IP Management
IP Management
Version 6 Release 3
IP Management
IBM
SC27-2855-03
Note
Before using this information and the product it supports, read the information in “Notices” on page
161.
This edition applies to version 6, release 3 of IBM Z NetView (product number 5697-NV6 ) and to all subsequent
versions, releases, and modifications until otherwise indicated in new editions.
This edition replaces SC27-2855-02.
© Copyright International Business Machines Corporation 2009, 2019.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM Corp.
Contents
Figures................................................................................................................ vii
About this publication.........................................................................................xiii
Intended audience.................................................................................................................................... xiii
Publications............................................................................................................................................... xiii
IBM Z NetView library.......................................................................................................................... xiii
Related publications ........................................................................................................................... xiv
Terminology in this Library................................................................................................................... xv
Using IBM Z NetView online help......................................................................................................... xv
Accessing publications online.............................................................................................................. xv
Ordering publications ..........................................................................................................................xvi
Accessibility .............................................................................................................................................. xvi
Tivoli user groups.......................................................................................................................................xvi
Support information.................................................................................................................................. xvi
Conventions used in this publication........................................................................................................ xvi
Typeface conventions ........................................................................................................................ xvii
Operating system-dependent variables and paths............................................................................xvii
Syntax diagrams.................................................................................................................................. xvii
iii
Chapter 6. Managing Dynamic Virtual IP Addresses................................................................................ 45
Updating DVIPA Information by Using Events ....................................................................................45
Using Distributed DVIPA Statistics...................................................................................................... 46
Using 3270 Commands........................................................................................................................48
Using NetView Enterprise Management Agent Workspaces.............................................................. 49
Distributed DVIPA Connection Routing Workspace...................................................................... 49
Distributed DVIPA Server Health Workspace................................................................................ 50
Distributed DVIPA Targets Workspace.......................................................................................... 51
DVIPA Connections Workspace......................................................................................................52
DVIPA Definition and Status Workspace........................................................................................53
DVIPA Sysplex Distributors Workspace......................................................................................... 54
VIPA Routes Workspace................................................................................................................. 55
DVIPA Stack Summary Workspace................................................................................................ 56
Chapter 9. Discovering IP Network Topology with the MultiSystem Manager IBM Tivoli Network
Manager Agent......................................................................................................................................95
IP View Objects.................................................................................................................................... 95
Finding Resources................................................................................................................................ 97
Navigating Network Views................................................................................................................... 98
Viewing IP Networks............................................................................................................................ 98
IP Networks View............................................................................................................................99
User-defined Views...................................................................................................................... 100
IP Subnetwork Views................................................................................................................... 102
Router, Bridge, Hub, Host, and Switch Views..............................................................................103
iv
Using Extended SNMP Groups..................................................................................................... 112
Using IP Resource Management....................................................................................................... 113
IP Resource Management Main Panel......................................................................................... 113
IP Resource Management Add Panel.......................................................................................... 114
IP Resource Management Change Panel.....................................................................................115
IP Resource Management Filters Panel.......................................................................................116
IP Resource Management Command Window............................................................................ 117
Monitoring Critical Ports.................................................................................................................... 117
Managing SNA over IP........................................................................................................................118
v
Cnmipxl Examples: Conversion of Presentation Form to Binary.................................................148
Cnmipxl Examples: Conversion of Binary to Presentation Form.................................................149
CNMIPXLATE NetView PL/I Macro.................................................................................................... 151
CNMIPXLATE Example: Verification.............................................................................................151
CNMIPXLATE Examples: Conversion of One Presentation Form to Another..............................151
CNMIPXLATE Examples: Conversion of Presentation Form to Binary........................................ 152
CNMIPXLATE Examples: Conversion of Binary to Presentation Form........................................ 153
Notices..............................................................................................................161
Programming Interfaces..........................................................................................................................162
Trademarks..............................................................................................................................................162
Privacy policy considerations.................................................................................................................. 163
Index................................................................................................................ 165
vi
Figures
1. Sysplex Configuration................................................................................................................................. 14
vii
24. CSS01 More Detail Physical View............................................................................................................. 40
viii
49. PKTTRACE Summary - Save Packets Panel............................................................................................. 68
55. Packet Detail for the Packet Selected in Session Analysis Packets........................................................ 72
58. UDP Session Report (Packet Detail for the Selected UDP Session)........................................................ 75
ix
74. Connection Management: Selected Stacks..............................................................................................89
82. Types of IP View Objects for the IBM Tivoli Network Manager Agent.................................................... 97
x
99. TCP/IP SNMP Commands Panel: Walk Command.................................................................................110
xi
xii
About this publication
The IBM Z® NetView® product provides advanced capabilities that you can use to maintain the highest
degree of availability of your complex, multi-platform, multi-vendor networks and systems from a single
point of control. This publication, IBM Z NetView IP Management, provides information about using the
NetView program to manage IP networks.
Intended audience
This publication is for network operators and network system programmers who use the NetView
program to manage IP networks.
Publications
This section lists publications in the IBM Z NetView library and related documents. It also describes how
to access NetView publications online and how to order NetView publications.
Related publications
You can find additional product information on the IBM Z NetView web site at https://www.ibm.com/us-
en/marketplace/ibm-tivoli-netview-for-zos.
For information about the NetView Bridge function, see Tivoli NetView for OS/390® Bridge Implementation,
SC31-8238-03 (available only in the V1R4 library).
Accessibility
Accessibility features help users with a physical disability, such as restricted mobility or limited vision, to
use software products successfully. Standard shortcut and accelerator keys are used by the product and
are documented by the operating system. Refer to the documentation provided by your operating system
for more information.
For additional information, see the Accessibility appendix in the User's Guide: NetView.
Support information
If you have a problem with your IBM software, you want to resolve it quickly. IBM provides the following
ways for you to obtain the support you need:
Online
Please follow the instructions located in the support guide entry: https://www.ibm.com/support/
home/pages/support-guide/?product=4429363.
Troubleshooting information
For more information about resolving problems with the IBM Z NetView product, see the IBM Z
NetView Troubleshooting Guide. You can also discuss technical issues about the IBM Z NetView
product through the NetView user group located at https://groups.io/g/NetView. This user group is for
IBM Z NetView customers only, and registration is required. This forum is also monitored by
interested parties within IBM who answer questions and provide guidance about the NetView
product. When a problem with the code is found, you are asked to open an official case to obtain
resolution.
Syntax diagrams
The following syntax elements are shown in syntax diagrams. Read syntax diagrams from left-to-right,
top-to-bottom, following the horizontal line (the main path).
• “Symbols” on page xvii
• “Parameters” on page xviii
• “Punctuation and parentheses” on page xviii
• “Abbreviations” on page xix
For examples of syntax, see “Syntax examples” on page xix.
Symbols
The following symbols are used in syntax diagrams:
Parameters
The following types of parameters are used in syntax diagrams:
Required
Required parameters are shown on the main path.
Optional
Optional parameters are shown below the main path.
Default
Default parameters are shown above the main path. In parameter descriptions, default parameters
are underlined.
Syntax diagrams do not rely on highlighting, brackets, or braces. In syntax diagrams, the position of the
elements relative to the main syntax line indicates whether an element is required, optional, or the
default value.
When you issue a command, spaces are required between the parameters unless a different separator,
such as a comma, is specified in the syntax.
Parameters are classified as keywords or variables. Keywords are shown in uppercase letters. Variables,
which represent names or values that you supply, are shown in lowercase letters and are either italicized
or, in NetView help, displayed in a differentiating color.
In the following example, the USER command is a keyword, the user_id parameter is a required variable,
and the password parameter is an optional variable.
USER user_id
password
COMMAND_NAME opt_variable_1,,opt_variable_3
You do not need to specify the trailing positional commas. Trailing positional and non-positional commas
either are ignored or cause a command to be rejected. Restrictions for each command state whether
trailing commas cause the command to be rejected.
Syntax examples
The following examples show the different uses of syntax elements:
• “Required syntax elements” on page xix
• “Optional syntax elements” on page xix
• “Default keywords and values” on page xix
• “Multiple operands or values” on page xx
• “Syntax that is longer than one line” on page xx
• “Syntax fragments” on page xx
A required choice (two or more items) is shown in a vertical stack on the main path. The items are shown
in alphanumeric order.
REQUIRED_OPERAND_OR_VALUE_1
REQUIRED_OPERAND_OR_VALUE_2
OPTIONAL_OPERAND
A required choice (two or more items) is shown in a vertical stack below the main path. The items are
shown in alphanumeric order.
OPTIONAL_OPERAND_OR_VALUE_1
OPTIONAL_OPERAND_OR_VALUE_2
KEYWORD2 VALUE1
KEYWORD3 VALUE2
REPEATABLE_OPERAND_OR_VALUE_1
REPEATABLE_OPERAND_OR_VALUE_2
REPEATABLE_OPERAND_OR_VALUE_3
value_n )
OPERAND7 OPERAND8
Syntax fragments
Some syntax diagrams contain syntax fragments, which are used for lengthy, complex, or repeated
sections of syntax. Syntax fragments follow the main diagram. Each syntax fragment name is mixed case
and is shown in the main diagram and in the heading of the fragment. The following syntax example
shows a syntax diagram with two fragments that are identified as Fragment1 and Fragment2.
COMMAND_NAME Fragment1
Fragment2
Fragment1
KEYWORD_A= valueA KEYWORD_B KEYWORD_C
Fragment2
KEYWORD_D KEYWORD_E= valueE KEYWORD_F
The NetView program provides functions to help maintain the highest degree of availability for IBM Z
networks. An extensive set of tools is included to manage and maintain complex, multi-vendor, multi-
platform networks and systems from a single point of control. The NetView program provides advanced
correlation facilities to automate any network or system event and provides support for both TCP/IP and
SNA networks. The program also provides a set of user interfaces to meet the needs of any user and
management functions that work with other products to provide a complete picture of your networks and
systems.
TCP/IP management is an integral part of the IBM Z NetView program. A full array of management
functions is provided, including the following functions.
• Management of SNA over IP
The Enterprise Extender technology enables the transport of SNA traffic over an IP network. This
technology routes SNA path information units (PIUs) over Advanced Peer-to-Peer Networking nodes
using high-performance routing (HPR) and, subsequently, across the IP network using User Datagram
Protocol (UDP) packets. The routing provided by Enterprise Extender is more complex and requires
additional information about the paths to session partners. To help discover congestion and broken
links, the NetView program can locate specific Enterprise Extender sessions passing through a
particular link station and provide extensive information about the path to the session partner.
• Support for dynamic virtual IP addresses (DVIPA)
The use of DVIPAs is a vital technique for eliminating application connection failures because the
physical adapter is removed as a point of failure. Distributed DVIPAs distribute the workload of
connection requests and provide additional fail-safe precautions in the event of a server failure. The
NetView program provides the information that is needed to manage DVIPAs, including the following
information:
– DVIPA definition and status information, including the differentiation of application-instance, stack-
defined, and distributed DVIPAs, so that you can ensure that the characteristics of each DVIPA are
what you want, such as the following characteristics:
- The status of the DVIPA on the TCP/IP stack
- The XCF group that the DVIPA is part of
- The TCP/IP host to which the DVIPA is defined
- The origin (how it is configured to the TCP/IP stack)
- The mobility (the ways that it can be moved to another TCP/IP stack)
- The rank of the stack to which the DVIPA is defined in the chain of backup stacks
– Distributed DVIPA information, including sysplex distributors, distributed targets, application server
health statistics for distributed targets, and statistics on workload balancing
– DVIPA connection information, including the number of active connections and abundant information
about the current state of the connection
– DVIPA routing information, including VIPA routes and distributed DVIPA connection routing
– Historical DVIPA information
• Discovery manager resource discovery
The discovery manager provides a comprehensive set of monitoring tools for your sysplex, and a view of
your physical configuration. The following types of resources can be discovered:
– Central processor complex (CPC)
– Channel subsystem identifier
– Logical partition (LPAR)
The increasing complexity of managing a sysplex environment has led to the need for management from a
single point of control. The NetView program provides high availability sysplex management to ease
complex system interactions and to maximize operational effectiveness. A master NetView program is
automatically available for you to use in managing and displaying information about your sysplex.
Automatic failover to another NetView program that can monitor the sysplex in the event of an outage is
also provided. Monitoring of sysplex and system resources, including sysplexes, coupling facilities, z/OS
images, TCP/IP stacks, IP interfaces, dynamic virtual IP addresses (DVIPAs), Telnet servers and ports,
central processor complexes, logical partitions (LPARs), Open Systems Adapter (OSA) and HiperSockets
adapters, is available with this powerful management capability.
A master NetView program can also provide management for systems outside of the sysplex and for
another sysplex. The NetView program in this role is known as an enterprise master NetView program.
Additional configuration is needed for the enterprise master NetView program to manage systems that
are outside of the sysplex. DVIPA information is restricted to sysplex management.
The NetView program provides the following high availability sysplex management capabilities:
• Discovery, using XCF, of the operational status of all NetView programs in the sysplex, which allows one
NetView program to fail over to another NetView program in the event of an outage.
• Monitoring of sysplex and system resources using a combination of sampling and event automation,
with discovery being split between discovery manager and DVIPA. To have a complete view of
resources in the sysplex, a NetView program must run on each z/OS image with discovery enabled.
• Commands that can be issued from a 3270 command line to collect real-time data about sysplex and
system resources
• IBM Z NetView Enterprise Management Agent workspaces in the Tivoli Enterprise Portal
• Logical sysplex and physical IBM Z topology in the NetView management console
The Resource Object Data Manager (RODM) component is the data cache for NetView discovery manager
sysplex management capabilities. Beginning with NetView V5R4, RODM is no longer used as a repository
only for data that is displayed through the NetView management console. Sysplex and IBM Z
management information is stored in RODM, whether or not the Network management console is used.
The following kinds of sysplex and IBM Z management information are stored in RODM:
• Central processor complex (CPC)
• Channel subsystem identifier
• Logical partition (LPAR)
• Sysplex
• z/OS image
• TCP/IP stack
• TCP/IP subplex
• NetView application
• Telnet server and port
• Open Systems Adapter (OSA)
• HiperSockets adapter
Notes:
1. Display of OSA and HiperSockets information in any NetView user interface requires RODM.
2. Discovery of interfaces and OSA requires SNMP. OSA also requires the SNMP OSA subagent
(IOBSNMP).
A sysplex application, where multiple instances of the application are running on different systems, can
share status information and communicate with other instances of the application. As a sysplex
application, the NetView program uses the z/OS cross-system coupling facility (XCF) services to
communicate with other NetView programs.
