
The graphics components are activated with TOWER statements in the CNMSTYLE member. Copy the
TOWER statement to the CNMSTUSR or CxxSTGEN member and uncomment the components that you will
be using:
When the TOWER is enabled, various associated functions are also enabled during initialization. The
NetView program must be recycled for the TOWER statements to take effect.
Enabling RODM
Many NetView processes require the Resource Object Data Manager (RODM) name to be specified.
The RODMname statement in the CNMSTYLE member sets the CNMSTYLE.RODMNAME common global
variable.
You can set the RODM name using the system symbolic variable &CNMRODM in SYS1.PARMLIB. If you
do not set the &CNMRODM system symbolic variable, copy the following CNMSTYLE statement to the
CNMSTUSR or CxxSTGEN member and substitute the correct RODM name for &CNMRODM:
RODMname = &CNMRODM
For information about changing CNMSTYLE statements, see IBM Z NetView Installation: Getting Started.
The CNMSTYLE member also contains the following global variables, which are used by the RODM
command list (CNME1098):
COMMON.EKGHNAM = RODM
COMMON.EKGHPRC = EKGXRODM
If necessary, copy these statements to the CNMSTUSR or CxxSTGEN member, and update the variables as
needed:
EKGHPRC
Change the EKGHPRC global variable to the name of your RODM procedure (if it is not the same as the
default value supplied with the NetView product).
EKGHNAM
If you started the RODM procedure using an identifier, change the EKGHNAM global variable to this
identifier (if it is not the same as the default value supplied with the NetView product). If you are not
using an identifier, the EKGHNAM global variable is not required.
COMMON.DUIFHNAM = GMFHS
COMMON.DUIFHPRC = CNMGMFHS
If necessary, copy these statements to the CNMSTUSR or CxxSTGEN member, and update the variables as
needed:
DUIFHPRC
Specify your system PROC name for starting GMFHS. DUIFHPRC must be defined to the same name as
the GMFHS procedure.
DUIFHNAM
Specify the identifier you use when starting GMFHS. If you do not use an identifier when starting the
GMFHS procedure, do not specify the global variable DUIFHNAM.
For information about changing CNMSTYLE statements, see IBM Z NetView Installation: Getting Started.
INIT.NRM = No
2. Change No to Yes.
This starts NetView Resource Manager at NetView initialization.
If you do not change CNMSTYLE statements, NetView Resource Manager defaults to type MGR
(manager). No host destinations are defaulted.
3. If you want the NetView Resource Manager type to be an agent, copy the following CNMSTYLE
statements to the CNMSTUSR or CxxSTGEN member, and modify as needed for your system:
• NRM.TYPE
Change this statement to NRM.TYPE = Agent.
• NRM.HOSTDEST.x
Code as many NRM.HOSTDEST.x statements as are applicable.
Code CMODE and PORT statements as necessary (based on your HOSTDEST statements).
For information about changing CNMSTYLE statements, see IBM Z NetView Installation: Getting Started.
NetView graphics are based on Resource Object Data Manager (RODM) and Graphic Monitor Facility host
subsystem (GMFHS). Before you can define graphics, you must install and define parameters for RODM
and GMFHS.
RODM and GMFHS require the Language Environment® for z/OS run time library. See the Program
Directory for IBM Z NetView for more information.
Preparing RODM
Use the steps in this section to prepare RODM.
The EKGSI101 sample specifies VSAM SHAREOPTIONS(2) for performance reasons. However, with
SHAREOPTIONS(2), the RODM logging function makes no provision for secondary allocations. The
results of RODM logging with SHAREOPTIONS(2) using secondary allocations are unpredictable.
Note: Use the MVS MODIFY command to specify RODM logging options.
2. Make sure that the VSAM cluster names match the names in your RODM startup procedure,
EKGXRODM.
CHECKPOINT_FUNCTION ( NONE )
During initialization RODM looks for the checkpoint data sets. When it does not find them, you see one
or more of the following messages:
Note: You can now recycle the target system with the create link pack area (CLPA) option.
If you have your own user-defined class_name, replace RODMMGR with the security class name on the
RDEFINE commands. The resource names used are an example.
The RODM resource names consists of a prefix and a suffix. The suffix must have values of 1 through
6 for the different levels of security. The default resource name prefix is the RODM name specified in
the RODM startup JCL. For example, the RODM name is ZZRODM using either of the following start
commands:
S EKGXRODM,NAME=ZZRODM
S EKGXRODM.ZZRODM
SETROPTS CLASSACT(RODMMGR)
If you have your own user-defined class_name, replace RODMMGR with the security class name on the
SETROPTS command. The resource class name used is an example.
Where:
resourcename
Specifies the name of the RODM resource (such as RODM1 through RODM6) that has the appropriate
security level for the function that the userid needs to be able to perform. Indicate the highest level
RODM resource name the userid needs to access. If you indicate a user is authorized for RODM3, that
user also has authorization for security level 1 (RODM1) and security level 2 (RODM2) capabilities.
For example:
Indicates that USER1 is authorized to perform the capabilities of RODM security levels 1, 2, and 3.
Table 2 on page 11 describes the RODM security levels.
userid
Specifies the RACF user ID. You can list individual user IDs. You can also use the PERMIT command to
authorize a group to the authority level resources, which can be used to connect or remove user IDs
from the group as their need for RODM capabilities changes.
There are three special user IDs for AON, MultiSystem Manager, and the NetView Resource Manager.
These user IDs consist of the domain ID concatenated with the characters AON, MSM, and NRM
respectively.
Note: If you have a user-defined class_name, replace RODMMGR with the security class name on the
PERMIT commands.
Table 2 on page 11 shows how each level of access security includes those preceding it.
NetView operators require RODM security level 2 or higher to use the QRS command to query whether
they have span of control over resources. Authorize the following items:
• RODM load function
The RODM load function requires a minimum of RODM security level 3. If your RODM loader job is run
as a started procedure, you can define it to the STARTED class in the SAF product to enable it to run
as a trusted user. You can define the task in the started procedure table, ICHRIN03; however, using the
STARTED class is preferred.
• GMFHS procedure
The GMFHS procedure requires a minimum of RODM security level 5.
• NetView procedure (if NetView user code accesses RODM)
• DSIQTSK task
The DSIQTSK task requires RODM security level 6. Define user ID DSIQTSK or the value of the ID
keyword of the REP statement in the DSIQTSKI initialization member.
