New in V6R1, IBM Systems Director Navigator for i is a web-based console that consolidates all of the Navigator for i functions available on the web. IBM Systems Director Navigator for i is the strategic tool for i5/OS management and will work in concert with IBM Systems Director products that enable heterogeneous and cross-system management.
Find out more details about IBM Systems Director Navigator for i here.
The Systems monitor window has been enhanced to include Subsystem information for jobs on the properties pane. We are able to collect, display and export secondary language information for products in the software inventory. Hardware inventory export now adds location code information. Compare and update for fixes now includes fix groups that either are missing for each target system or that are extra for each target system when compared to the model system.
Integrated File System
- Dynamic Mount Information has been added to Integrated File System. It shows the list of currently mounted file systems. You can view the name, the mount type, and the mounted directory of the file system. You can also unmount file systems at the same time or view the properties of a file system.
- Mounting a Network File System (NFS) is now available from the Navigator for i. It is no longer necessary to go to the Green Screen to mount the NFS.
- You can now select a folder and then collect, display and analyze attribute information from the folder and its contents, create filters, sort the information, or obtain a report of the objects that are consuming the most system storage space, for instance.
- You will be able to check out or check in all the contents of a folder and its subfolders contents with only a few clicks.
It now allows you to review the information and manage your i5/OS NetServer sessions over the IPv6 protocol.
- Multi-Instance Support
A new instances panel will be provided to list out the current set of directory server instances.
The LDAP configuration wizard will be updated to configure LDAP instances.
- On Demand Performance Center
- Customization of columns for analysis reports
- Save analysis reports to spreadsheet
- SQL Plan Cache Event Monitors
- Show active jobs that have run a specific SQL statement
- Show list of users that have run a specific SQL statement
- Visually Explain an SQL statement while it is running
- Reset last used date and statistics for indexes
- Show Indexes and MQTs for all tables in a schema
- Health Center
- Display environmental limits for jobs
- Display file activity categories
- Journals and journal receivers added to overview
- Package and procedure added to size limits
- Run SQL Statements
- Check statements for SQL portability
- Save script to source member on i5/OS
- Copy result window to spreadsheet
- Print the result window to a printer
- Launch directly from .sql IFS objects
- Provide GUI front-end to the WRKOBJLCK CL command to database objects
- Intrusion Detection
Using an intrusion detection policy, you can detect intrusions and extrusions to the TCP/IP network and create audit records. In V6R1, the intrusion detection system (IDS) function is enhanced as follows:
- The IDS functions separately from the Quality of Service (QoS) server. In this release using IDS no longer requires starting the Quality of Service (QoS) server.
- You no longer need to set the *ATNEVT option in the QAUDLVL system value to enable auditing for intrusions because that step is executed for you automatically when you start the IDS.
- The IDS detects several new intrusion types.
- You can set up the IDS to send real-time intrusion notifications as messages to a message queue or as an e-mail.
- The IDS detects extrusions for instances in which your system is used as the source of the attack.
- You can use the IDS to prevent intrusions and extrusions. For example, if your system is being attacked, you can set up variable dynamic throttling to limit or deny intrusions.
- The IDS supports IPv6 address.
- You can enable or disable Internet Control Message Protocol (ICMP); ICMPv6 redirects message settings.
- The IDS monitors for intrusions during IPL as well as when the system is active.
- Cryptographic Services
Cryptographic services key management for the i5/O