An enterprise consists of a combination of sysplexes and stand-alone systems. With some additional
system definition, a sysplex master NetView program can manage systems and sysplexes beyond the
scope of the sysplex where it is located.
For example, the NVC NetView program that is shown in Figure 3 on page 19 is an enterprise master
program. In this configuration, the NVA, NVB, and NVC NetView programs are in Sysplex A on the SYS1,
SYS2, and SYS3 systems, respectively; the NVD, NVE, and NVF NetView programs are in Sysplex B on the
SYS4, SYS5, and SYS6 systems, respectively; and the NVLCL NetView program is on the stand-alone SYS7
system. With this type of configuration, a single enterprise-wide Resource Object Data Manager (RODM)
can be used to store data that is forwarded to the enterprise master NetView program.
If a master-capable NetView program within the sysplex assumes the role of sysplex master, it also
becomes an enterprise master, provided that the CNMSTYLE definitions for the enterprise are
synchronized across the master and master-capable NetView programs within the sysplex. For
information about changing CNMSTYLE statements, see IBM Z NetView Installation: Getting Started. For
information about the statements, see the IBM Z NetView Administration Reference.
The GDPS Continuous Availability solution expands the scope of the enterprise master to enable both
discovery manager data and Active/Active data to be forwarded to an enterprise master. You can have
different enterprise masters for Active/Active data and discovery manager data, depending on the
NetView configuration. If you have multiple enterprise masters, they must reside in different sysplexes or
on separate stand-alone systems. For more information, see IBM Z NetView for Continuous Availability
Configuring and Using the GDPS Continuous Availability Solution.
The discovery manager provides a comprehensive set of monitoring tools for your sysplex, and a view of
your physical configuration. Before NetView V5R4, Sysplex IP Stack Manager managed TCP/IP stack
information, including monitoring of the sysplex, and z/OS image. The discovery manager provides
information that you can use to manage and monitor your sysplex from the master NetView program.
Additionally, information that is discovered by the discovery manager can be viewed at the enterprise
master NetView program.
The following kinds of resources can be monitored by the discovery manager:
• Central processor complex (CPC)
• Channel subsystem identifier
• Logical partition (LPAR)
• Sysplex
• Coupling facility
• z/OS image
• TCP/IP stack
• TCP/IP subplex
• IP interfaces
• NetView applications
• Telnet servers and ports
• Open Systems Adapter (OSA) channels and ports
• HiperSockets adapter
Notes:
1. Display of OSA and HiperSockets information in any NetView user interface requires RODM.
2. Discovery of interfaces and OSA requires SNMP. OSA also requires the SNMP OSA subagent
(IOBSNMP).
The DISCOVERY tower, which is required by the discovery manager, is enabled by default, and discovery
is started during NetView initialization. For information about configuring this discovery, see IBM Z
NetView Installation: Configuring Additional Components.
Users can effect discovery of these resources in the following ways:
• Manually issue the CNMEERSC command, which initiates rediscovery.
• Modify the sampling intervals in the CNMSTUSR or CxxSTGEN member for IP interfaces (including OSA
and HiperSockets interfaces), Telnet servers and ports, and NetView applications and issue a RESTYLE
command. For information about changing CNMSTYLE statements, see IBM Z NetView Installation:
Getting Started.
• Issue the COLLCTL command to start or stop data collection for IP interfaces (including OSA and
HiperSockets interfaces), Telnet servers and ports, and NetView applications.
For detailed information about the data that is collected, see Appendix A, “Discovery Manager Data,” on
page 157.
Information about resources that are discovered by the discovery manager can be viewed in the following
ways:
• “Using 3270 Commands” on page 22
These data collector commands are intended for use in application programs. When a data collector
command completes successfully, it returns the data in a particular multiline message. To view the data
in a format that can be read, use the associated sample. To display this data in a different format, modify
the applicable sample or create your own application to format the data that is returned by the specified
commands. You can use input parameters with a sample to specify the data to collect. The input
parameters for a sample are the same as those for the NetView command that is called by the sample.
For information about the returned messages, the command parameters, or other information about the
data collector commands, see the IBM Z NetView online message and command help.
Starting with this view, you can view the sysplex topology (“Viewing Sysplex Topology” on page 32) or
the z Systems® topology (“Using z Systems Topology” on page 38). For information about the objects
that are shown in either topology, see “ Sysplex and z Systems Objects” on page 29.
Double-click the NETVPLEX object. The resulting view, which is similar to the view that is shown in Figure
12 on page 33, is the NETVPLEX More Detail Logical view. This view shows all of the z/OS images that
belong to the NETVPLEX sysplex. The NETVPLEX More Detail Logical view contains system aggregate
objects for the TIVMVS21, TIVMVS22, and TIVMVS23 systems and a single real object for the coupling
facility (RALNSCFF). On the TIVMVS21 system, the discovery of both Open Systems Adapter (OSA) and
HiperSockets resources is enabled. Thus, both logical and physical information is available for the
TIVMVS21 system.
To see the logical information, double-click the TIVMVS21 object, and, in the View Selection window that
is displayed, select TIVMVS21-MDL and click OK. The resulting view, which is similar to the view that is
shown in Figure 13 on page 33, is the TIVMVS21 More Detail Logical view. This view shows a real object
for the z/OS image (the TIVMVS21 object) and aggregate objects for NetView applications, TCP/IP stacks,
and Telnet servers (the NETVIEWS, STACKS, and TELNETSERVERS objects). The TIVMVS21 object is a
z/OS image object, the NETVIEWS object is a NetViews aggregate object, the STACKS object is a TCP/IP
stacks aggregate object, and the TELNETSERVERS object is a Telnet server aggregate object.
Double-click the TCPIPB object. The resulting view, which is similar to the view that is shown in Figure 15
on page 34, is the TCPIPB More Detail Logical view. This view shows a real object for the stack, the
TCPIPB object (which is a TCP/IP stack object) and several real objects that represent the IP interfaces
that were discovered for this stack. Note that the TCPIPLINK1 and LVIPA1 objects indicate IP interfaces
that are not active.
In the TELNETSERVERS More Detail Logical view, double-click the Telnet port aggregate object, in this
case, the TN3270B.PORTS object. The resulting view, which is similar to the view that is shown in Figure
18 on page 36, is the TN3270B.PORTS More Detail Logical view. This view shows the real Telnet port
object, in this case, the TN3270B.PORT823.
From this view, you can navigate to the Telnet port peer view for this Telnet port by selecting the object
and clicking Configuration > Peers. The resulting view, which is similar to the view that is shown in Figure
19 on page 37, is the NETVPLEX.TIVMVS21.TN3270B.823 view. Telnet ports can be linked to by one or
more TCP/IP stacks. This port peer view shows the TCP/IP stacks that are listening on the port. In this
case, the TN3270B.PORT823 Telnet port is linked to by to the TCPIP and TCPIPB TCP/IP stacks.
Double-click VM-TOKEN. The resulting view, which is similar to the view that is shown in Figure 23 on
page 39, is the VM-TOKEN More Detail Physical view. This view shows the channel subsystem (CSS)
identifiers that are contained in the VM-TOKEN central processor complex. The CSS01 object is a channel
subsystem identifier aggregate object.
Double-click the CSS01 object. The resulting view, which is similar to the view that is shown in Figure 24
on page 40, is the CSS01 More Detail Physical view. This view shows the logical partitions (LPARs) of the
CSS01 channel subsystem identifier. The three LPARs that are part of this complex (TIVMVS21,
TIVMVS22, and TIVMVS23) are shown as LPAR aggregate objects.
Double-click the TIVMSV21 LPAR aggregate object. The resulting view, which is similar to the view that is
shown in Figure 25 on page 40, is the TIVVMS21 More Detail Physical view that shows a z/OS image
aggregate object for the systems that are on the TIVVMS21 LPAR.
Figure 25. TIVMVS21 More Detail Physical View (z/OS Image Aggregate)
Double-click the TIVMVS21 z/OS image aggregate object. Because this system has both logical and
physical topology, a View Selection window is displayed; in that window, select More Detail Resource -
Physical and click OK. The resulting view, which is similar to the view that is shown in Figure 26 on page
41, is the TIVMVS21 More Detail Physical view that shows the TCP/IP stacks aggregates on the system
that have physical topology. Physical topology is determined by the existence of OSA or HiperSockets
resources that are associated with this stack.
Double-click the TCPIP stack aggregate object. Because this stack has both logical and physical topology,
a View Selection window is displayed. In that window, select More Detail Resource - Physical and click
OK. The resulting view, which is similar to the view that is shown in Figure 27 on page 41, is the TCPIP
More Detail Physical view. This view shows the physical interfaces as aggregate objects. These aggregate
objects represent the OSA or HiperSockets interfaces that are known to the TCP/IP stack.
Double-click the OSA00B0 aggregate object. The resulting view, which is similar to the view that is shown
in Figure 29 on page 42, is the OSA00B0 More Detail Physical view. This view shows the
PORT0.RP563B0 object, which represents the OSA ports as aggregate resources.
Double-click the PORT0.RP563B0 OSA port aggregate object. The resulting view, which is similar to the
view that is shown in Figure 30 on page 43, is the PORT0.RP563B0 More Detail Physical view. This view
shows the OSA port real objects and virtual local area networks (VLANs) that are associated with the OSA
interface. PORT0.RP563B0 is an OSA port object, and VLAN510 is a virtual LAN object.
From this view, you can navigate to the configuration parents view for this OSA port by right-clicking the
PORT0.RP63B0 object and clicking Configuration > Parents. The resulting view, which is similar to the
view that is shown in Figure 31 on page 43, is the PORT0.RP63B0-PAR view. This view shows the full
topology and connectivity for the OSA port.
Double-click the HIPERSOCKETSD1 object. The resulting view, which is similar to the view that is shown
in Figure 33 on page 44, is the HIPERSOCKETSD1 More Detail Physical view. This view shows the
HiperSockets adapters and virtual local area networks (VLANs) that are specified on the selected
HiperSockets interface. This view includes the HIPERSOCKETSD1 HiperSockets object and the VLAN510
virtual LAN object.
z/OS Communications Server uses dynamic virtual IP addresses (DVIPAs), along with sysplex distributors
(also known as distributed DVIPAs), to provide high availability and load balancing in a sysplex. The
NetView program provides a comprehensive set of DVIPA information to use in managing and diagnosing
problems in your sysplex.
The following DVIPA information is provided by the NetView program in a sampled basis:
• DVIPA definition and status
• Distributed DVIPA
• DVIPA connections
• VIPA routes
• Distributed DVIPA connection routing
Changes within your sysplex that affect DVIPAs can generate events that enable the NetView program to
provide up-to-date DVIPA information. Distributed DVIPA statistics are provided to assist with workload
balancing. The statistics can be used to monitor historical trends and for problem determination.
DVIPA discovery is not enabled at NetView initialization. To collect DVIPA information, you must
uncomment the DVIPA tower and any additional subtowers. For information about configuring this
discovery, see IBM Z NetView Installation: Configuring Additional Components.
Users can effect the discovery of DVIPA information in the following ways:
• Manually issue the CNMEDRCL command, which initiates immediate rediscovery.
• Modify the sampling intervals in the CNMSTUSR or CxxSTGEN member for DVIPA subtowers, and issue
a RESTYLE command. For information about changing CNMSTYLE statements, see IBM Z NetView
Installation: Getting Started.
• Issue the COLLCTL command to start or stop data collection for DVIPA subtowers.
The discovered DVIPA information can be viewed in the following ways:
• “Using NetView Enterprise Management Agent Workspaces” on page 49
• “Using 3270 Commands” on page 48
Usage :
1. For event-related rediscovery to occur, enable the DVIPA discovery function. In a master NetView
environment, the master NetView program keeps the CNMDVPST in-storage table that indicates what
information has been received from systems in the sysplex. This table is used to determine what
rediscovery occurs for each NetView program.
2. Use caution if you set the DVIPA.Event.Delay and DVIPA.Mast.Disc.Delay statements to 0 in the
CNMSTYLE member. If a burst of events comes in within a few seconds, rediscovery is done for every
event that the NetView program receives, which can cause performance problems.
For more information about enabling DVIPA support, see IBM Z NetView Installation: Configuring
Additional Components.
Notes:
1. The TEMA DVIPA subtower is not required to run these commands.
2. This is a sample only. For more information about the CNMSDVST sample, see the sample preface.
These data collector commands are intended for use in application programs. When a data collector
command completes successfully, it returns the data in a particular multiline message. To view the data
in a format that can be read, use the associated sample. To display this data in a different format, modify
the applicable sample or create your own application to format the data that is returned by the specified
commands. You can use input parameters with a sample to specify the data to collect. The input
parameters for a sample are the same as those for the NetView command that is called by the sample.
For information about the returned messages, the command parameters, or other information about the
data collector commands, see the IBM Z NetView online message and command help.
The examination of packet content is sometimes necessary to debug a problem. The NetView program
provides real-time capture and formatting of IP packet and Open Systems Adapter (OSA) packet trace
data, including both headers and payloads. Because the formatting is the same as that under Interactive
Problem Control System (IPCS), you do not need to learn a new format. Because the formatter is directly
integrated with the IP stack, no translation mismatches can occur. Highly flexible tracing and formatting
options are available so that you can filter out unwanted data. Both IPv4 and IPv6 packets are supported,
and the data is also available in binary (unformatted) form for use by automation routines.
Notes:
1. z/OS V2R1 Communications Server or later is required for some packet trace functions.
2. The OSA SNMP subagent must be active to control OSA traces.
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F7=Backward F8=Forward F12=Cancel
If you issue IPTRACE with no parameters, information about the local stack is displayed in the IPTrace
Control Center panel (FKXK2A01), which is shown in Figure 43 on page 63. This panel is also displayed if
you selected a stack on the TCP/IP for 390 IPTrace Control Center panel (FKXK2A00).
Command ===>
F1=Help F2=Main Menu F3=Return F5=Refresh F6=Roll
F12=Cancel
This panel provides information about tracing on the selected stack. To select a trace, type any non-blank
character next to the trace that you want and press Enter.
• If you select PKTTRACE (IP packet trace), see “IP Packet Tracing” on page 63.
• If you select OSATRACE (OSA packet trace), see “OSA Packet Tracing” on page 77.
• If you select CTRACE (component trace), see “Component Tracing” on page 80.
IP Packet Tracing
The NetView program can collect trace data through two interfaces:
instance trace
Allows multiple concurrent traces, each with a set of trace criteria. This type of trace is available with
z/OS Communications Server V2.1. Each individual trace can be referred to as a trace instance.
global trace
Allows only one trace at a time, with one set of trace criteria. If a second trace, with its set of trace
criteria, is started while a trace is already running, the second trace replaces the first trace.