• Any user who submits or starts one of the following items:
– RODM load function
– NetView procedure (if NetView user code accesses RODM)
– DSIQTSK task
• Any user who manipulates RODM from the NetView program by using either RODMVIEW panels or the
RODMVIEW command processors.
A minimum of RODM security level 2 for the NetView domain name, if span of control is being applied to
NetView management console views and resources.
Connecting to RODM
When connecting to RODM, a user ID and password or password phrase are part of the API request. A
password or password phrase is required, except when the program making the request is running in an
APF-authorized library. The user ID can be specified on the connection request, or RODM can extract it
from the SAF product.
You can connect to RODM with a blank user ID if the system on which RODM is installed has active
RODM security. In this case, RODM extracts the user ID from the SAF product. Connecting to RODM is not
allowed if you bypassed RODM security.
If you have RODM security active, the user ID that is associated with the connection request must be
defined to your SAF security product.
For started procedures, you can define the started procedure name to the STARTED class of the SAF
product. In RACF, this can also be accomplished by defining the task in the started procedure table,
ICHRIN03; however, using the STARTED class is preferred.
/********************************************************************/
/* Cell pool and cell size definition. You can specify up to 200 */
/* cell sizes and cell pools. */
/********************************************************************/
CELL_POOLS ( 8, 12, 16, 20 )
CELL_POOLS ( 24, 28, 32, 36:2 )
CELL_POOLS ( 40:2, 48:2, 52:2, 56:2 )
CELL_POOLS ( 60:2, 64:2, 68:3, 72:3 )
CELL_POOLS ( 80:3, 88:3, 100:3, 104:3 )
CELL_POOLS ( 112:3, 120:3, 128:3, 136:4 )
CELL_POOLS ( 144:4, 152:4, 160:4, 168:4 )
CELL_POOLS ( 176:4, 184:4, 192:4, 200:4 )
CELL_POOLS ( 208:4, 216:4, 224:4, 232:4 )
CELL_POOLS ( 240:4, 248:4, 256:4, 384:6 )
CELL_POOLS ( 484:9, 512:8, 768:9, 1024:8 )
CELL_POOLS ( 1536:12, 2048:16, 3072:24, 4096:32 )
CELL_POOLS ( 6144:48, 8192:64, 12288:96, 16384:128 )
CELL_POOLS ( 24576:192, 32768:256 )
CELL_POOLS (8,12,16,20)
You can specify operands in any order, and all operands are optional. You can use symbols to represent
operands and values in EKGCUST if symbolic substitution is enabled on your system. Ensure that the
symbols are defined in member IEASYMxx of SYS1.PARMLIB.
Besides the operands specified above, you can code comments in the customization member. The
beginning and closing comment delimiters, /* and */, need not appear in the same record or line.
Comments are ignored by RODM and can appear any place a blank space is allowed.
You can also use symbols to represent comments if symbolic substitution is enabled on your system.
Ensure that the symbols are defined in member IEASYMxx of SYS1.PARMLIB. Code a symbol for the
beginning comment delimiter and a symbol for the closing comment delimiter.
Note: Note that the symbols for the beginning and closing comment delimiters must be coded on the
same line in EKGCUST.
If you do not supply customization values, RODM provides the defaults for all operands. Consider these
default values as guides.
TASK.DSIQTSK.INIT=Y
For information about changing CNMSTYLE statements, see IBM Z NetView Installation: Getting Started.
For each RODM you specify in DSIQTSKI you can define an initialization command processor to be
invoked when the DSIQTSK task successfully connects to RODM. Specify the name of this command
processor in each RODM definition statement.
The following example shows the DSIQTSKI initialization file:
CMDRCVR ID=DSIQTSK
*
REP &CNMRODM,CONN=N,AO=Y,T=30
⋮
TASK TASK001
TASK TASK002
⋮
Notice that you can specify the RODM name with a system symbolic (&CNMRODM).
You can define up to 64 RODMs and 64 NetView tasks in DSIQTSKI to be used for command routing.
The repository definition statements (REP) specify the object repository name, as well as:
• Whether DSIQTSK connects to the repository during initialization (CONN)
• Whether the repository is the current run time RODM (AO)
• The number of seconds that DSIQTSK waits to access the repository while it is being checkpointed (T)
(GRAPHICS)function.autotask.NMCpolicy = DUIFPOLI
Replace DUIFPOLI with your autotask name. The autotask name can be 1 - 8 characters long. When you
do this, a common global variable CNMSTYLE.AUTO.NMCPOLICY is created with the new autotask name.
For information about changing CNMSTYLE statements, see IBM Z NetView Installation: Getting Started.
Note: Do not change the global variable CNMSTYLE.AUTO.NMCPOLICY in the CNMSTASK or DSITBL01
member.
S EKGXRODM,TYPE=C,NAME=rodmname
or
S EKGXRODM.RODM,TYPE=C,NAME=rodmname
COLDFORC
, CLRSSB = NO
YES
*NOARM
, SUBSYM = *SUBSYM
, SUBSYM = *SUBSYM
*NOSUBSYM
, ROUTECDE = 1
, ROUTECDE = route_code
Type 1 to continue.
You then receive the following two messages:
IEC161I 227-229,EKGXRODM,EKGXRODM,EKGD003
EKG5011I EKGXRODM : THE NUMBER OF CHECKPOINT FILES USED
BY RODM IS 2.
Note: You cannot stop RODM by ending the current NetView program. To end RODM when started using
only its PROC name, enter the following command at the system console:
F procname,TERM
If you started RODM using an identifier, enter the following command at the system console:
F identifier,TERM
If you are running GMFHS and need to end or recycle RODM, end the GMFHS application before ending
RODM.
Note: GMFHS is dependent on the GMFHS data model being present in RODM and it is present only when
RODM is active. If you start GMFHS before RODM is active, or if you end RODM while GMFHS is still
active, GMFHS periodically checks to see if RODM has become active. If you then start RODM, and GMFHS
reconnects to RODM before the GMFHS data model becomes active, then GMFHS ends.
STOP TASK=CNMTAMEL
START TASK=CNMTAMEL,MEM=DUIISFP
S CNMGMFHS.GMFHS
, CLRSSB = NO
YES
*NOARM
, AGGRST = N , RESWS = N
, AGGRST = Y , RESWS = Y
N N
, SUBSYM = *SUBSYM
, SUBSYM = *SUBSYM
*NOSUBSYM
, ROUTECDE = 1
, ROUTECDE = route_code
where:
DOMAIN=domain_name
Specifies the name of your NetView domain.
AGGRST=Y|N
Specifies whether to run AGG calculation. The default is no (N).