A global trace and one or more trace instances can run simultaneously.
Command ===>
F1=Help F3=Return F6=Roll
F7=Backward F8=Forward F9=Create Instance F12=Cancel
_ ALL * * * * *
_ TCPIPLINK6 OFF * * * * * 0
_ TCPIPLINK OFF * * * * * 0
_ EZASAMEMVS OFF * * * * * 0
_ EZ6SAMEMVS OFF * * * * * 0
_ VIPLC9020A3C OFF * * * * * 0
_ VIPLC9020A3D OFF * * * * * 0
_ VIPLC9020A3E OFF * * * * * 0
_ VIPLC9020A3F OFF * * * * * 0
Command ===>
F1=Help F2=Main Menu F3=Return F4=Stop SYSTCPDA F5=Refresh F6=Roll
F7=Backward F8=Forward F9=Assist F10=PKTS Management F12=Cancel
Starting and stopping a global IP packet trace involves the following tasks:
• “Managing the z/OS Communications Server IP Packet Trace” on page 65
• “Managing the NetView IP Packet Trace Collection Process” on page 65
To start an IP packet trace filter for an interface, type 1 next to the interface name that you want to trace,
and press Enter. To stop an IP packet trace filter, type 2 next to the interface name, and press Enter. To
view the packets that were traced, type 3 next to the interface name, and press Enter; see “Viewing IP
Packet Trace Data” on page 66.
_ Stop
_ Stopcoll
_ Purge
Intfname: *
LAddr: *
RAddr: *
Protocol 1 1-All
LPort: * RPort: * Portnum: * 2-TCP
Start Time: * 3-UDP
End Time: * 4-ICMP
5-OSPF
6 (Number)
Command ===>
F1=Help F3=Return F6=Roll
F12=Cancel
LAddr *
RAddr *
Command ===>
F1=Help F2=Save Packets F3=Return F4=View Packets F6=Roll
F8=Extended Opts F10=Analyze F12=Cancel
The interface name in the Infc Name field is carried over from the Infc/Link field on the PKTTRACE
Control panel (FKXK2A22) but can be changed to search for packets that are associated with any valid
interface. You can also use an asterisk (*) at the end of the interface name as a wildcard to see packets
Command ===>
F1=Help F2=Save Packets F3=Return F4=Details F5=Refresh F6=Roll
F7=Backward F8=Forward F9=Commands F11=Right F12=Cancel
.........................................................................
: :
: CTRACE format data set name: :
: NETVIEW.NMPIPL10.D030619.T083012.CTRACE :
: :
: Create Sniffer File (Y/N) N :
: Sniffer format data set name: :
: NETVIEW.NMPIPL10.D030619.T083012.SNIFFER :
: :
: Press Enter to save packets to the data set(s) :
: F1=Help F3=Return F6=Roll F12=Cancel :
:........................................................................:
Command ===>
LAddr *
RAddr *
.........................................................................
: :
: CTRACE format data set name: :
: NETVIEW.NMPIPL10.D030619.T083012.CTRACE :
: :
: Create Sniffer File (Y/N) N :
: Sniffer format data set name: :
: NETVIEW.NMPIPL10.D030619.T083012.SNIFFER :
: :
: Press Enter to save packets to the data set(s) :
: F1=Help F3=Return F6=Roll F12=Cancel :
:........................................................................:
Command ===>
Command ===>
F1=Help F3=Return F4=Sessions F6=Roll
F12=Cancel
From this panel, you can select the TCP Sessions with error flags option to display the TCP
sessions that have error flags, or select a specific TCP session error type (Retransmissions,
Duplicate Acks, Zero Window Size, Window Probes, Reset Flags, or Delayed Acks) to
display all sessions that have the selected error flag. After you make a selection (for example,
Duplicate Acks), press F4 (Sessions) to display a list of the sessions that meet your specification on
the Packet Trace Analysis TCP Sessions panel (FKXK2B22). For more information about TCP session
analysis, see “Analyzing TCP Sessions” on page 69.
The following actions are also available from the Packet Trace Analysis panel (FKXK2B10):
• Place the cursor on TCP Sessions and press F4 (Sessions) to go to the Packet Trace Analysis All TCP
Sessions panel (FKXK2B20), which lists all TCP sessions and the number of packets and error flags for
each. For information about filtering and navigation on this panel, see the online help.
• Place the cursor on UDP Sessions or ICMP Sessions and press F4 (Sessions) to go to the trace
analysis panel for the selected protocol. For more information about UDP and ICMP sessions, see
“Viewing UDP and ICMP Sessions” on page 73.
Command ===>
F1=Help F3=Return F4=Select F6=Roll
F9=Filters F12=Cancel
In this panel, you can navigate through the session list by using commands to move to the beginning or
the end of the session list or you can specify the number of sessions to scroll; for more information, see
the online help. To filter the session list, press F9 (Filters); you can filter by local IP address and port, by
local IP address, by local port, by remote IP address and port, by remote IP address, or by remote port.
From the filtered session list that is displayed, you can return to the unfiltered list by pressing F9
(Unfilter).
If you select a session on the Packet Trace Analysis TCP Sessions panel (FKXK2B22) and press F4
(Select), the Session Analysis panel (FKXK2B51) is displayed. This panel is shown in Figure 53 on page
71. Note the following information on this panel about the selected session, all of which can be useful in
diagnosing a connection or network problem:
• The resolved host names for the local and remote IP addresses
• The connection status (for this example, ESTABLISHED)
• The number of errors of each type for both inbound and outbound data
• The variations in window sizes for inbound and outbound data
Local IP 9.42.45.101
Port 1026 Host Name nmp101.tivlab.raleigh.ibm.com
Remote IP 9.42.45.10
Port 23 Host Name nmpipl10.tivlab.raleigh.ibm.com
Command ===>
F1=Help F3=Return F6=Roll
F8=Packets F9=Actions F10=Report F12=Cancel
From the Session Analysis panel (FKXK2B51), shown in Figure 53 on page 71, you can continue your
analysis as follows:
• To go to the Session Analysis Packets panel (FKXK2B53), press F8 (Packets); see “Displaying Session
Packets” on page 71.
• To go to the Session Analysis - Actions panel (FKXK2B52), press F9 (Actions); see “Issuing Commands
for Sessions” on page 72.
• To display a full z/OS Communications Server session report, press F10 (Report). For more information,
see the z/OS Communications Server library.
Command ===>
F1=Help F3=Return F4=Packet Detail F6=Roll
F7=Backward F8=Forward F11=Right F12=Cancel
**** 2019/02/12
RcdNr Sysname Mnemonic Entry Id Time Stamp Description
----- -------- -------- -------- --------------- ------------------------------
-------------------------------------------------------------------------------
971 NMP101 PACKET 00000004 13:15:56.415130 Packet Trace
To Interface : TCPIPLINK Device: QDIO Ethernet Full=52
Tod Clock : 2019/02/12 13:15:56.415130 Intfx: 5
Segment # : 0 Flags: Out
Source : 9.42.45.101
Destination : 9.42.45.196
Source Port : 1029 Dest Port: 23 Asid: 002C TCB: 00000000
IpHeader: Version : 4 Header Length: 20
Tos : 00 QOS: Routine Normal Service
Packet Length : 52 ID Number: 523A
Fragment : Offset: 0
TTL : 64 Protocol: TCP CheckSum: BB0D F
Source : 9.42.45.101
Destination : 9.42.45.196
TCP
Source Port : 1029 () Destination Port: 23 (telnet)
Sequence Number : 2258808398 Ack Number: 2414361816
Header Length : 32 Flags: Ack
Window Size : 32768 CheckSum: C87B FFFF Urgent Data Pointer:
Option : NOP
Option : NOP
Option : Timestamp Len: 10 Value: 1EE2BE99 Echo: 1EE2BE98
===============================================================================
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
CMD==>
Figure 55. Packet Detail for the Packet Selected in Session Analysis Packets
Command ===>
The following actions are available from the Session Analysis - Actions panel (FKXK2B52):
• To drop the active connection for this session, enter 1 (Drop Connection). The Session Analysis Drop
Command Confirmation panel (FKXK2B5A) is displayed. This panel provides information about the
connection that is to be dropped. Press F4 (Confirm Drop) to confirm that you want to drop the
connection, or press F3 (Return) to cancel the drop request.
• To save the session packets in NetView format, enter 2. The Saved Packet Trace Details panel
(FKXK2B62) is displayed. This panel provides details about the packet trace that you want to save.
Provide a description (for example, Print server problem) and press F4 to save the trace. The
FKX475I message indicates that the trace was saved. You can retrieve the trace later; see “Retrieving
Saved IP Packet Traces” on page 75.
• To save the session packets in CTRACE format and Sniffer trace format, enter 3. The Session Analysis
Data Set Name Input panel (FKXK2B55) is displayed so that you can specify the name of a data set in
which to save the packets. If the save is successful, the DSI633I message is displayed.
Command ===>
F1=Help F3=Return F4=Session Report F6=Roll
F9=Filters F12=Cancel
In this panel, the IP addresses and ports that are shown under IP Address-Ports are the connection
partners for UDP sessions. For ICMP sessions, only IP addresses are shown.
Note: ICMP is a connectionless protocol that does not have actual sessions, but the Communications
Server IP Trace Session Report collects the ICMP packets between two hosts and displays them in a
session report; this is known as an ICMP session.
In this panel, you can navigate through the session list by using commands to move to the beginning or
the end of the session list or you can specify the number of sessions to scroll; for more information, see
the online help. To filter the session list, press F9 (Filters); you can filter by local IP address and port, by
local IP address, by local port, by remote IP address and port, by remote IP address, or by remote port.
From the filtered session list that is displayed, you can return to the unfiltered list by pressing F9
(Unfilter).
Select a session and press F4 to see the session report for that session, such as the UDP session report
that is shown in the PACKET DETAIL window in Figure 58 on page 75.
**** 2019/04/16
No packets required reassembly
===============================================================================
Interface Table Report
Index Count Link Address
5 2 TCPIPLINK 9.42.45.101
Figure 58. UDP Session Report (Packet Detail for the Selected UDP Session)
Command ===>
F1=Help F3=Return F4=View Trace F6=Roll
F7=Backward F8=Forward F10=Details F11=Delete Trace F12=Cancel
You can select a trace and press F4 (View Trace) to display the content of this trace or press F11 (Delete
Trace) to delete the data that was saved for this trace.
If you select the PRINT SERVER PROBLEM trace and press F10 (Details), the Saved Packet Trace Details
panel (FKXK2B62), which is shown in Figure 60 on page 76, displays information about the saved packet
trace.
Description:
Command ===>
F1=Help F3=Return F4=Save Trace F6=Roll
F12=Cancel
Figure 60. Saved Packet Trace Details Panel (Viewing Saved Data)
From the Saved Packet Trace Details panel, you can press F4 (View Trace) to display the content of this
trace.
If the trace was saved in CTRACE format, the CTRACE Format field is set to Y and the Data Set Name
field indicates the data set in which the trace was saved.
If you press F4, the FMTPACKT Session Detail Report, which is shown in Figure 61 on page 77, displays
the content of this trace.
**** 2019/09/09
No packets required reassembly
==============================================================================
Interface Table Report
Index Count Link Address
2 221 LOOPBACK 9.42.45.101
Command ===>
F1=Help F3=Return F4=Stop SYSTCPOT F5=Refresh F6=Roll
F7=Backward F8=Forward F9=Filters F10=PKTS Management F12=Cancel
---------------------------------------------------------------------
|Protocol | Ethernet | Port | Device | VLAN ID | Mac Address |
| | Type | | ID | | |
| | | | | | |
| TCP | _______ | 00020 | ________ | ____ | ____________ |
| ______ | _______ | 00021 | ________ | ____ | ____________ |
| ______ | _______ | _____ | ________ | ____ | ____________ |
| ______ | _______ | _____ | ________ | ____ | ____________ |
| ______ | _______ | _____ | ________ | ____ | ____________ |
| ______ | _______ | _____ | ________ | ____ | ____________ |
| ______ | _______ | _____ | ________ | ____ | ____________ |
| ______ | _______ | _____ | ________ | ____ | ____________ |
---------------------------------------------------------------------
Command ===>
F1=Help F3=Return F4=Update Filters F6=Roll
F8=IP Addesses F12=Cancel
To set optional IP address filters for the interface from the OSATRACE Filters panel (FKXK2A31), press F8
(IP Addresses) to go to the OSATRACE Filters panel (FKXK2A32). After you make your changes, press F3
until you return to the OSATRACE Control panel (FKXK2A30).
On the OSATRACE Control panel (FKXK2A30), note the Options line:
To start an OSA packet trace filter for an OSA port name, type 1 next to the OSA port name that you want
to trace, and press Enter. To stop an OSA packet trace filter, type 2 next to the OSA port name, and press
Enter. To view the packets that were traced, type 3 next to the OSA port name, and press Enter; see
“Viewing OSA Packet Trace Data” on page 79.
_ Stop
_ Stopcoll
_ Purge
Portname *
Time: Start *
End *
Command ===>
F1=Help F3=Return F6=Roll
F12=Cancel
Figure 64. NetView PKTS Management Panel for OSA Packet Trace
Time: Start *
End *
Command ===>
F1=Help F3=Return F4=View Packets F6=Roll
F8=Extended Options F12=Cancel
To display packet trace data, set any display options and press F4 (View Packets). Pressing F4 opens the
OSA TRACE PACKETS SUMMARY panel (FKXK2A36); see Figure 66 on page 80.
Note: You can request a more specific trace report by pressing F8 (Extended Options), which opens the
Display OSA Packets Control Extended Options panel (FKXK2A35). On that panel, you can set options for
detailed packet data.
Command ===>
F1=Help F3=Return F4=Details F5=Refresh F6=Roll
F7=Backward F8=Forward F11=Right F12=Cancel
The OSA TRACE PACKETS SUMMARY panel (FKXK2A36) provides summary packet trace information for
the packets requested. To navigate the panel, press F11 (Right) to scroll to the right or F8 (Forward) to
scroll forward.
From the OSA TRACE PACKETS SUMMARY panel (FKXK2A36 or FKXK2A37), select a packet and press F4
(Details). The details of the selected packet are displayed in the Packet Detail window, which is shown in
Figure 67 on page 80.
**** 2009/01/19
RcdNr Sysname Mnemonic Entry Id Time Stamp Description
----- -------- -------- -------- --------------- ------------------------------
-------------------------------------------------------------------------------
6317 TVT2007 OSAENTA 00000007 14:05:03.638377 OSA-Express NTA
From Interface : EZANTAOSAA Full=64
Tod Clock : 2009/01/19 14:05:05.493685
Frame: Device ID : N/A Sequence Nr: 33701 Discard: 1115 (U
Segment # : 0 Flags: In Nta Lpar L3 Dscrd
Source : 9.42.42.132
Destination : 224.0.0.5
Source Port : 0 Dest Port: 0 Asid: 0000 TCB: 00000000
IpHeader: Version : 4 Header Length: 20
Tos : 00 QOS: Routine Normal Service
Packet Length : 64 ID Number: D22D
Fragment : Offset: 0
TTL : 1 Protocol: OSPFIGP CheckSum: D384 F
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
CMD==>
Component Tracing
When you select CTRACE for a stack with no scheduled tracing, the TCP/IP for 390 CTRACE Control panel
(FKXK2A12), which is shown in Figure 68 on page 81, is displayed. For a stack with active or delayed
tracing, the TCP/IP for 390 CTRACE Control panel (FKXK2A10), which is shown in Figure 72 on page 84,
is displayed. For information about the fields on the panel, press F1 to see the online help.
Command ===>
F1=Help F2=Main Menu F3=Return F4=Start Trace F6 =Roll
F10=Options F12=Cancel
Before you begin a trace, provide the following information on the TCP/IP for 390 CTRACE Control panel
(FKXK2A12):
• You can specify IP addresses, IP ports, job names, and address space identifiers (ASIDs) that are to be
traced. To do that, select the LISTS field; see “Specifying IP Addresses, IP Ports, Job Names, and
Address Space Identifiers for the Component Trace” on page 81.
• You must specify options for the trace. To do that, press F10; see “Specifying Options for the
Component Trace” on page 82.
• You must decide if the trace is to begin immediately or is to be scheduled for a later date or time. This
cannot be done until the trace options are specified. See “Starting or Scheduling the Component Trace”
on page 83.
Specifying IP Addresses, IP Ports, Job Names, and Address Space Identifiers for the Component
Trace
When you select the LISTS field, the TCP/IP for 390 CTRACE Control panel (FKXK2A11) displays the IP
addresses and submasks component trace filters currently set for this stack. If the CTRACE status is
ACTIVE, all component trace filters currently set are collected and displayed. When the CTRACE status is
in DELAY mode, all global variables for component trace filters that are set for a delayed start are
displayed. When the trace is inactive, this panel looks similar to the one in Figure 69 on page 82, and you
can edit the IPADDRs/Mask(Prefix) fields. For information about the fields on the panel, press F1 to see
the online help.
IPADDRs/Mask(Prefix)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F8=Ports/Jobs F12=Cancel
When the trace is inactive, you can also edit the IP ports, job names, and ASID fields. To do that, press F8
(Ports/Jobs) to go to the TCP/IP for 390 CTRACE Control panel (FKXK2A1A), which is shown in Figure 70
on page 82. Select the option you want to view or change, and press F3 after the option is changed. For
more information about trace options, see z/OS Communications Server: IP Diagnosis Guide. For
information about the fields on the panel, press F1 to see the online help.
Ports
_____ _____ _____ _____ _____ _____ _____ _____
_____ _____ _____ _____ _____ _____ _____ _____
Job Names
________ ________ ________ ________ ________ ________
________ ________ ________ ________ ________ ________
________ ________ ________ ________
ASIDs
____ ____ ____ ____ ____ ____ ____ ____
____ ____ ____ ____ ____ ____ ____ ____
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F7=IPADDRs F12=Cancel
OPTIONS:
Command ===>
F1=Help F2=Main Menu F3=Return F6 =Roll
F12=Cancel
After you finish setting options, press F4 to begin or schedule the trace. The trace can take several
minutes to run because of system processing. The trace might also begin a couple of minutes past the
specified time, depending on system processing. When an immediate trace is successfully scheduled, a
message similar to the following message is displayed in the IPTrace Control Center panel (FKXK2A01):
Active Options:
ALL
Command ===>
F1=Help F2=Main Menu F3=Return F4=Stop Trace F6 =Roll
F12=Cancel
The NetView program provides both real-time and historical connection information, including stack
name, local and remote addresses and ports, start time, end time and termination code (for connections
that ended), sent and received byte and segment counts, retransmit counts, and information about
connection state, interface, host, TN3270, and application transparent transport layer security (AT-TLS),
if applicable. Data is available both in a readable form and in a form for programming use. Host name
translation and IPv4 or IPv6 addresses are supported. In addition, because of the cross-domain
capabilities of the NetView program, users can view connection data at remote z/OS hosts.
The NetView program collects and displays dynamic virtual IP address (DVIPA) information including the
relationship to TCP/IP connections that use a DVIPA. For more information about DVIPA data collection,
including DVIPA connections, see Chapter 6, “Managing Dynamic Virtual IP Addresses,” on page 45.
This data collector command is intended for use in application programs. When this data collector
command completes successfully, it returns the data in a multiline message. To view the data in a format
that can be read, use the CNMSTCPC sample. To display this data in a different format, modify the
CNMSTCPC sample or create your own application to format the data that is returned by the TCPCONN
command. You can use input parameters with the sample to specify the data to collect. The input
parameters for the sample are the same as those for the TCPCONN command. For information about the
returned messages, the command parameters, or other information about the data collector commands,
see the IBM Z NetView online message and command help.
Notes:
1. Because the data records can be quite wide, the sample is based on the WINDOW command. You can
scroll to the right to view the data that is not currently visible in a 3270 session.
2. This sample is also used by the Z NetView Enterprise Management Agent take action commands.
You can also view information about DVIPA connections, which are a subset of all TCP/IP connections. To
view DVIPA connection information, you can use the DVIPA Connections workspace, the DVIPCONN
command, or the CNMSDVPC sample. For more information about using DVIPAs, see Chapter 6,
“Managing Dynamic Virtual IP Addresses,” on page 45.
This command is intended for use in application programs. When the command completes successfully, it
returns the data in a multiline message. To display this data, create an application to format the data that
is returned by the CONNSEC command. You can use input parameters on the CONNSEC command to
specify the data to collect. For information about the returned messages, the command parameters, or
other information about the command, see the IBM Z NetView online message and command help. This
data collector command is intended for use in application programs. When this data collector command
completes successfully, it returns the data in a multiline message. To view the data in a format that can
be read, use the CNMSZERT sample. To display this data in a different format, modify the CNMSZERT
sample or create your own application to format the data that is returned by the CONNSEC command. You
can use input parameters with the sample to specify the data to collect. The input parameters for the
sample are the same as those for the CONNSEC command. For information about the returned messages,
the command parameters, or other information about the data collector commands, see the IBM Z
NetView online message and command help.
Monitoring Connections
NetView automation can monitor the connections to any application without needing a socket number, for
example, a printer application that is connected over TCP/IP. Policy-based thresholds can be defined to
detect the following conditions:
• No activity over a specified time interval
• Less than a minimum number of bytes sent over a specified time interval
• More than a maximum number of bytes sent over a specified time interval
Policy-based actions can be any of the following actions:
• Ignore the threshold; that is, take no action.
• Generate a message and notify the appropriate personnel according to a notification policy.
• Break the connection.
The following policy statements must be included in the specified member, and the IPMGT tower in the
CNMSTYLE member must be enabled.
• IPCONN defines the connection thresholds and actions (FKXCFG01 member).
• AUTOOPS defines the automation task for monitoring (CNMIPMGT member).
• ACTMON defines the monitoring interval (CNMIPMGT member).
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F7=Backward F8=Forward F9=Filters F10=Details F12=Cancel
You can set filters for viewing connections by pressing F9 (Filters). For information about setting filters,
see “Setting Connection Management Filters” on page 91.
To see the details about a stack, select a stack by placing the cursor next to the stack and press F10
(Details). After you view the details, return to the main connection status panel by pressing F3 (Return).
CLIENT
Service Active IP
Point Hostname Connections Address
NMPIPL10 nmpipl10.tivlab.r 7 9.42.45.10
Command ===>
F1=Help F2=Main Menu F3=Return F4=Commands F5=Refresh F6=Roll
F7=Backward F8=Forward F9=Filters F11=Zoom F12=Cancel
To display a list of connections for a specific stack, select the stack by placing the cursor next to it and
press F11 (Zoom). For example, if you select NMPIPL10 on the panel shown in Figure 74 on page 89, a
panel similar to the one in Figure 75 on page 90 is displayed. If you press F4 (Commands) next to a local
port (in this example, Local Port 1030), you can display connection information, which is described in
“Displaying Connection Information” on page 90.
Command ===>
F1=Help F2=Main Menu F3=Return F4=Commands F5=Refresh F6=Roll
F7=Backward F8=Forward F9=Filters F12=Cancel
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F7=Backward F8=Forward F9=Filters F12=Cancel
From the list of commands that are displayed, type the number of the command and press Enter. For
example, if you type 9 (Conn Details) to see connection details and press Enter, a panel similar to the one
in Figure 77 on page 91 is displayed. If you type 11 (Packet Trace) and press Enter, the PKTTRACE
Control panel (FKXK2A22) is displayed.
Note: For options 5, 6, 9, and 10, the resources must support SNMP requests.
Press F3 to return to the Commands panel. To see the commands that can be issued for the LU or the
application, press F4 (LU Cmds) or F5 (APPL Cmds), respectively. To close any of the command panels,
press F12.
Client IP Address
*
Type an action code to define the logical operator for the search:
2 1 OR
2 AND
Command ===>
F1=Help F3=Return F6=Roll
F9=Defaults F12=Cancel
You can filter the connections by client IP address, port, logical unit, and application name. A blank or an
asterisk (*) in an input field indicates that that data is not to be filtered.
The logical operator setting is used for the filtering criteria when several input fields are specified. If 1
(OR) is specified, connections that match any of the specified criteria are displayed. If 2 (AND) is
specified, only the connections that match all of the specified criteria are displayed.
To see connections with IP addresses that begin with 201, type 201.* in the IP Address field, and press
Enter.
Note: Use of wild cards is the same as for the TCPCONN command; for more information, see the online
help for TCPCONN.
The EZL919I message that is displayed indicates that the filters have been saved. Press F3 to return to
the connections panel, which now lists the filtered connections, as displayed in Figure 79 on page 92.
Out of the connections originally displayed, only two connections met the filter criteria.
Command ===>
F1=Help F2=Main Menu F3=Return F4=Commands F5=Refresh F6=Roll
F7=Backward F8=Forward F9=Filters F12=Cancel
FKXESSF DISIP=201.*
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F7=Backward F8=Forward F9=Filters F12=Cancel
In the Display Packet Control panel (FKXK2A24) that is displayed here, as called from the IPSTAT
FKXK2220 or FKXK221C panel (see Figure 79 on page 92), the IP addresses and ports are carried over
from the selected connection. In this example, the Infc Name field shows ALL, which indicates that all
packets from all interfaces for this call are to be collected. From the Display Packet Control panel
(FKXK2A24), you can use any of the trace display and formatting functions that are provided by the
IPTRACE dialog.
LAddr *
RAddr *
Command ===>
F1=Help F2=Save Packets F3=Return F4=View Packets F6=Roll
F8=Extended Opts F10=Analyze F12=Cancel
When you exit the IPTRACE panels, you are asked whether you want to stop the trace. If you specify Y
(Yes), the packet trace filter is stopped. If you specify N (No), the packet trace filters are left active, and
you must either stop them manually or stop them by using the IPTRACE panels.
The MultiSystem Manager topology manager transfers the topology and status information that is
discovered by IBM Tivoli OMNIbus and Network Manager about the IP resources in your network,
including resources running in a z/OS environment, and stores the information in Resource Object Data
Manager (RODM). After the information is in RODM, you can view your network resources from the
NetView management console. Topology correlation automatically ties together resources that are
managed by different types of topology functions such as IBM Tivoli Network Manager and open topology
functions. Topology correlation is provided for MultiSystem Manager topology functions, for the NetView
SNA Topology Manager, and for customer or vendor applications that use the Graphic Monitor Facility
host subsystem data model. This chapter describes how to manage your IP networks using the views and
command support provided by the MultiSystem Manager IBM Tivoli Network Manager agent.
The MultiSystem Manager IBM Tivoli Network Manager agent extracts IP topology information from the
IBM Tivoli Network Manager topology database about the network resources and relationships that are
discovered by Tivoli Network Manager and loads the information into Resource Object Data Manager
(RODM). The resources that are discovered include subnetwork resources (such as hosts, routers, and
subnetwork connections) and resources that are either z/OS resources or directly connected to a z/OS
resource.
To use the MultiSystem Manager IBM Tivoli Network Manager agent to discover IP resources, follow these
steps. For more information about the MultiSystem Manager IBM Tivoli Network Manager agent, see the
msm_nm_ip_readme_en.html file. This file can be viewed from the Z NetView installation DVD or from a
workstation where the agent is installed.
• Install and configure IBM Tivoli OMNIbus and Network Manager in your distributed environment.
• Use the Tivoli Integrated Portal to create network views that are to be used to populate RODM.
• Install and configure the MultiSystem Manager IBM Tivoli Network Manager agent on the Tivoli Network
Manager workstation. The latest MultiSystem Manager IBM Tivoli Network Manager agent is available
from the Z NetView support Web site.
• Install and configure an IBM Tivoli Network Manager SNMP gateway for each Z NetView program that is
to receive trap information.
• Ensure that Z NetView SNMP trap automation task is active.
• Ensure that the MSM.ITNM tower is enabled and that the AUTOMSM autotask, which is used for alert
automation, is active.
• Ensure that the host and agent can communicate using IP.
• If appropriate, set up security for the MultiSystem Manager IBM Tivoli Network Manager agent; for more
information, see the IBM Z NetView Security Reference.
After you initialize network topology and status in RODM, the NetView management console provides
views of IP networks. Using the NetView management console pull-down menus, you can navigate among
the views to isolate failures and to send commands to resolve problems. This section explains how to use
the views and command support that are provided by the MultiSystem Manager IBM Tivoli Network
Manager agent to manage your IP networks. For information about using the NetView management
console, see IBM Z NetView User's Guide: NetView Management Console.
IP View Objects
The following IP objects are displayed in IP views:
Finding Resources
To display resources, access the Locate Resource window. From this window, you can locate an adapter
by its MAC address and other IP resources by their names. You can also locate a resource by its display
name.