ARM=*NOARM|*ARM|name
Specifies whether to register with the Automatic Restart Manager (ARM). The default is *NOARM.
If the value is ARM, the name generated is NETVIEW@@ concatenated with the domain_name and
the element type (SYSNETV4). This name cannot be changed.
You can register with ARM using a user-specified name. A valid name has the following
characteristics:
• Consists of 1–16 characters.
The NetView management console consists of topology servers and topology consoles that communicate
with each other, as shown in Figure 4 on page 27.
The NetView management console topology server provides information to NetView management console
topology consoles for displaying network topology and status. This information is retrieved from RODM.
The NetView management console server also provides the NetView management console topology
console with a set of tasks applicable to each resource type. It communicates with the NetView program
using either an SNA LU 6.2 (AIX® and Windows only) or TCP/IP session that has been established using
the NetView NETCONV command.
The NetView management console topology console graphically displays network topology and status.
This includes system and network views, using color to show the status of resources. It receives this
configuration and status from the NetView management console topology server and provides command
facilities for managing monitored resources.
Installing and configuring the NetView management console for graphics requires definitions in the
NetView program and the workstation environment.
CNMSJ009
Ensure that the NetView start procedure CNMSJ009 includes a DD statement for SYSTCPD that specifies
the TCP/IP configuration information data set. This might already have been included when the NetView
program was installed and configured.
CNMSTYLE
If GRAPHICS is specified on the TOWER statement in the CNMSTYLE member, NetView ensures that the
CNMTAMEL task is active. The CNMTAMEL task receives status changes for resources and forwards them
to the NetView management console. You can change the values of the following keywords to meet the
requirements of your network:
TAMEL.CONV.ip_sysdef = ipid
Specifies the IP server with which a NETCONV session is to be started during NetView initialization.
You can specify a port number by appending /portnum to the IP name or address. This is not
necessary if the port number is the same value as that specified by the TAMEL.PORT statement.
TAMEL.CONV.lu_sysdef = SNA
Specifies the SNA server with which a NETCONV session is to be started during NetView initialization.
TAMEL.PORT
Specifies the port used by the status focal point host for TCP/IP communication. This is not a required
keyword. The default is 4020.
Note: The value assigned to the PORT keyword on the NETCONV command overrides the value
assigned to this keyword in the DUIFPMEM member.
TAMEL.SOCKETS
Specifies the maximum number of sockets that the CNMTAMEL task can open simultaneously,
including those sockets used for connections that are started for TCP/IP-based NETCONV commands.
This is not a required keyword. The default is 50.
TAMEL.TCPANAME
Specifies the TCP/IP application procedure name that the status focal point host uses. This is a
required keyword for the TCP/IP function.
TAMEL.TTLS = NONE|ANY|REQUIRE
Specifies if the z/OS Communications Server Application Transparent Transport Layer Security (AT-
TLS) function is used to secure NETCONV TCP/IP sessions. The value specified also indicates if all
NETCONV sessions are required to be secure. The following values can be used:
/usr/lpp/netview/v6r4/samples
DUIISFP
This member defines the initialization values for the CNMTAMEL task. It contains the default values for
each operand.
DUIIGHB
DUIIGHB is the initialization member for the DUIDGHB task.
Security Considerations
Signing on to the NetView management console requires a valid NetView operator ID and password or
password phrase. The NetView program validates the password when the DSIOPF member is used. The
Chapter 4. Installing and Configuring the NetView Management Console for Graphics 29
SAF program validates the password or password phrase when OPERSEC is set to SAFDEF, SAFPW, or
SAFCHECK.
You can prevent unauthorized users from logging on to the NetView management console by restricting
access to the DUILOGON command used to connect to the NetView management console server. You
can restrict access using either an SAF product or the NetView command authorization table. For more
information, refer to IBM Z NetView Security Reference.
Using NGMFADMN
The NGMFADMN attribute can be used in NetView operator profiles and in the NETVIEW segment of
the SAF product. It specifies whether operators are allowed to perform administrative functions for the
NetView management console. Some examples of functions controlled by this keyword include:
• Using the command profile editor
• Adjusting aggregation for individual resources
• Customizing views
• Customizing settings and applying them to all topology consoles
• Creating custom views and aggregates using the RODM Collection Manager Wizard
NO
The operator does not have administrative authority for the NetView management console. This is the
default.
YES
The operator has administrative authority for the NetView management console.
Using NGMFCMDS
The NGMFCMDS attribute can be used in a NetView operator profile only. It cannot be specified using the
NETVIEW segment of the SAF product. It specifies whether operators are allowed to issue commands
from the popup menus of the NetView management console. NGMFCMDS does not prevent operators
from typing commands in a NetView command line window.
YES
The operator is allowed to issue commands from the popup menus on the NetView management
console. This is the default.
NO
The operator is not allowed to issue commands from the popup menus on the NetView management
console.
Chapter 4. Installing and Configuring the NetView Management Console for Graphics 31
No action is required if these port numbers do not conflict with your current application settings. However,
if there is a conflict, change the port number or numbers using these instructions:
1. On the topology server workstation, open a command window.
2. Change to one of the following directories:
• For Windows systems: %windir%\system32\drivers\etc
You can display the value of %windir% by entering set windir from a command prompt.
• For UNIX: ⁄etc
3. Add the appropriate entry to the services file. Substitute your port number for the following default
port numbers. These services must each have a unique port number; the same port number cannot be
used for more than one of these services.
Notes:
1. If you reassign the topology server console port, specify the port number on the topology console
Sign On window each time you sign on. However, the topology console retains the server:port setting
from the last signon (either ipv4address:port or [ipv6address]:port) and uses it to complete the Host
Machine field of the topology console Sign On window.
2. If you reassign the topology server 390 port, also customize the CNMSTYLE PORT statement in
the CNMSTUSR or CxxSTGEN member. See the IBM Z NetView Administration Reference for more
information about the PORT statement.
3. You do not need to reboot the workstation to activate the new PORT value.
Chapter 4. Installing and Configuring the NetView Management Console for Graphics 33
Setting Security for Your Operating System
If you are using a Windows system, additional security configuration steps are required. No additional
security configuration is required for UNIX platforms.
For a Windows system, add the following user rights to the user ID under which the topology server runs
so that it performs in the following ways:
• Acts as part of the operating system.
• Logs on as a service.
This is optional and needs to be set only if the topology server is run as a service. See “Configuring the
Topology Server to Run as a Windows Service” on page 34 for instructions.