Chapter 9. Discovering IP Network Topology with the MultiSystem Manager IBM Tivoli Network Manager
Agent 97
Navigating Network Views
To navigate the NetView management console views, begin by selecting the default MultiSystem Manager
network view, MultiSysView, which is shown in Figure 83 on page 98.
Notes:
1. The following GETTOPO command, sent to a topology agent with an IP host name of Server1, was
used to build the NetView management console views:
2. The information in this section is based on the default views that are created by MultiSystem Manager
and user-defined views that are created in IBM Tivoli Network Manager. For more information about
creating NetView management console views, see IBM Z NetView Installation: Configuring Graphical
Components.
Figure 83. NetView Management Console Default Network View (MultiSysView): ITNM_IP_Networks
MultiSysView consists of an object (a NetView management console cluster aggregate object) that
represents all the IP networks that are defined in the Network Manager topology database, discovered by
the IBM Tivoli Network Manager agent, and stored in RODM. This aggregate object is named
ITNM_IP_Networks and the resource type is IP networks. From MultiSysView, you can get more detailed
views that display your IP networks.
Viewing IP Networks
IP views consist of the following levels:
IP Networks View
A single view that shows all your IP networks
User-defined Views
Views showing collections of user-defined IP managed resources
IP Networks View
To display the IP networks view with the NetView management console, double-click the
ITNM_IP_Networks object that is shown in Figure 83 on page 98. The resulting view, which is similar to
the view in Figure 84 on page 99, shows the IP network that is included in the aggregate object
ITNM_IP_Networks.
This view contains a single IP network named Server1_IP_Network. MultiSystem Manager displays a
separate IP network for each agent from which topology is gathered.
Each IP network is represented by two connected icons:
• A node aggregate object, an IP network aggregate
• A real object, an agent
The Server1_IP_Network aggregate object that is shown in Figure 84 on page 99 represents the
managed IP resources that IBM Tivoli Network Manager on the Server1 system discovered. The real
object Server1_IP_Mgr represents the MultiSystem Manager IBM Tivoli Network Manager agent. The
Chapter 9. Discovering IP Network Topology with the MultiSystem Manager IBM Tivoli Network Manager
Agent 99
name of the topology agent is composed of the host name (Server1) where the topology agent is installed
and the type of network the agent is managing (IP). To display additional information about the topology
agent, select Resource Properties.
User-defined Views
To view the managed IP resources in the Server1 network, double-click the Server1_IP_Network
object that is shown in Figure 84 on page 99. The resulting view, which is shown in Figure 85 on page
100, contains the NCOMS operator view object, which is a user-defined view.
Double-click the NCOMS object that is shown in Figure 85 on page 100. The resulting view, which is shown
in Figure 86 on page 101, shows the Subnets and Device_Classes operator view objects.
Double-click the Subnets object that is shown in Figure 86 on page 101. The resulting view, which is
similar to the view in Figure 87 on page 101, shows the fe80___/10 and 9.0.0.0_/8 operator view
objects.
Chapter 9. Discovering IP Network Topology with the MultiSystem Manager IBM Tivoli Network Manager
Agent 101
Double-click the 9.0.0.0_/8 object that is shown in Figure 87 on page 101. The resulting view, which is
similar to the view in Figure 88 on page 102, shows the 9.0.0.0/255.0.0.0 IP networks object.
IP Subnetwork Views
To see the IP subnetwork view, double-click the 9.0.0.0/255.0.0.0 object that is shown in Figure 88
on page 102. The resulting view, which is similar to the view that is shown in Figure 89 on page 103,
displays the nmp196.tivlab.raleigh.ibm.com object.
Chapter 9. Discovering IP Network Topology with the MultiSystem Manager IBM Tivoli Network Manager
Agent 103
Figure 90. ITNM_IP_Networks Host View
You can monitor and manage IP resources with the following functions:
• PING command
• TRACERTE command
• SNMP management
• IP resource management
• Critical port monitoring
You can also manage SNA over IP.
You can access these functions from the NetView IP Management Functions menu panel, which is shown
in Figure 91 on page 105. To access the menu panel, use the NETVIP command.
Type the number or move the cursor to a function and press Enter
Command ===>
F1=Help F3=Return F6=Roll
F12=Cancel
Using PING
Note: This function no longer requires AON. The information about this function is included in both IBM Z
NetView IP Management and the IBM Z NetView User's Guide: Automated Operations Network.
Pinging is used to test connectivity to an IP host and can often be useful in determining if a resource can
be reached. To ping a resource, issue the PING or MVSPING command. These commands provide the
same function.
Note: PING is also available from the menus on the NetView management console.
When you issue a PING or MVSPING command without any parameters, the panel that is shown in Figure
92 on page 106 is displayed.
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F12=Cancel
The resource name can be an IP host name or an IP address. If no service point name is specified, the
TCP/IP policy definitions for the service point associated with the resource are searched. Optionally, you
can change the ping count, the ping timeout, and the ping length.
If you issue a PING or MVSPING command for a particular resource from an NCCF command line, the
results are correlated and displayed from the command line rather than in panels.
For the syntax of and detailed information about the PING and MVSPING commands, see the online help.
Using TRACERTE
Note: This function no longer requires AON. The information about this function is included in both IBM Z
NetView IP Management and IBM Z NetView User's Guide: Automated Operations Network.
The TRACERTE command is used to trace the routes of data packets to a specified IP host from the IP
stack on the host on which the NetView program is running. Use this command to determine connectivity
with or routing to a particular endpoint, roundtrip times between the NetView and target hosts, and
routers along the way. The TRACERTE command is useful in problem determination, for example, in
troubleshooting lost packets.
Note: The TRACERTE command is also available from NetView management console menus.
To access TRACERTE functions, enter the TRACERTE command. The panel that is shown in Figure 93 on
page 107 is displayed. For information about the fields on this panel, press F1 to see the online help.
Max 30
Try 3
Port 33434
Wait 5
Command ===>
F3=Ret F4=Fndprev F5=Rptfnd F6=Roll F7=Back F8=Forward F12=Cancel
The resource name can be an IP host name or an IP address. If a stack name is not specified, the stack
definitions in the CNMPOLCY member are searched for the specified IP address or host name.
Figure 94 on page 107 shows output from a TRACERTE command for a workstation with an IP address of
1.23.45.678:
Command ===>
F3=Ret F4=Fndprev F5=Rptfnd F6=Roll F7=Back F8=Forward F12=Cancel
For the syntax of and detailed information about the TRACERTE commands, see the online help.
1. Command:
_ 2. Group Menu
_ 3. Remote Ping
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F12=Cancel
The SNMP Menu has three options: Command, Group Menu, and Remote Ping. The following topics
describe how to use the Command and Group Menu options.
If you specify a community name, it is used for the resulting SNMP request. If you do not specify a
community name, the stack definitions are searched for the community name. If no community name is
found, the z/OS default name public is used. If a community name is not defined for the stack, then the
default name defined to z/OS Communications Server IP is used. The community name can be defined in
the TCP390 definition for the associated stack where the SNMP request is being issued. For more
information, see the TCP390 definition in the IBM Z NetView Administration Reference.
Note: For security purposes, the community name is not displayed and is not displayed in the NetView
log.
Resource: LOCAL
Password(Community) Command: GET
TCP/IP Stack: LOCAL
MIB Variables:
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F9=Options F12=Cancel
To specify optional parameters for this command, press F9 (Options) to display the SNMP options panel,
which is shown in Figure 97 on page 109.
Resource: LOCAL
Password(Community)
TCP/IP Stack: LOCAL Comm ..............................
: Options: :
MIB Variables: : :
______________________________________ : _ Debug :
______________________________________ : _ Retry 2_ :
______________________________________ : _ Timeout 3_ :
______________________________________ : _ Bulk :
______________________________________ : Max Repetitions 10 :
______________________________________ : non-Repetitions 0_ :
______________________________________ : :
______________________________________ : Additional options: :
______________________________________ : _________________________ :
______________________________________ : _________________________ :
: _________________________ :
: _________________________ :
..............................
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F12=Cancel
The options panel shows the SNMP options and the system settings. These settings can be defined in the
policy definitions. Type an X next to each option that you want to override. If the system definition is
different from the SNMP default, the fields are automatically selected.
Note: If Bulk is selected using F9 (Options), the command is changed to GETBULK.
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F9=Options F12=Cancel
For the Set command, the Type and Value fields are added to the panel. Type is used to override the
definition type of the MIB variable. Value is used to specify the new value of the MIB variable. To specify
optional parameters for this command, press F9 (Options) to display the SNMP options panel.
Resource: 1.23.45.678
Password(Community) Command: WALK
TCP/IP Stack: LOCAL
MIB Variables:
_____________________________________________________________________
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F9=Options F12=Cancel
More: +
Resource: LOCAL
Password (Community)
TCP/IP Stack: LOCAL
Groups:
ExtGroup LIST+ UDPTable TABLE atm WALK
system WALK ip WALK 3172sys WALK
sys2 LIST ipforward WALK 3172ifTrap WALK
sysOR TABLE ipAddrTable WALK 3172channel WALK
snmp WALK ipRouteTable WALK 3172lan WALK
IFTable WALK ipNoTab LIST 3172blk WALK
IFXTable WALK icmp WALK 3172dblk WALK
atTable WALK tcp WALK 3172device WALK
UDP WALK tcpConnTable WALK MvsTcpSystem WALK
UDPnotab LIST tcpNoTab LIST MvsTcpIf WALK
COMMAND ===>
ENTER=Get Group Data
F1=Help F2=Main Menu F3=Return F4=Description F6=Roll
F7=Backward F8=Forward F9=Options F12=Cancel
The SNMP Group panel displays the groups that are defined in DSIPARM sample FKXSNMP. To display
more information about the group, tab to the group and press F4. To display the SNMP options, press F9.
For more information about creating MIB groups, see Appendix B, “Customizing the SNMP Group
Definition File (FKXSNMP),” on page 159.
Figure 101 on page 111 displays the description of the group UDPnotab, and has a type of LIST. Note the
four MIB variables that are displayed when you use the UDPnotab group.
Abstract:
UDP group MIBs without the UDP Table
MIB Variables:
udplnDatagrams.0
udpNoPorts.0
udplnErrors.0
udpOutDatagrams.0
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F9=Options ENTER=Get Group Data F12=Cancel
Figure 102 on page 111 displays the description of the group system and has a type of WALK.
Abstract:
System group MIB variables for SNMP v1 or SNMP v2 including OR Table
The definition of this group can be found in:
RFC1907 for v2 or RFC1450 for v1.
MIB Variables: FULL Name:SYSTEM
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F9=Options ENTER=Get Group Data F12=Cancel
Figure 103 on page 111 displays the description of the group UDPTable and has a type of TABLE.
Abstract:
UDP group MIBs with the UDP Table
Command ===>
F1=Help F2=Main Menu F3=Return F4=Description F6=Roll
F9=Options ENTER=Get Group Data F12=Cancel
Resource: LOCAL
Password (Community)
TCP/IP Stack: LOCAL
..................................................................
Groups : :
ExtGroup : PLEASE ENTER AN INTERFACE NUMBER :
system : :
sys2 : 2________________________________________ :
sysOR : :
snmp : :
IFTable : :
IFXTable : :
: :
atTable : :
UDP : :
UDPnotab : :
: :
:................................................................:
WALK
COMMAND ===>
F1=Help F2=Main Menu F3=Return F6=Roll F12=Cancel
On the SNMP Group Extensions panel, type 2 to display details for interface 2 and press Enter. Listed MIB
variable information for interface adapter number 2 is collected and displayed as Figure 105 on page 112.
REFRESH: 0
Select an IP Management Active Monitoring command and press ENTER
1=ADD/START 2=DISPLAY/CHANGE 3=DELETE 4=START 5=STOP
Resource TCP/IP Actmon
Resource Type Stack Definition M Status
--------------- ----------- ----------- ------------- - -------
_ **NEW** IPHOST
_ **NEW** IPPORT
_ LOOP1026 IPPORT NMP101 R DOWN
_ NMPIPL10 IPHOST NMP101 A NORMAL
_ LOOP1024 IPPORT NMP101 A NORMAL
_ TN3270 IPPORT NMP101 A NORMAL
_ NMPIPL10 TCP390 NMPIPL10 A NORMAL
_ NMP101 TCP390 NMP101 A NORMAL
_ NMP217 TCP390 NMP217 A NORMAL
_ NMPIPL10V6 TCP390 NMPIPL10V6 R UNKNOWN
_ TELNETAS IPTELNET N NORMAL
Command ===>
F1=Help F2=Main Menu F3=Return F4=Commands F5=Refresh F6=Roll
F7=Backward F8=Forward F9=Display Opts F10=Connections F12=Cancel
Note the templates that are named **NEW**, one for IPHOST and one for IPPORT. These are the most
used resource types. Select either template to add a resource by using the required fields for the type in
the FKXK2760 panel, described in “IP Resource Management Add Panel” on page 114.
The following commands can be issued directly from the IP Resource Management main panel by typing
the command number next to the resource name:
1
Display the Add/Change Panel in add mode. When the resource is added, monitoring is started. For
additional information, see “IP Resource Management Add Panel” on page 114.
Command ===>
F1=Help F2=Main Menu F3=Return F4=SUBMIT UPDATE F6=Roll
F7=Backward F8=Forward F9=Add a field F12=Cancel
With the Add panel, you can add resources dynamically into the in-store control file. When the resource is
added, proactive monitoring is started for the resource. There is a delay before the monitoring field (M
column) is updated on the main panel. Use F5 to refresh the panel until the change is displayed.
The IP Resource Management Add panel contains the following fields:
Command
A fixed field or a field that is updated using one of the following command options:
1
Change Value for keyword.
2
Delete keyword and its value.
R
Indicates field is required. This option is set by the program.
X
Indicates the field cannot be changed. This option is set by the program.
Keyword
Specifies the keyword name as set in the control file.
Value
Specifies the current value of the keyword under most circumstances. The value is cleared for ADD
operations if a new value is required.
Notes:
1. Keywords marked with an X cannot be updated. In cases where multiple field relationships exist, not
all required keywords are marked with an R.
2. Values for keywords are not syntax checked. Entering incorrect data can cause unpredictable results.
Changes are validated before a page forward or backward attempt. When R required fields are accepted
their command is changed to X or fixed field, automatically.
To submit the changes, press F4. To add a new keyword-value pair press F9 to display the Add keyword
window.
Command ===>
F1=Help F2=Main Menu F3=Return F4=SUBMIT UPDATE F6=Roll
F7=Backward F8=Forward F9=Add a field F12=Cancel
The current filter and sort settings are displayed. Change the settings
and press ENTER to activate.
Command ===>
F1=Help F3=Return F6=Roll
F9=Defaults F12=Cancel
Use this panel to select the resources that you want to display. The settings selected are saved on a task
basis and apply in future queries. You can specify filter criteria for exact names or names starting with
specific characters, if the criteria is followed by an asterisk (*). The following fields can be filtered:
Resource Name
Specify criteria for the resource name.
Resource Type
Specify criteria for the resource type.
TCP/IP
Specify criteria for the TCP/IP stack name.
Status
Specify criteria based on resource status.
Command ===>
F1=Help F2=Main Menu F3=Return F6=Roll
F12=Cancel
This chapter describes the basic IP services that are provided by the base NetView program. These
commands provide control capabilities for managing IP resources and can be issued directly from the
NetView command line or in REXX procedures and other automation routines. For the syntax of and
detailed information about these commands, see the online help.
IPLOG
The IPLOG command sends a message to the syslog daemon on a remote host for processing. Standard
UNIX protocol for the syslog daemon is used. The remote host must have a syslog server active for the
command to work.
For information about the NetView syslog server, see Chapter 15, “Using IP Servers,” on page 155. For
the syntax of and detailed information about the IPLOG command, see the online help.
PING
The PING and MVSPING commands are used to test whether a host in an IP network can be reached by
sending Internet Control Message Protocol (ICMP) messages (known as echo requests) to the host and
reporting the responses (known as echo replies).
For information about using PING and MVSPING, see “Using PING” on page 105. For the syntax of and
detailed information about the PING and MVSPING commands, see the online help.
REXEC
The REXEC command is used to send a command over IP to a remote host for processing and display the
resulting output. The standard UNIX RSH protocol is used. The remote host must have an REXEC server
listening at the specified or default port for the command to work.
For information about the NetView REXEC server for use with UNIX commands, see Chapter 15, “Using IP
Servers,” on page 155. For the syntax of and detailed information about the REXEC command, see the
online help.
RMTCMD
The RMTCMD command processor is used to send system, subsystem, and network commands to a
remote NetView host for processing. The responses to these commands are returned to the RMTCMD
issuer.
For the syntax of and detailed information about the RMTCMD command, see the online help.
RSH
The RSH command is used to send a command over IP to a remote host for processing. The output can be
displayed as line-mode output or in a panel that is placed on the NetView roll stack. If the remote host
supports it, additional commands can be issued from the panel where the output is displayed.
For information about the NetView RSH server, see Chapter 15, “Using IP Servers,” on page 155. For the
syntax of and detailed information about the RSH command, see the online help.
SOCKET
The SOCKET command is used to request IP services, to retrieve information about TCP/IP stacks and to
create TCP/IP applications within the NetView program.
For information about using the SOCKET command, see Chapter 13, “Using Z NetView Socket,” on page
127. For the syntax of and detailed information about the SOCKET command, see the online help.
TN3270
The TN3270 command is used to log in to remote TCP/IP-connected systems, either from the NetView
command line or from the NetView management console. The TN3270 command establishes a Telnet
3270 session with the specified host. Only Telnet 3270 protocol is supported. The resulting session is
placed on the roll stack and can be rolled using the roll key specified on the command or using the
default. The session can be ended with the specified (or defaulted) endkey.
For the syntax of and detailed information about the TN3270 command, see the online help.
TRACERTE
The TRACERTE command is used to trace the routes of IP data packets to a specified host from the IP
stack on the NetView host. This command detects connectivity with the specified host, the actual routing
to that host, the roundtrip times between the NetView program and that host, and the routers along the
way.
For information about using TRACERTE, see “Using TRACERTE” on page 106. For the syntax of and
detailed information about the TRACERTE command, see the online help.
/* Ensure that all length values are correct within the alert and
CP-MSU, or hardware monitor might not recognize the data. */
To send the alert over IP to the DSIRTTR task running within a NetView program, use a command similar
to the following command, where 10.10.45.26 is the IP address of the host on which the target NetView
program is running. You can specify an IPv6 address if both source and target NetView programs are
enabled for IPv6 networking by using the IPv6Env statement.
For more information about using the CNMSMSIP sample, see the sample.
SENDRTTR-generated alert
Responding to Intrusions
Intrusion Detection Services (IDS) of z/OS Communications Server enables the detection of attacks and
the application of defensive mechanisms on the z/OS server. It provides support for scan detection and
reporting; attack detection, reporting and prevention; and traffic regulation for TCP connections and UDP
receive queues. In z/OS Communications Server, policies are used to specify what events are to be
detected under what circumstances and what action to take. For complete information about IDS, see the
z/OS Communications Server publications.
In conjunction with the Intrusion Detection Services of z/OS Communications Server, the NetView
program can provide the following kinds of automated responses to an intrusion:
• Notification. Send an e-mail to security administrators, an alert to the NetView console, or a message to
designated NetView operators.
• Commands. Issue UNIX, NetView, or z/OS commands to collect more data or to take other actions.
You can use the NetView SOCKET command to develop TCP/IP applications. The SOCKET function
provides the following advantages:
• It provides a NetView command interface with the z/OS Communications Server TCP/IP macro
application programming interface. Because most NetView SOCKET commands are asynchronous
requests, NetView tasks can continue processing their message queues and stop requests.
Note: It is also an alternative to the z/OS Communications Server REXX SOCKET (RXSOCKET) function
and z/OS C/C++ UNIX sockets.
• It can be used by operators to perform the following functions:
– Resolve host names, IP addresses, or service names (GETADDRINFO, GETNAMEINFO,
GETHOSTBYNAME, GETHOSTBYADDR)
– Retrieve a host name (GETHOSTNAME)
– Retrieve a host ID (GETHOSTID)
– Obtain sockets for communication and type a TCP/IP application, command by command
• It can be used in command procedures to create the following kinds of TCP/IP applications in an IPv4
network, an IPv6 network, or both.
– Datagram (or User Datagram Protocol, UDP) sender, receiver, or both
– Stream (or Transmission Control Protocol, TCP) data client, server, or both
– Raw sockets sender, receiver, or both
Note: The sample NetView security definitions (the CNMSCAT2 and CNMSAF2 samples) do not allow
users to obtain raw sockets (SOCKET TYPE=SOCKET SOCKTYPE=RAW). NetView operators who need
to run raw socket applications based on the SOCKET command must be permitted to do so.
• It uses the NetView base TCP/IP services, which provide trace entries in the NetView trace if the TCP
option of the TRACE command is specified. It also provides entries in the NetView trace about its own
asynchronous TCP/IP request completions if the TCP option of the TRACE command is specified.
Generally, the keywords for the SOCKET command map to the keywords for the EZASMI macro. For
information about the IP sockets API and request completion errors (errnos), see the z/OS
Communications Server IP Sockets Application Programming Interface Guide and Reference. You can use
the SOCKET command to implement the same TCP/IP application programming concepts that are
described in that manual, although not all of the EZASMI macro functions are implemented in the SOCKET
command.
To prevent unauthorized TCP/IP hosts from connecting to the NetView program by using the NetView
socket interface, or, for a server application, to prevent unauthorized clients from maintaining a
connection with the server, you can use the SOCACC command. For more information, see the IBM Z
NetView Security Reference.
For detailed information about the SOCKET command, see the online help.
Only one socket interface at a time can be initialized by using the SOCKET command on a task.
Either of the following messages indicates that a socket interface is initialized and that you can use other
SOCKET commands to retrieve information or to implement a TCP/IP application:
If sockets are allocated when SOCKET TYPE=TERM is issued, they are all closed by TCP/IP. Also, if the
task upon which the socket interface was initialized is ended (stopped or logged off) or abends, the
socket interface automatically stops.
Retrieving Information
You can use the SOCKET command to retrieve information from the resolver or information about TCP/IP.
This section provides some examples. Note that all of the requests are global and that SOCKET
TYPE=GETHOSTNAME and SOCKET TYPE=GETHOSTID are also asynchronous.
Example 1. Request resolution of a host name:
If the resolver learns that this host name maps to an IPv6 address, messages similar to the following
messages might be displayed:
If the resolver learns that this host name maps to an IPv4 address, the following messages might be
displayed:
Example 3. Resolve a host name and a service name. The command is prefixed with NETVASIS because
the service name lookup is case-sensitive.
If the resolver has access to a SERVICES file that maps service names to port numbers, the following
messages might be displayed:
If the resolver determines the host name for the specified IP address, the following messages might be
displayed:
Example 5. Determine a host name and service name for a specified IP address and port number:
If the resolver determines the host name for the specified IP address and a SERVICES file entry maps TCP
port 512 to the name of a service, the following messages might be displayed:
Note that, if the name of a service that is using a UDP port is of interest, add INFOFLAG=NI_DGRAM to the
command.
Example 6. Determine the host name defined for the TCP/IP stack with which the socket interface has
affinity:
SOCKET TYPE=GETHOSTNAME
If a host name is defined in a TCPIP.DATA file for the specified TCP/IP stack, the following message might
be displayed:
Example 7. Determine the host ID (possibly the "home" IP address) defined for the TCP/IP stack:
SOCKET TYPE=GETHOSTID
If data from the client becomes available before 15 seconds elapses, the SOCKET TYPE=SELECT
command finishes with a message that is similar to the following message:
If multiple sockets had activity, a BNH610I message is issued for each socket that had activity, with the
message variable containing a value for each type of event that occurred for the socket.
If 15 seconds elapses without any activity for any socket passed to SOCKET TYPE=SELECT, the SOCKET
TYPE=SELECT command finishes with the following message:
Note: Because of the limitations of the command parsing services that are used by the SOCKET
command, the value of each of the READ, WRITE, and EXCEPT keywords cannot exceed 255 characters
(including the parentheses that delimit a list of socket descriptors). If the number of sockets monitored
for a type of activity becomes large enough to exceed the value length limit, the SOCKET command ends
with a syntax error.
This error can be prevented in a couple of ways. One way is to limit the list to the descriptors that fit in the
list and to close any others. Another way is to create multiple lists and rotate calls of SOCKET
TYPE=SELECT through the different lists, perhaps using a relatively small TIMEOUT value so that no
socket has to wait very long for its activity to be processed.
A failed socket-specific request for which TCP/IP returns an error number usually results in the following
message:
A global request for which TCP/IP returns only a return code (no error number) results in the following
message:
SOCKET TYPE=CANCEL
To cancel an outstanding asynchronous socket-specific request, also specify SOCKID, as shown in the
following example. Note that the SOCKET TYPE=CANCEL command itself is also asynchronous.
A successful result for the SOCKET TYPE=CANCEL command is indicated by a message that is similar to
the following message:
If a request has finished but the NetView program has not yet returned the results to the TCP/IP
application, the SOCKET TYPE=CANCEL command can still finish successfully without changing the
completion results of the original request.
SOCKET TYPE=GETCLIENTID
The information in the BNH603I message must be made available to the "taking" task. The "giving" task
then processes the following command:
Because the JOBNAME keyword was not specified with the SOCKET TYPE=GIVESOCKET command, only
a unit of work in the NETVIEW job can take the socket. Because the TASK keyword was not specified with
SOCKET TYPE=GIVESOCKET, then any task in the NETVIEW job can take the socket.
Next, to take socket 1 from NetView task 007475D1, the "taking" task might process the following
command:
If the "giving" task processes the SOCKET TYPE=SELECT EXCEPT=1 command, the completion of the
SOCKET TYPE=TAKESOCKET command by the "taking" task results in an EXCEPT event for socket 1. At
that point, the "giving" task closes socket 1, and the "taking" task uses socket 8 in its own socket
interface to manage the communication with the client.
Notes:
1. You can use the SOCKET TYPE=TAKESOCKET command to take a socket given by a TCP/IP application
that is not based on the SOCKET command provided that the request used to give the socket
authorizes the socket interface running in the NetView program to do so.
2. To take an AF_INET6 socket by using the SOCKET TYPE=TAKESOCKET command, ensure that
FAMILY=INET6 is specified with SOCKET TYPE=TAKESOCKET.
Because FAMILY is not specified and FAMILY=INET is the default (set the address family to IPv4), socket
0 can then be used to send or receive, or both send and receive, datagrams in an IPv4 network.
To obtain a datagram socket that can be used in an IPv6 network, use the following command:
A successful result is indicated by the same message as for FAMILY=INET, for example:
Or, to limit the sending and receiving of datagrams to IPv4 network interfaces, use the following
command:
A datagram sender does not have to process an explicit SOCKET TYPE=BIND command to send
datagrams, although it is allowed.
A socket can be bound to a specific interface IP address to limit the interface over which the socket can
send or receive datagrams.
If you want TCP/IP to choose the port number to which the socket is bound, specify PORT=0 on the
SOCKET command, as shown in the following commands:
• If the datagram socket was obtained by using the FAMILY=INET option, use the following command:
• If the datagram socket was obtained by using the FAMILY=INET6 option, use the following command:
Or, to limit the sending and receiving of datagrams to IPv4 network interfaces, use the following
command:
To see the number of the port that is selected and bound to the socket by TCP/IP when PORT=0 is
specified, use the following command:
• For a socket that is bound to :: (ADDRESS=::), a message that is similar to the following message is
returned:
Receiving a Datagram
To receive a datagram on socket 0, use the following command:
In this case, a single character (upper case EBCDIC "Y") was received from a datagram sender bound to
the IP address and port shown in message BNH619I.
As many BNH621I messages are used as necessary to present all the received data to the TCP/IP
application. As many as 240 bytes of data can be contained in a BNH621I message line (beginning after
the message ID and one blank). The SOCKET command does not convert the code set of any data that is
returned in a BNH621I message. If needed, you can use the XLATE stage of PIPE to perform ASCII-to-
EBCDIC or EBCDIC-to-ASCII data conversion.
A datagram that is to be received on a socket can satisfy only one SOCKET TYPE=RECVFROM request. If
the receive size limit (MAXLEN value) is too small to hold the entire datagram, the datagram is truncated
to the receive size limit. TCP/IP configuration can also affect the amount of data that can be received; for
more information, see the z/OS Communications Server IP Configuration Reference.
Sending a Datagram
To send a datagram by using socket 0, use the following command:
This command sends the EBCDIC characters "ABC" to a datagram receiver at IP address 10.12.45.27,
port 9000. A successful result is indicated by a message that is similar to the following message:
When sending data, the PIPE command provides more than just the correlation of output from an
asynchronous command. It also provides the data to be sent in a collection of one or more data buffers
that the SOCKET command subsequently collects into one datagram to be sent. In the command
previously shown, the PIPE is providing the literal data "ABC" in one data buffer to be sent.