Follow these instructions to set user rights for Windows systems:
1. Log on to an ID with administrator authority.
2. Click Start > Settings > Control Panel > Administrative Tools > Local Security Policy > Local
Policies > User Rights Assignment.
3. Click Act as part of the operating system
4. Click Action > Properties > Add User or Group.
5. Select the target user ID under which the topology server is to run by typing the name in the Enter the
object names to select field. Then click OK.
If you do not know the exact target user ID, click Advanced > Find Now to see a list of user IDs in the
name (RDN) panel.
Note: To filter or add other object types, click Object Types, select the applicable check boxes, and
click OK. Then, click Advanced.
6. Click OK on each window that you opened to close and save your selection.
7. Log off and log back on to the target ID for the user rights to take effect.
Where:
account_name
An account name in the form DomainName\UserName. If the account belongs to the local domain,
you can specify .\UserName.
password
The corresponding password or password phrase for the specified account name.
The topology server installs as two services: the topology server and the topology communications
server, and the startup option will be manual.
4. To change the startup to automatic, use the Windows Services control applet.
5. To delete the services, enter the ihsxsrv delete command from the same directory.
NETCONV STARTCON=ip_sysdef
To start communication using SNA, that was defined to start automatically but is not currently active,
enter
NETCONV STARTCON=lu_sysdef
These NETCONV commands cause the connection to be established under the autotask defined by the
function.autotask.NetConv statement in the CNMSTYLE member.
If you have not defined communication to start automatically, you can use the NETCONV command
with the ACTION=START keyword or with the STARTCON=ip_sysdef / lu_sysdef keyword to start
communication under the task issuing the NETCONV command.
Note: If the task under which communication is established ends for any reason, the connection is
broken. This is true for both the autotask specified in the CNMSTYLE member or the task under which the
NETCONV command (with ACTION=START or STARTCON=ip_sysdef / lu_sysdef ) was issued.
For more information about the NETCONV command, refer to the IBM Z NetView Command Reference
Volume 1 (A-N).
Chapter 4. Installing and Configuring the NetView Management Console for Graphics 35
Starting the Topology Console
You can start the topology console from a desktop icon in Windows or by issuing the command in line
mode. For specific information, refer to the IBM Z NetView User's Guide: NetView Management Console.
If you modify the DSIOPF member, either restart the NetView program or issue the REFRESH OPERS
command from the NetView command line to activate the changes.
You can specify a different autotask to use for NetView Resource Manager processing by copying the
following CNMSTYLE statement to the CNMSTUSR or CxxSTGEN member and updating the statement:
function.autotask.NRM=AUTONRM
This autotask must be defined in the DSIOPF member. For information about changing CNMSTYLE
statements, see IBM Z NetView Installation: Getting Started.
Note: The autotask that is used for NetView Resource Manger must have as little other activity as
possible; otherwise, NetView Resource Manager processing can be impacted.
Security Considerations
Consider the following aspects of security for NetView Resource Manager:
• “RODM Access” on page 37
• “Command Authorization” on page 38
RODM Access
You can add to your network security by authorizing access to RODM.
By defining the RODM user application ID to an SAF product, such as RACF, you can verify security levels
for API calls into RODM. For example, with a security level of 3, you can connect, disconnect, query,
create objects, delete objects, change fields, and so on. It prevents you from activities that include (but
are not limited to): creating classes and fields, deleting classes and fields.
Add the RODM user application ID (for NetView Resource Manager) to RACF or other security system
with a security level of 3. The RODM user application ID for NetView Resource Manager is your NetView
domain ID concatenated with the letters NetView Resource Manager (for example, CNM01NRM).
Note: Authorizing access to RODM is necessary only for manager hosts.
Command Authorization
The command definitions in CNMCMD (%INCLUDE member CNMCMENT) define the NetView Resource
Manager command procedures.
CMDDEF.CNME8600.MOD=DSICCP
CMDDEF.CNME8600.TYPE=R
CMDDEF.CNME8600.RES=Y
CMDDEF.CNME8600.ECHO=N
CMDDEF.CNME8601.MOD=DSICCP
CMDDEF.CNME8601.TYPE=R
CMDDEF.CNME8601.RES=Y
CMDDEF.CNME8601.CMDSYN=INITNRM
CMDDEF.CNME8602.MOD=DSICCP
CMDDEF.CNME8602.TYPE=R
CMDDEF.CNME8602.RES=Y
CMDDEF.CNME8602.CMDSYN=SUSPNRM
CMDDEF.CNME8604.MOD=DSICCP
CMDDEF.CNME8604.TYPE=R
CMDDEF.CNME8604.RES=Y
CMDDEF.CNME8604.ECHO=N
CMDDEF.NRMCTL.MOD=DSINRCTL
CMDDEF.NRMCTL.TYPE=R
If you modify the member CNMCMD or any of the members included by CNMCMD, use the ADDCMD
command to dynamically add the command without restarting the NetView program. The command
definition remains in effect until you restart the NetView program.
To implement command authorization checking:
1. Restrict the use of NetView Resource Manager commands to specific operators by modifying the
command authorizations of NetView Resource Manager commands as described in theIBM Z NetView
Security Reference.
The command definition statements that specify MOD=DSICCP represent REXX command lists.
NetView command authorization checking for REXX command lists does not apply to keyword and
keyword values.
Note: The CNME8600 sample runs on the NetView Resource Manager autotask, as specified by the
function.autotask.NRM statement in the CNMSTYLE member.
2. Ensure that the SOCKET command can be issued by the same operators who can issue INITNRM and
SUSPNRM commands.
3. Ensure that the SOCKET command can be issued by the NetView Resource Manager autotask.
4. You can have command authorization performed on the keywords and values of the NRMCTL
command.
5. NetView Resource Manager uses FLCARODM. You can have command authorization performed on the
keywords and values of the FLCARODM command.
6. Commands are available on the NetView management console for all NetView Resource Manager
objects. Some of these commands are protected by the default security (CNMSCAT2 or CNMSAF2)
of the NetView program. Refer to the IBM Z NetView Resource Object Data Manager and GMFHS
Programmer's Guide for more information about the commands that are available for NetView
Resource Manager objects. This book also identifies which of these commands are protected.
If you want to enable the protected commands to be issued for the local domain, authorize
the NetView operators to log on to the NetView management console client for the appropriate
commands. If you want to enable the protected commands to be issued for a remote domain,
then authorize the NetView Resource Manager autotask, on the remote domain, for the appropriate
commands.
Initialization Considerations
You can start the NetView Resource Manager at NetView initialization by copying the INIT.NRM statement
from the CNMSTYLE member to the CNMSTUSR or CxxSTGEN member, and specifying INIT.NRM = Yes.
For information about changing CNMSTYLE statements, see IBM Z NetView Installation: Getting Started.
You can also start the NetView Resource Manager at a later time by issuing the INITNRM command.
Note: Before starting the NetView Resource Manager, review the initialization parameters in the
CNMSTYLE member, and customize them as necessary in the CNMSTUSR or CxxSTGEN member.
You can override all parameters except the DISPLAY STATUS values on the INITNRM command.
After customizing CNMSTYLE statements, use the RESTYLE NRM command to stop the NetView Resource
Manager and restart it.
Sampling
NetView Resource Manager detects RODM failures when an NetView Resource Manager request fails.
NetView Resource Manager continues trying to connect to RODM until either a connection is established
or the NetView Resource Manager is shut down.
When the connection is reestablished, it requests status from all the agents NetView Resource Manager
was monitoring at the time of the failure.
You might want to specify a value for sampling in order for the NetView Resource Manager to detect
RODM failures, especially if the status of your NetView Resource Manager objects does not change very
often.
If you want sampling to occur, either modify the NRM.SAMPLERATE statement in the CNMSTUSR or
CxxSTGEN, or specify the SAMPLE keyword on the INITNRM command. For information about changing
CNMSTYLE statements, see IBM Z NetView Installation: Getting Started.
Active Satisfactory
Inactive Unknown
Unknown Unknown
Threshold 1 met or exceeded Intermediate
Threshold 2 met or exceeded Medium Unsatisfactory
Threshold 3 met or exceeded Unsatisfactory
RESET Unknown
RMTCMD Considerations
NetView Resource Manager uses the RMTCMD command to communicate between NetView hosts.
Ensure that RMTCMD capability exists for each mode of communication (SNA, IP, or IPV6) to be used for
transporting data between managers and agents. For example, if an agent is reporting to a manager using
IP or IPV6, TCP/IP-based remote operations must be enabled at the agent and manager hosts.
Security Considerations
Consider the following aspects of security for the discovery manager:
• “RODM Access” on page 43
• “Command Authorization” on page 43
RODM Access
You can add to your network security by authorizing access to RODM.
By defining the RODM user application ID to an SAF product, such as RACF, you can verify security levels
for API calls into RODM. For example, with a security level of 3, you can connect, disconnect, query,
create objects, delete objects, change fields, and so on. It prevents you from actions that include (but are
not limited to) creating and deleting classes and fields.
Add the RODM user application ID (for the discovery manager) to RACF or other security system with a
security level of 3. The RODM user application ID for the discovery manager is your NetView domain ID
concatenated with the letters MSM (for example, CNM01MSM).
Note: Authorizing access to RODM is necessary only for manager hosts.
Command Authorization
The command definitions in CNMCMD (%INCLUDE member CNMCMENT) define discovery manager
command procedures.
CMDDEF.CNMEERSC.MOD=DSICCP
If you modify the CNMCMD member or any of the members included by CNMCMD, use the ADDCMD
command to dynamically add the command without restarting the NetView program. The command
definition remains in effect until you restart the NetView program.
To implement command authorization checking:
1. Restrict the use of the discovery manager command to specific operators by modifying the command
authorizations of the discovery manager command as described in theIBM Z NetView Security
Reference.
The command definition statements that specify MOD=DSICCP represent REXX command lists.
NetView command authorization checking for REXX command lists does not apply to keyword and
keyword values.
2. The discovery manager uses the FLCARODM command. You can have command authorization
performed on the keywords and values of the FLCARODM command.
As discovery manager gathers network topology information, they store that information in RODM.
By default, this information is presented by the NetView management console in a top-down, hierarchical
perspective. You can change these default views in the NetView management console to accomplish the
following goals:
• Meet the needs of your organization
• Customize the graphical representation of your network
Access to the list of views, including access to individual objects within those views, can be granted on a
per-operator basis.
Types of Views
A NetView management console operator can view the following types of views:
• Network views
• Exception views
Network views are created by gathering topology and status from topology agents or by using tools,
such as the RODM collection manager (from the NetView management console) or BLDVIEWS. Network
views are capable of displaying objects as they relate to other objects, by showing relationships or links
between them.
The current state of each device within the view is represented by a color scheme. The default colors are
green for satisfactory status and red for unsatisfactory status.
Note: You can change the default status (which affects the color) for real objects that are created by
the MultiSystem Manager IBM Tivoli NetView Manager agent and that do not have any outstanding
events. You can do that by using the COMMON.FLC_DEFAULT_ITNM_OBJECT_STATUS statement; for
more information about this statement, see the IBM Z NetView Administration Reference.
Exception views are special types of views which show objects that are in an exception state and that
might require operator attention.
For example, as a network device becomes inoperable, its state might change from satisfactory to
unsatisfactory. If an exception view is defined to display this type of device, an object representing that
device appears within this exception view, alerting an operator about the unsatisfactory state. When the
device becomes operable again, it disappears from the exception view.
Because the RODM collection manager is capable of creating views that actively track changes in RODM,
you can use the RODM collection manager to create a network view with characteristics that are similar
to an exception view. For example, you can create a RODM collection that specifies all IP Routers that are
not in satisfactory state; this becomes a network view that resembles the functionality of an exception
view.
Exception views and RODM collection manager views with similar characteristics have a few differences
that might make one a more appropriate choice than the other in a given situation.
• Advantages of exception views:
– Exception views use less CPU resource on the host system.
They are only created and maintained when a NetView management console user has an exception
view open.
– Exception views can be opened at the NetView management console by default in Details mode while
network views are still opened by default in Topology mode.
• Advantages of RODM collection manager views with similar characteristics:
When the operator clicks the plus sign, the tree is expanded to show the available views:
Correlating Views
The NetView program uses topology correlation to automatically tie together resources managed by
different types of topology agents. Topology correlation is provided for all discovery manager and
customer or vendor applications that use the GMFHS data model.
Most managed resources participate in more than one network or system. For example, an IP stack that is
managed through sysplex management can have a presence in the IP environment and in a z/OS system.
Most management agents recognize only one type of network or system, as opposed to every resource
running in the system. For example, the IBM Tivoli Network Manager agent recognizes resources with IP
addresses. Therefore, an IP view of the example IP stack contains information related to IP, but not the
z/OS system.
Topology correlation overcomes the agent-specific perspective of management agents and enables a
graphic monitor view to contain all components of a network device. This single view includes the current
status of all components.