Because of the nature of the datagram protocol (UDP), there is no certainty that the data actually made it
to the receiver or, if multiple datagrams are sent, that the order was maintained. In addition, the sender
has no knowledge whether the receiver even exists. The application must have mechanisms to ensure
correct data delivery.
Closing a Socket
To close a datagram socket, such as socket 0, use the following command:
3. Send a datagram with one of the following commands where x is the socket number of the socket that
was obtained and where data_source might be, for example, "VAR varname" or "STEM stemname.
| COLLECT" or "LIT /data/". A PIPE command is used because it can provide data in the manner
that is required by the SOCKET TYPE=SENDTO command,
SOCKET TYPE=TERM
The CNMSMSGT sample contains an example of a datagram sender. This example also illustrates what
can generally be done when SOCKET command requests fail, such as canceling a request for which no
messages are returned. For more information, see “Sending SNMP Traps” on page 123.
3. Bind the datagram socket to an IP address and port with one of the following commands, where x is
the socket number of the socket that was obtained. To accept datagrams regardless of the interface
over which they are sent, use :: (IN6ADDR_ANY) for a socket that is obtained by using
FAMILY=INET6 or 0.0.0.0 (INADDR_ANY) for a socket that is obtained by using FAMILY=INET.
4. Wait for activity with the following command. A read event for the socket is that data is available to be
received.
5. Receive the datagram with the following command. If the application is to continue waiting for data, it
can issue the SOCKET TYPE=SELECT command again. When the application is ready to stop, it can
proceed to the next step.
SOCKET TYPE=TERM
If the socket is for a client or server that might also be used in an IPv6 network (AF_INET6), use the
following command:
You can use an AF_INET6 socket in both IPv4 and IPv6 networks unless the IPV6_V6ONLY socket option
is set to limit the socket to IPv6 networks; for more information, see the TYPE=SETSOCKOPT description
in the SOCKET command online help.
The socket descriptor can also be chosen by the user, as shown in the following command:
To bind AF_INET6 socket 1 to the IN6ADDR_ANY IP address and port 10000, use the following
command:
As with datagram sockets, a stream socket can be bound to a port chosen by TCP/IP by using the
following command:
To see the number of the port to which a particular socket is bound, use the following command:
If the stream socket (in this case, socket 1) was bound by using a SOCKET command that specified
PORT=0, a message that is similar to the following message is returned:
Listening (Server)
For a stream socket to serve clients, TCP/IP must be told that the socket is to receive connection requests
from clients by using the SOCKET TYPE=LISTEN command. A socket for which SOCKET TYPE=LISTEN is
issued becomes a "listening socket". For a socket that was previously bound (such as socket 0), use the
following command:
Connecting (Client)
A stream socket becomes a TCP client by connecting to a server that is listening for connection requests.
To connect an AF_INET or AF_INET6 socket 0 to a server at host 10.12.45.27 bound to port 10000 and
listening for connection requests, use the following command:
To connect an AF_INET6 socket 1 to a server on the same host bound to port 10000 and listening for
connection requests, use the following command:
When a connection request arrives, the command finishes with a message that is similar to the
following message:
• The SOCKET TYPE=ACCEPT command, which cannot finish until a connection request arrives. For
listening socket 0 to accept a connection request, use the following command:
A successful result is indicated by a message that is similar to the following message. This message
indicates that a connection request came from a client in an IPv6 network and that socket 1 can be
used for communication with that client.
If the server is notified that another connection request has arrived (another READ event for listening
socket 0), this time from a client in the IPv4 network, the same command is used again to accept the
connection:
If socket 6 is the server socket used to handle communication with a client socket, a message that is
similar to the following message might be returned:
If a client socket 4 was also created by using the SOCKET command and is the connection partner, you
can use the following command:
Sending a Stream
Whether the application is a client or server, and assuming that a stream socket is available (because
either a client processing the SOCKET TYPE=SOCKET command or a server processing the SOCKET
TYPE=ACCEPT command caused a new stream socket to be allocated), data can be sent by using a
command such as the following command (where data_source might be, for example, "VAR varname"
or "STEM stemname. | COLLECT" or "LIT /data/"):
The PIPE command is used because it can provide data in the manner that is required by the SOCKET
TYPE=SEND command. Because this is a stream application, not all the data might be sent with a single
call of SOCKET TYPE=SEND. The application needs to check the output of the SOCKET TYPE=SEND
command to see if all bytes were sent; if not, the application can attempt to send again, starting with the
first previously unsent byte.
For example, if a stream of data ("AFDAFD") is to be sent by using socket 2, use a command that is similar
to the following command:
In this example, all the data is being sent in one SOCKET TYPE=SEND command. However, if fewer than 6
bytes were sent, the sending application can create a new stream beginning with the first byte of data not
yet sent and issue the SOCKET TYPE=SEND command again.
The wait time of 5 seconds for the CORRWAIT (CORR) stage is arbitrary. You can set a longer or shorter
wait time, or perhaps make it adjustable, depending on system and network conditions.
Receiving a Stream
Whether the application is a client or server, and assuming that a stream socket is available (because
either a client processing the SOCKET TYPE=SOCKET command or a server processing the SOCKET
TYPE=ACCEPT command caused a new stream socket to be allocated), data can be received by using the
following command, where socket 2 is specified:
A successful result is indicated by messages that are similar to the following messages:
The BNH620I message indicates how many bytes of data were received by this SOCKET TYPE=RECV
command. Following the BNH620I message are as many BNH621I messages as are required to present
all of the received data. As many as 240 bytes of data can be contained in a BNH621I message line
(beginning after the message ID and one blank). The SOCKET command includes the received data as is in
the BNH621I messages; that is, it does no data conversion between code sets.
Because this is stream data, a single SOCKET TYPE=RECV request might not receive all of the data that
was sent. In that case, the application can prepare to receive additional data. One method is to include
this socket in a READ list that is passed to a SOCKET TYPE=SELECT command; this method is
recommended because it does not block all other requests on the socket while it is being processed. If
additional data is to be received by that socket, SOCKET TYPE=SELECT produces a BNH610I message for
Ending a Connection
When a client or server determines that no more data is to be exchanged and the connection is to be
stopped, the client or server processes a command similar to the following command (for example, if
socket 2 is being used to communicate with the connection partner), where HOW=BOTH indicates that
both send and receive operations are to be stopped:
Closing a Socket
When all operations with a client or server socket have finished, the socket can be closed to free the
socket and the associated resources. For example, to close client socket 2 for which the connection was
previously ended, use the following command:
Simple Client
The following steps implement a simple client. The basic steps are to connect to a server, send data to it,
and end the connection.
1. Initialize the socket interface with the following command:
3. Connect to a server at the specified IP address and port with one of the following commands:
Because this is a stream application, not all of the data might be sent with a single call of SOCKET
TYPE=SEND. The application needs to check the output of the SOCKET TYPE=SEND command, and, if
not all of the bytes were sent, the application needs to send again, starting with the first previously
unsent byte.
5. End the connection (both directions of the data flow) with the following command:
SOCKET TYPE=TERM
The CNMSMSIP sample contains an example of a simple TCP client. This example sends a CP-MSU
(control point management services unit) that contains an SNA alert. For more information, see “Sending
SNA Alerts” on page 124.
3. Bind the socket to an IP address and port with one of the following commands. To receive connection
requests regardless of the interface over which they are sent, bind the socket to :: (IN6ADDR_ANY)
for a socket that is obtained by using FAMILY=INET6 or 0.0.0.0 (INADDR_ANY) for a socket that is
obtained by using FAMILY=INET.
4. Establish the socket as a listening socket, that is, a socket that is ready to receive connection
requests, with the following command:
5. Wait for activity (READ event) on the listening socket with the following command. A READ event for
the listening socket is a connection request from a client. When a READ event occurs, the application
can proceed to the next command.
6. Accept a connection request with the following command. If this succeeds, socket y is created for the
server to use to handle communication with the client. In this example, the client is expected to send
data, so the application can proceed to the next command.
8. If the server awakens for a READ event for socket y, use the following command. Because this is a
stream application, a single SOCKET TYPE=RECV command might not receive all the data that was
sent by the client. A good practice is to use the SOCKET TYPE=SELECT command again (step “7” on
page 143), listening for events on both sockets.
9. If the SOCKET TYPE=RECV command finishes with the following message, this indicates that the
client closed the connection:
In this case, the server can close the socket with the following command and then wait for activity
again (step “5” on page 142):
10. However, if the server is responsible for ending the connection, the server can issue the following
commands to end the connection and close the socket:
11. If the server has no other sockets for communication with clients, it can wait for the next connection
request with a SOCKET TYPE=SELECT command (step “5” on page 142) or, if the socket interface is
to be ended, go to the next step.
12. When the socket interface is to be ended, use the following commands to close the listening socket
and stop the socket interface:
IPXLATE('VERIFY','10.163.17.1')
Because the specified string is a presentation form of an IP address, the following result string is
returned:
Suppose that the string to be verified is not a presentation form of an IP address, as shown here:
IPXLATE('VERIFY','yourhost.yourcompany.com')
In this case, a non-zero result string such as the following string is returned:
25
IPXLATE('STANDARD','010.163.017.001')
Because this string is a presentation form of an IPv4 address, the following result string is returned:
0 10.163.17.1
In this result string, 0 indicates a successful conversion, and the rest of the result string (10.163.17.1) is
the returned presentation form of the IP address.
Suppose that you want to convert the following IPv6 address:
IPXLATE('STANDARD','0000:0000:0000:0000:0000:0000:0000:0001')
0 0:0:0:0:0:0:0:1
When presenting an IPv6 address, in particular, you might want to remove a large group of consecutive
zeros and show the address in compressed form. To convert an IPv6 address to the compressed form,
use the COMPRESS option:
IPXLATE('COMPRESS','0000:0:0000:0:0000:0:0:0001')
0 ::1
IPXLATE('STANDARD','::1')
0 0:0:0:0:0:0:0:1
Because an IPv4-mapped IPv6 address essentially maps an IPv4 address into an IPv6 network (making it
usable with an AF_INET6 socket, for example), you can use the IPXLATE() function to convert this form to
a standard presentation form IPv4 address, for example:
IPXLATE('STANDARD','::FFFF.10.163.17.1')
0 10.163.17.1
If the string to be converted is not a presentation form of an IP address, the result string has only a return
code indicating the problem. Suppose that you request the following conversion:
IPXLATE('STANDARD','yourhost.yourcompany.com')
Because this string is not a presentation form of an IP address, the following result string is returned:
25
void *pInData;
int lenInData;
void *ppInData = (void *)&(pInData);
char MAYBE_PRES_IPV4[] = "10.163.17.1";
void *pOutData;
int lenOutData;
void *ppOutData = (void *)&pOutData;
/* Checks to see if the string that was passed is a valid IP address. The */
/* two output parameters, ppOutdata and lenOutData, are ignored when the */
/* function is PCHECK. */
Cnmipxl(PCHECK,
ppInData,
lenInData,
ppOutData,
lenOutData);
If the string to be checked is a presentation form of IP address, the Hlbrc field has a value of 0
(CNM_GOOD). If the string is not a presentation form of an IP address, the Hlbrc field has a non-zero
value.
void *pInData;
int lenInData;
void *ppInData = (void *)&(pInData);
char MAYBE_PRES_IPV4[] = "010.163.017.001";
void *pOutData;
int lenOutData;
void *ppOutData = (void *)&pOutData;
char outPres[45]; /* Room for maximum size presentation form IP address */
Cnmipxl(P2PV4,
ppInData,
lenInData,
ppOutData,
lenOutData);
Upon completion, the Hlbrc field has a value of 0, outPres contains "10.163.17.1", and the Hlbleng field
has a value of 11:
void *pInData;
int lenInData;
void *ppInData = (void *)&(pInData);
char MAYBE_PRES_IPV6[] = "3F10:0000:0000:0000:010:163:017:0001";
void *pOutData;
int lenOutData;
void *ppOutData = (void *)&pOutData;
char outPres[45]; /* Room for maximum size presentation form IP address */
Cnmipxl(P2PCOMP,
ppInData,
lenInData,
ppOutData,
lenOutData);
Upon completion, the Hlbrc field has a value of 0, outPres contains "3F10::10:163:17:1", and the Hlbleng
field has a value of 17.
void *pInData;
int lenInData;
void *ppInData = (void *)&(pInData);
char MAYBE_PRES_IPV4[] = "10.163.17.1";
char binOut[16];
void *pOutData;
int lenOutData;
void *ppOutData = (void *)&pOutData;
Cnmipxl(P2NV4,
ppInData,
lenInData,
ppOutData,
lenOutData);
Upon completion, the Hlbrc field has a value of 0 (CNM_GOOD) if the conversion succeeded and a non-
zero value if it did not. If the output area is not large enough to hold the result, the output area is filled,
the Hlbrc field has a value of 40 (CNM_DATA_TRUNC), and the Hlbleng field has a value of the actual
length that is required to hold the result.
Cnmipxl(P2NV6,
ppInData,
lenInData,
ppOutData,
lenOutData);
void *pInData;
int lenInData;
void *ppInData = (void *)&(pInData);
unsigned int BIN_IPV4 = 0x0AA31101;
char charOut[45]; /* Room for the maximum size presentation form */
void *pOutData;
int lenOutData;
void *ppOutData = (void *)&pOutData;
Cnmipxl(N2PSTD,
ppInData,
lenInData,
ppOutData,
lenOutData);
Cnmipxl(N2PSTD,
ppInData,
lenInData,
ppOutData,
lenOutData);
Cnmipxl(N2PCOMP,
ppInData,
lenInData,
ppOutData,
lenOutData);
Suppose that you pass that binary IP address and use the N2PSTD function in the following way. Upon
completion, outData contains "10.163.17.1", the Hlbleng field has a value of 11, and the Hlbrc field has a
value of 0. This is because the IPv4-mapped IPv6 address is essentially an IPv4 address and the standard
presentation form of an IPv4 address is a string representing dotted decimal.