Object correlation is enabled by loading the FLCSDM8 input file into RODM. To load FLCSDM8, uncomment
the following line in the CNMSJH12 job:
Correlation occurs when an application sets a valid value in a field of a RODM object that is enabled for
correlation. Objects are enabled for correlation by loading the FLCSDM8 file.
MultiSystem Manager automatically set the value of these fields, which results in correlation.
Views are displayed on a NetView management console.
RODMVIEW
RODMVIEW is a menu-driven tool that you can use to display and manipulate RODM objects from the
NetView command facility. It requires knowledge of GMFHS and other data models. It does not require a
separate workstation installation.
RODM Unloader
As data is dynamically added to RODM, you might want to periodically use the RODM Unloader to create
text files that represent the current contents of RODM. This is a slightly different archival method than
checkpointing. A checkpoint data set is a binary representation of the current contents of RODM, which
can be used to restart RODM. The RODM Unloader utility takes the contents of RODM and creates RODM
Loader language statements that can be reloaded later.
FLCARODM
FLCARODM (RODM Access Facility) provides a fast and efficient REXX interface to RODM. (FLCARODM was
formerly known as the RODM Access Facility or MultiSystem Manager Access.) With FLCARODM, you can
create, update, and delete objects using a NetView CLIST written in REXX. FLCARODM provides a simple
interface to RODM and you can use it to exploit the processing advantages of issuing batched requests to
RODM.IBM Z NetView Resource Object Data Manager and GMFHS Programmer's Guide
BLDVIEWS
BLDVIEWS can gather a set of objects based on a naming convention. You can use BLDVIEWS to:
• Create either a network or an exception view out of that set of objects.
• Manipulate a field on that set of objects.
BLDVIEWS is controlled by an input file.
Network views created by BLDVIEWS are snapshots in time. As network topology changes occur, it might
be necessary to recreate the views by rerunning BLDVIEWS. For this reason, it is advisable to migrate
BLDVIEWS-based views to RODM collection manager views. The FLCV2RCM command can be used to do
this.
For more information about FLCV2RCM, see NetView online help.
BLDVIEWS can also be used to:
• Create aggregate objects
• Link and unlink objects to and from views and aggregates
Views or aggregates can be grouped by:
• Networks
• Regions
• Locations
• Sites
• Plants
• Buildings
• Floors
• Individual operator responsibilities
You can set or change fields such as DisplayResourceOtherData.
Using the GMFHS data model, you can create objects in these classes:
• Various view object classes
• GMFHS_Aggregate_Objects_Class
• GMFHS_Managed_Real_Objects_Class
You cannot use BLDVIEWS to delete objects, classes, or fields, but you can modify certain fields of
objects.
Views and aggregates created by BLDVIEWS are static. Only the objects that are in RODM at the time you
run BLDVIEWS are processed. If new objects are added to RODM, you must rerun BLDVIEWS. BLDVIEWS
changes to the RODM data cache are not part of any RODM loader file and are lost if RODM is cold-started.
Views that are created with BLDVIEWS might need to be recreated because they can become out-of-date
as system and network resources change.
You can use BLDVIEWS to enable generic command support (for example activate and deactivate)
from the NetView management console on MultiSystem Manager-discovered network resource objects.
DELVIEWS
You can use DELVIEWS to delete the following customized views from RODM:
• Network views
• Configuration peer views
• Configuration backbone views
• Exception views
For example, to delete a specific exception view (NET_EX_VIEW), type:
You can also use an asterisk (*) as a wild card at the end of a view name. For example, to delete all
network views with names starting with LAN, enter:
DELVIEWS LAN*
To establish LU 6.2 connectivity between your host and the NetView management console topology
servers, define the workstation-to-host connections in your VTAM and NCP definitions. You can define
your workstation connections to the host using any type of connection that allows parallel LU 6.2
conversion.
Note: LU 6.2 connectivity is available only on the AIX and Windows platform of the NetView management
console topology server.
Because LAN-attached workstations appear as switched nodes to VTAM, they must be defined in a
switched major node. In the following example, the LOCADDR=00 LU is the independent LU that the
NetView management console topology server uses. The four other LUs are the dependent LUs that are
used as the 3270 emulation screens.
Note: The LU names that you specify here must also be specified when you define the NetView
management console topology server profile configurations.
For information about the following example, see the z/OS Communications Server library:
Because the server workstation uses LU 6.2 parallel session support, you must update the ADDSESS,
MAXSESS, and AUXADDR keywords specified on the build macro to support this configuration.
To update these keywords, perform the following tasks:
1. Verify that you specified the correct keywords and values on the LUDRPOOL macro.
Because LAN-attached workstations appear as switched nodes to VTAM, they must be defined in a
switched major node. In the following example, the LOCADDR=00 LU is the independent LU that the
NetView management console topology server uses. The four other LUs are the dependent LUs that are
used as the 3270 emulation screens.
Note: The LU names that you specify here must also be specified when you define the NetView
management console topology server profile configurations.
For information about the following example, see the z/OS Communications Server library:
Because the server workstation uses LU 6.2 parallel session support, you must update the ADDSESS,
MAXSESS, and AUXADDR keywords specified on the build macro to support this configuration. Verify that
you have specified the correct keywords and values on the LUDRPOOL macro. If you already modified
these keywords, ensure that you defined them correctly for the configuration you are defining. Perform
the changes to these keywords on every NCP that has a server workstation.
Appendix A. SNA Definitions for the NetView Management Console Topology Servers 53
Note: Workstations can have additional local LU profiles and partner LU profiles that define LUs that are
used by other applications. These profiles must not specify the same LU names that are used by the
topology server.
To define the LU name of the topology server on the topology server workstation, use the sample ts.acg
configuration file in one of the following directories:
• For Windows systems: %BINDIR%\TDS\server\sample
• For UNIX systems: $BINDIR⁄TDS⁄server
This file is shipped with the NetView management console and represents a sample communications
server configuration file for the topology server LU 6.2 communications. Use the configuration file as
a guide to tailor the configuration to fit your environment. See the appropriate communications server
documentation for more information about LU 6.2 connections.
Local LU Profile
Table 5 on page 55 shows an example of the topology server workstation configuration for the logical
unit profile you have specified.
Appendix A. SNA Definitions for the NetView Management Console Topology Servers 55
Table 5. Local LU Profile (Communications Server) (continued)
Communications Example Field Value Explanation
Server Field Name
NAU Address Independent LU The topology server requires that an
independent LU be selected.
Modes Profile
Table 6 on page 56 is an example of the topology server workstation configuration for the transmission
service mode profile.
Appendix A. SNA Definitions for the NetView Management Console Topology Servers 57
58 IBM Z NetView: Installation: Configuring Graphical Components
Appendix B. NetView Graphics Samples
GMFHS Samples
Table 9 on page 59 lists the samples and includes a brief description of each GMFHS sample and the
data set name where each member resides when installation is complete.
DUIFCUXM same Sample RODM method (for exception views) that CNMSAMP
is driven as an installation exit by GMFHS if the
USRXMETH keyword is set in the DisplayStatus
mapping table
For more information about DUIFCUXM, refer to the
IBM Z NetView Resource Object Data Manager and
GMFHS Programmer's Guide for information about
DUIFCUXM, USRXMETH, and the DisplayStatus
mapping table.
RODM Samples
Table 12 on page 61 lists the RODM samples found in the NETVIEW.V6R4M0.CNMSAMP library. The
table includes a brief description of each sample and the data set name into which each member is
copied.
All required JCL and definitions can be found in the NETVIEW.V6R4M0.CNMSAMP library under the
distributed sample name.
DSIQTSKI same Defines RODM tasks to the RODM access and DSIPARM
control subtask (DSIQTSK)
EKG_ConnectLong
EKG_Connect
EKG_Disconnect
EKG_Checkpoint
EKG_Stop
EKG_CreateClass
EKG_DeleteClass
EKG_CreateField
EKG_DeleteField
EKG_DeleteSubfield
EKG_ChangeField
EKG_SwapField
EKG_ChangeSubfield
EKG_SwapSubfield
EKG_LinkTrigger
EKG_LinkNoTrigger
EKG_UnLinkTrigger
EKG_UnLinkNoTrigger
EKG_CreateObject
EKG_DeleteObject
EKG_RevertToInherited
EKG_AddNotifySubscription
EKG_TriggerNamedMethod
EKG_TriggerOIMethod
EKG_AddObjDelNotifySubs
EKG_DelObjDelNotifySubs
EKG_ChangeMultipleFields
EKG_QueryField
EKG_QuerySubfield
EKG_QueryEntityStructure
EKG_QueryFieldStructure
EKG_QueryFieldID
EKG_QueryFieldName
EKG_QueryNotifyQueue
EKG_QueryMultipleSubfields
EKG_QueryResponseBlockOverflow
EKG_ExecuteFunctionList
EKG_QueryFunctionBlockContents
EKG_LockObjectList
EKG_UnlockAll
EKG_ResponseBlock
EKG_SendNotification
EKG_SetReturnCode
EKG_WhereAmI
EKG_OutputToLog
EKG_MessageTriggeredAction
EKG_QueryObjectName
EKG5VDCL same PL/I sample that declares RODM data types CNMSAMP
EKG5WAIT same PL/I sample to invoke RODM EKGWAIT CNMSAMP
EKG61100 same C Sample - Function (connect with password CNMSAMP
phrase)
EKG_ConnectLong
EKG_Connect
EKG_Disconnect
EKG_Checkpoint
EKG_Stop
EKG_CreateClass
EKG_DeleteClass
EKG_CreateField
EKG_DeleteField
EKG_CreateSubfield
EKG_DeleteSubfield
EKG_ChangeField
EKG_SwapField
EKG_ChangeSubfield
EKG_LinkTrigger
EKG_LinkNoTrigger
EKG_UnLinkTrigger
EKG_UnLinkNoTrigger
EKG_CreateObject
EKG_DeleteObject
EKG_RevertToInherited
EKG_AddNotifySubscription
EKG_DeleteNotifySubscription
EKG_TriggerNamedMethod
EKG_TriggerOIMethod
EKG_AddObjDelNotifySubs
EKG_DelObjDelNotifySubs
EKG_QueryField
EKG_QuerySubfield
EKG_QueryEntityStructure
EKG_QueryFieldStructure
EKG_QueryFieldID
EKG_QueryFieldName
EKG_QueryNotifyQueue
EKG_QueryMultipleSubfields
EKG_Locate
EKG_QueryResponseBlockOverflow
EKG_ExecuteFunctionList
EKG_QueryFunctionBlockContents
EKG_LockObjectList
EKG_ResponseBlock
EKG_SendNotification
EKG_SetReturnCode
EKG_WhereAmI
EKG_OutputToLog
EKG_MessageTriggeredAction
EKG_QueryObjectName
FLCARODM Samples
The following samples are specific to FLCARODM which provides an external REXX interface for the
manipulation of RODM objects.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS"
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE.
Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore,
this statement might not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically
made to the information herein; these changes will be incorporated in new editions of the publication.
IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in
any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of
the materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the
exchange of information between independently created programs and other programs (including this
one) and (ii) the mutual use of the information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Such information may be available, subject to appropriate terms and conditions, including in some cases
payment of a fee.
The licensed program described in this document and all licensed material available for it are provided by
IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement or any
equivalent agreement between us.
Information concerning non-IBM products was obtained from the suppliers of those products, their
published announcements or other publicly available sources. IBM has not tested those products and
cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM
products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of
those products.
Programming Interfaces
This publication documents information that is NOT intended to be used as Programming Interfaces of
IBM Z NetView.
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at http://www.ibm.com/legal/copytrade.shtml .
Adobe is a trademark of Adobe Systems Incorporated in the United States, and/or other countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or
its affiliates.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or
both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other product and service names might be trademarks of IBM or other companies.