Cnmipxl(N2PSTD,
ppInData,
lenInData,
pInData = ADDR(IN_ADDR1);
lenInData = LENGTH(IN_ADDR1);
CNMIPXLATE TYPE(PCHECK)
INDATA(pInData)
INLEN(lenInData);
pInData = ADDR(MAYBE_PRES_IPV4);
lenInData = LENGTH(MAYBE_PRES_IPV4);
pOutData = ADDR(outPres);
lenOutData = LENGTH(outPres);
CNMIPXLATE TYPE(P2PV4)
INDATA(pInData)
INLEN(lenInData)
pInData = ADDR(MAYBE_PRES_IPV6);
lenInData = LENGTH(MAYBE_PRES_IPV6);
pOutData = ADDR(outPres);
lenOutData = LENGTH(outPres);
CNMIPXLATE TYPE(P2PCOMP)
INDATA(pInData)
INLEN(lenInData)
OUTDATA(pOutData)
OUTLEN(lenOutData);
pInData = ADDR(MAYBE_PRES_IPV4);
lenInData = LENGTH(MAYBE_PRES_IPV4);
pOutData = ADDR(binOut);
lenOutData = LENGTH(binOut);
CNMIPXLATE TYPE(P2NV4)
INDATA(pInData)
INLEN(lenInData)
OUTDATA(pOutData)
OUTLEN(lenOutData)
pInData = ADDR(MAYBE_PRES_IPV4);
lenInData = LENGTH(MAYBE_PRES_IPV4);
pOutData = ADDR(binOut);
lenOutData = LENGTH(binOut);
CNMIPXLATE TYPE(P2NV6)
INDATA(pInData)
INLEN(lenInData)
OUTDATA(pOutData)
OUTLEN(lenOutData);
pInData = ADDR(BIN_IPV4);
lenInData = LENGTH(BIN_IPV4);
pOutData = ADDR(charOut);
lenOutData = LENGTH(charOut);
CNMIPXLATE TYPE(N2PSTD)
INDATA(pInData)
INLEN(lenInData)
OUTDATA(pOutData)
OUTLEN(lenOutData);
pInData = ADDR(BIN_IPV6);
lenInData = LENGTH(BIN_IPV6);
CNMIPXLATE TYPE(N2PSTD)
INDATA(pInData)
INLEN(lenInData)
OUTDATA(pOutData)
OUTLEN(lenOutData);
CNMIPXLATE TYPE(N2PCOMP)
INDATA(pInData)
INLEN(lenInData)
OUTDATA(pOutData)
OUTLEN(lenOutData);
Suppose that you pass that binary IP address and use the N2PSTD function call, as in the following
example. Upon completion, outData contains "10.163.17.1", the HLBLENG field has a value of 11, and the
HLBRC field has a value of 0. This is because the IPv4-mapped IPv6 address is essentially an IPv4
address and the standard presentation form of an IPv4 address is a string that represents dotted decimal.
CNMIPXLATE TYPE(N2PSTD)
INDATA(pInData)
INLEN(lenInData)
OUTDATA(pOutData)
OUTLEN(lenOutData);
The NetView program supplies several TCP/IP services that are provided as server and client functions.
Server and client functions are available for the REXEC, RSH, and syslog services. The REXEC and RSH
services provide remote command processing support. The syslog service provides remote logging.
The DSIRXEXC task and REXEC statements in the CNMSTYLE member are used to initialize the REXEC
server. To prevent unauthorized TCP/IP hosts from connecting to the NetView program by using the
REXEC server, use the JAVAACC command; for more information, see the IBM Z NetView Security
Reference.
The DSIRSH task and RSH statements in the CNMSTYLE member are used to initialize the RSH server. To
set the security access for the RSH server, use the DSIRHOST sample; for more information, see the
sample.
The DSIIPLOG task and IPLOG statements in the CNMSTYLE member are used to initialize the syslog
server. To grant permission to a remote host to send syslog messages to the NetView syslog server, use
the REGIP command; for more information, see the online help.
For more information about configuring these TCP/IP services, see IBM Z NetView Installation: Configuring
Additional Components. For more information about the REXEC, RSH, and IPLOG statements, see the IBM
Z NetView Administration Reference. For information about changing CNMSTYLE statements, see IBM Z
NetView Installation: Getting Started.
Table 6 on page 157 lists the discovery manager data that is collected by using the CNMEERSC command,
automation and sampling, and configuration and status commands.
Notes:
1. System includes the sysplex, the z/OS image, and the coupling facility.
2. For automation and sampling, interrelated data is collected to construct the data for the requested data
type. Only the requested data type is updated.
3. For commands, interrelated data is collected to construct the data for the requested data type. Only the
requested data type is displayed.
Note: This function no longer requires AON. The information about this function is included in both IBM Z
NetView IP Management and the IBM Z NetView User's Guide: Automated Operations Network.
Use the following rules for creating new entries in the SNMP group definition (FKXSNMP) file:
• The Group name must be from 1 to 15 characters and must start in column 1.
• The Group name cannot be duplicated.
• There must be at least one space between the Group Name, the GROUP, the Group type, and the base
MIB for Table type Groups.
• There can be up to three lines of abstract definition for a Group. The abstract lines can be up to 72
positions and must start with a question mark (?) in column 1.
• The Abstract lines for a Group must follow the GROUP statement for the group.
• Valid Group types are:
– LIST
– LIST+
– TABLE
– WALK
A LIST group type must include the EXACT MIB variable names to be collected.
A LIST+ group works almost the same as a LIST type Group, but enables the definition of variable data.
The LIST+ group enables you to specify a variable field to be appended to the list of MIB objects in the
group. This enables a single group definition to be used for various MIB object groups. For example, a
group can contain objects that relate to a specific interface number. If you use traditional LIST type
groups, you need multiple groups, one to define each interface. A LIST+ group can be defined to ask
prompt for an interface number, when selected, enabling only one group definition to be needed. LIST+
adds keywords that are used to set up the variable data. All of these keywords must start in column 1.
PANELINPUT
Defines this as a LIST+ group
PANELCONST
A user-customizable field that is displayed in the input panel and must be delineated with double
quotation marks (")
PANELVAR
An input field where the data is collected from the screen, for example:
Displays as:
__
VAR keywords in LIST and LIST+ groups indicate the starting of varbind lists. This helps in parsing in
UNIX. VAR must start in column 1.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS"
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE.
Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore,
this statement might not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically
made to the information herein; these changes will be incorporated in new editions of the publication.
IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in
any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of
the materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the
exchange of information between independently created programs and other programs (including this
one) and (ii) the mutual use of the information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Such information may be available, subject to appropriate terms and conditions, including in some cases
payment of a fee.
The licensed program described in this document and all licensed material available for it are provided by
IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement or any
equivalent agreement between us.
Information concerning non-IBM products was obtained from the suppliers of those products, their
published announcements or other publicly available sources. IBM has not tested those products and
cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM
products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of
those products.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs
in any form without payment to IBM, for the purposes of developing, using, marketing or distributing
application programs conforming to the application programming interface for the operating platform for
which the sample programs are written. These examples have not been thoroughly tested under all
conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these
programs. You may copy, modify, and distribute these sample programs in any form without payment to
IBM for the purposes of developing, using, marketing, or distributing application programs conforming to
IBM’s application programming interfaces.
Each copy or any portion of these sample programs or any derivative work, must include a copyright
notice as follows:
© (your company name) (year). Portions of this code are derived from IBM Corp. Sample Programs. ©
Copyright IBM Corp. _enter the year or years_. All rights reserved.
Programming Interfaces
This publication primarily documents information that is NOT intended to be used as Programming
Interfaces of IBM Z NetView. This publication also documents intended Programming Interfaces that
allow the customer to write programs to obtain the services of IBM Z NetView. This information is
identified where it occurs, either by an introductory statement to a chapter or section or by the following
marking:
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at http://www.ibm.com/legal/copytrade.shtml .
Adobe is a trademark of Adobe Systems Incorporated in the United States, and/or other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or
both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other product and service names might be trademarks of IBM or other companies.
Notices 163
164 IBM Z NetView: IP Management
Index
Index 165
commands (continued) DVIPA.Mast.Disc.Delay timer 45
TELNSTAT 22 DVIPALOG command 46
TESTPORT 117 DVIPCONN command 48
TN3270 120 DVIPDDCR command 48
TNPTSTAT 22 DVIPHLTH command 48
TRACERTE 106, 120 DVIPPLEX command 48
TRAP (SNMP) 123 DVIPSTAT autotask 46
VARY TCPIP DROP 91 DVIPSTAT command 48
VIPAROUT 48 DVIPTARG command 48
WALK (SNMP) 109
WINDOW 23, 49, 86
COMMON.IPPORTMON statements 117
E
Communications Server, z/OS Enterprise Extender technology 118
IP sockets API 127 environment variables, notation xvii
component tracing Extended SNMP Groups 112
displaying 84
scheduling 80
CONNSEC 86 F
conventions
FKXECSF command 93
typeface xvii
FKXSNMP 159
FMTPACKT command 61
D
data collectors G
discovery manager 22
GET command (SNMP) 108
DVIPA 48
GETTOPO command 98
TCP/IP connection 86
GROUP command (SNMP) 110
directory names, notation xvii
DIS command 118
distributed DVIPA H
statistics 46
workload balancing 46 high-performance routing (HPR) 118
Distributed DVIPA Connection Routing workspace HIPERSOC command 22
about 49 HiperSockets
distributed DVIPA server health information 48 information
Distributed DVIPA Server Health workspace command 22
about 50 sample 22
Distributed DVIPA Targets workspace HiperSockets Configuration and Status workspace
about 51 about 23
DSIIPLOG task 155 host views, IP 99, 103
DSIRHOST sample 155 hub views, IP 99, 103
DSIRSH task 155
DSIRXEXC task 155 I
DVIPA
connections 48 IBM Tivoli Network Manager
definition and status 48 view objects 95
distributed IDS (Intrusion Detection Services) 125
connection routing information 48 IFSTAT command 22
server health information 48 Intrusion Detection Services (IDS) 125
statistics 46, 48 IP
distributed targets 48 finding resources 97
events 45 navigating network views 98
rediscovery algorithm 46 IP addresses
sysplex distributors 48 CNMIPXL 145
updates 45 CNMIPXLATE 145
DVIPA Connections workspace conversion 145
about 52 IPXLATE 145
DVIPA Definition and Status workspace verification 145
about 53 IP networks
DVIPA Stack Summary workspace viewing 98
about 56 IP networks view, IP 98, 99
DVIPA Sysplex Distributors workspace IP packet tracing
about 54 displaying 66
DVIPA.Event.Delay timer 45 IP servers
R
J
rediscovery algorithm, DVIPA 46
JAVAACC command 155 REGIP command 155
RESTYLE command 17, 21, 45
L REXEC command 119
REXEC server 155
LIST command 16 REXEC statements 155
LIST+ group 159 RMTCMD command 20, 119
listener, hung 117 router views, IP 99, 103
LISTTRC command 75 RSH command 119
RSH server 155
RSH statements 155
M
manuals S
see publications xiii
MVSPING command 119 samples
CNMSAF2 127
CNMSALRT 124
N CNMSCAT2 127
NETSTAT command 117 CNMSDDCR 48
NetView Applications workspace CNMSDVIP 48
about 24 CNMSDVPC 48
NetView domains CNMSDVPH 48
information 22 CNMSDVST 46, 48
network views, navigating CNMSHIPR 22
IP 98 CNMSIFST 22
notation CNMSMSGT 123, 136
environment variables xvii CNMSMSIP 124, 142
path names xvii CNMSNVST 22
typeface xvii CNMSOSAP 22
NVSNMP command 107, 120 CNMSPLEX 48
NVSTAT command 22 CNMSSTAC 22
CNMSTARG 48
CNMSTCPC 86
O CNMSTNST 22
CNMSTPST 22
online publications
CNMSVPRT 48
accessing xv
Index 167
samples (continued) TCP/IP trace (continued)
DSIRHOST 155 component
used by Z NetView Enterprise Management Agent 22, displaying 84
48, 86 scheduling 80
security introduction 62
sockets 127 IP packet
SESS command 118 displaying 66
session packet data OSA packet
saving 72 displaying 79
SET command (SNMP) 109 TCPCONN command 85, 86, 89
SNA over IP 118 Telnet Server Configuration and Status workspace
Sniffer 66 about 27
SNMP BULKWALK command 110 Telnet server ports
SNMP command 107, 120 information 22
SNMP GET command 108 Telnet servers
SNMP GROUP command 110 information 22
SNMP group definition file 159 TELNSTAT command 22
SNMP SET command 109 TESTPORT command
SNMP TRAP command 123 critical port monitoring 117
SNMP traps, DVIPA 45 hung listener detection 117
SNMP WALK command 109 port monitoring 117
SOCKET command 120, 123, 127 Tivoli
sockets user groups xvi
Communications Server IP sockets API 127 Tivoli Software Information Center xv
SOCKET command 127 TN3270 command 120
TCP/IP applications 127 TNPTSTAT command 22
trace entries in NetView trace 127 trace data, IP
Stack Configuration and Status workspace saving 72, 73
about 26 session packet data 72
STACSTAT command 22 UDP session report 73
START command 16 TRACERTE command 106, 120
statements traces
COMMON.IPPORTMON 117 socket 127
IPLOG (syslog) 155 TRAP command (SNMP) 123
IPLOG statements 155 typeface conventions xvii
REXEC 155
RSH 155
TCP/IP services
U
syslog 155 UDP session report
STOP command 16, 128 saving 73
subnetwork views, IP 102 user group, NetView xvi
switch views, IP 99, 103 user groups
syslog server 155 NetView xvi
sysplex Tivoli xvi
view nodes 29 user-defined views, IP 98, 100
sysplex distributors, DVIPA 48
sysplex monitoring messages 45
V
T variables, notation for xvii
VARY TCPIIP DROP command 91
tasks view nodes, sysplex 29
DSIIPLOG 155 views, IP
DSIRSH 155 bridge 99, 103
DSIRXEXC 155 host 99, 103
TCP/IP services hub 99, 103
about 155 IP networks 98, 99
REXEC 155 IP subnetwork 99, 102
RSH 155 router 99, 103
TCP/IP stack interfaces switch 99, 103
information 22 user-defined 98, 100
TCP/IP stacks VIPA routes 48
information 22 VIPA Routes workspace
TCP/IP trace about 55
accessing 62
W
WALK command (SNMP) 109
WINDOW command 49, 86
WINDOWS command 23
workspaces
Distributed DVIPA Connection Routing
about 49
Distributed DVIPA Server Health
about 50
Distributed DVIPA Targets
about 51
DVIPA Connections
about 52
DVIPA Definition and Status
about 53
DVIPA Stack Summary
about 56
DVIPA Sysplex Distributors
about 54
HiperSockets Configuration and Status
about 23
NetView Applications
about 24
OSA Channels and Ports
about 25
Stack Configuration and Status
about 26
Telnet Server Configuration and Status
about 27
VIPA Routes
about 55
Z
zERT 86
Index 169
170 IBM Z NetView: IP Management
IBM®
SC27-2855-03