Notices 75
76 IBM Z NetView: Installation: Configuring Graphical Components
Index
A CNMSJI10 (continued)
EIBCOPY 61
accessibility xii CNMSNIFF 59
activating CNMSTYLE
NetView Resource Manager event manager autotask 17
AUTONRM 37 GMFHS global variables 6
initialization 39 RODM global variables 5
initialization, display status defaults 39 status focal point 28
initialization, monitoring remote systems 39 TCP/IP 28
initialization, sampling 39 CNMSTYLE initialization statements
security 37 COMMON.FLC_DEFAULT_ITNM_OBJECT_STATUS 45
security, command authorization 38 CNMTAMEL
allocating task definitions 60
VSAM clusters CNMTAMEL task 28
for RODM 7 collection manager
allocating VSAM clusters for RODM RODM 48
CNMSID01 7 command authorization
AUTH statement discovery manager security 43
NGMFADMN keyword usage 30 NetView Resource Manager security 38
NGMFCMDS keyword usage 30 command definition statements
AUTONRM GMFHS 59
NetView Resource Manager 37 COMMON.FLC_DEFAULT_ITNM_OBJECT_STATUS statement
autotasks 45
event manager 17 Communications Server
configuring for SNA, NetView management console 53
local LU profile 55
B local modes profile 56
BLDVIEWS transaction program definitions 56
RODM 49 Communications Server, using
books to configure for SNA LU 6.2
see publications ix workstation network 54
configuring
communications server
C configuring for SNA LU 6.2 53
for user rights for Windows systems 34
characteristics
topology server 31
local node
workstation network, NetView management console
LAN 55
configuring for SNA 53
checkpoint data sets
configuring for SNA LU 6.2
RODM 7
workstation network, NetView management console
CNMCMENT
using Communications Server 54
command definitions 61
connecting to RODM 12
CNME2101, GMFHS command list 6
connections
CNMGMFHS 16, 23
for LAN 57
CNMHELPR
control profile, data link
helpmap 61
for LAN 54
CNMS4290 61
conventions
CNMSID01
typeface xii
delete VSAM databases 61
correlating
CNMSJ004
views 47
allocate logs and databases 61
COS gateway autotask 17
job
CPDLB2 volume 8
allocating VSAM clusters for RODM 7
customization
CNMSJH10 16, 23
RODM 13
CNMSJH12
load RODM data cache 61
CNMSJH13 59
CNMSJI10
Index 77
D EGVREAD2.ME 31
EKGCUST
data link sample customization member 13
control profile EKGHNAM global variable 5
for LAN 54 EKGHPRC global variable 5
data models EKGKUJCL 69
loading GMFHS 23 EKGMIMV
loading MultiSystem Manager 23 named method 69
loading SNA topology manager 23 EKGNEQL
default status color 45 notification method 69
defining EKGNLST
NetView Resource Manager notification method 69
Autotask 37 EKGNOTF
VSAM clusters notification method 70
for RODM 7 EKGNTHD
defining IP socket port numbers 31 notification method 70
defining resources EKGOPPI
RACF 10 object independent method 70
defining the LU name 53 EKGPTENU 70
DELVIEWS EKGRDUMP 70
RODM 50 EKGRLOG
directory names, notation xiii log formatter JCL 8
discovery manager EKGSI101
activating 43 RODM checkpoint data set 7
command authorization 43 RODM logs 7
enabling 44 EKGSI202 70
managing resources 44 EKGSNIFF 59
preparing 43 EKGSVER
RODM access 43 verification member 21
security considerations 43 EKGXRODM
DSIQTSK task 15 sample start job 18
DSIQTSKI 15, 61 enabling
DUIDGHB task 28 NetView Resource Manager 6
DUIFCSGW object correlation
command processor 17 for additional SNA topology manager 47
DUIFCUX2 59 environment variables, notation xiii
DUIFCUXM, exception views 59 Ethernet LAN-attached workstation, defining 51
DUIFDEXV 60 event manager 17
DUIFEDEF 60 exception views
DUIFEMDY 60 implementing 47
DUIFEUSR 60
DUIFHNAM global variable 6
DUIFHPRC global variable 6
F
DUIFPMEM 60 FLBTRDM*
DUIFSMT 60 SNA topology manager data models 23
DUIFSNET FLCARODM
non-SNA network samples 70
22 FLCSDM*
DUIFSSCO 17 MultiSystem Manager data models 23
DUIFSTRC FLCSDM8 47
GMFHS data model 23
DUIGINIT 60
DUIGPWLU 17, 60 G
DUIIGHB 29, 60
GHB.TCPANAME keyword 29
DUIISFP 15, 29, 60
global variables
DUILOGON command 29
DUIFHNAM 6
DUIPOLCY 60
DUIFHPRC 6
dump utility, RODM 9
GMFHS 6
RODM 5
E GMFHS
automation example 59
EDGXRODM CNME2101 6
start procedure 13 command definition statements 59
EGVREAD1.ME 35
Index 79
NMCSTATUS policy definitions 47 RODM (continued)
node characteristics, local allocating VSAM clusters for (continued)
LAN 55 CNMSID01 7
notation BLDVIEWS 49
environment variables xiii checkpoint data set 70
path names xiii command definitions 61
typeface xiii customization file, sample 69
notification method 69 customization parameters 13
data model, sample 60
defining security
O to RODMMGR class 9
object class definitions to user-defined class 10
RODM 22 defining the checkpoint data sets 7
object correlation definition statement
enabling MAXLNTH 11
for additional SNA topology manager 47 delete VSAM databases, using CNMSID01 61
enabling for additional SNA topology manager 47 DELVIEWS 50
online publications description 1
accessing xi DSIQTSK 15
dump utility 70
ending 21
P exception views 59
global variables 5
path names, notation xiii
helpmap 61
port numbers, reassigning 31
initialization method
preparing
sample 69
NetView Resource Manager
initialization values 15
AUTONRM 37
installation verification
initialization 39
EKGSVER 70
initialization, display status defaults 39
installing 7
initialization, monitoring remote systems 39
load file, sample 60
initialization, sampling 39
load RODM data cache
security 37
CNMSJH12 61
security, command authorization 38
loading the data cache 22
profile
log 70
local LU 55
log formatter 69
local modes 56
MVS subsystem, defining 7
profile, control
object load 69
data link for LAN 54
RODM Unloader 48
publications
RODMVIEW 48
accessing online xi
samples 61
IBM Z NetView ix
SEC_CLASS field 9
ordering xi
SEC_RNAME field 10
security 9
R start procedure 13
start with EKGXRODM 70
RACF starting 18
RODM security 9 structure load 69
RACF security tasks 61
defining resources 10 tools
readme files BLDVIEWS 49
EGVREAD1.ME 35 DELVIEWS 50
EGVREAD2.ME 31 RODM collection manager 48
reassigning port numbers 31 RODM Unloader 48
Resource Manager, NetView RODMVIEW 48
enabling 6 using dump utility 9
resource object data manager verifying using EKGSVER 21
using RODM dump utility 9 views
RMTCMD considerations customizing 49
monitoring remote NetView systems 40 deleting 50
RODM RODM collection manager 48
allocate log using CNMSJ004 61 RODM connection 12
allocating VSAM clusters 7 RODM tools 48
allocating VSAM clusters for RODM Unloader 48
Index 81
workstation (continued)
defining
Ethernet LAN-attached 51
token-ring LAN-attached 52
workstation configuration
configuring for SNA, NetView management console 53
workstation network, NetView management console
configuring Communications Server
for SNA LU 6.2 53
configuring for SNA 53
GC27-2852-04