Navigator for i

Frequently asked questions

Find answers to questions heard most frequently from our customers regarding Navigator for i. While not an exhaustive list, it does provide many solutions to common problems.

Q: Where can I find information about Navigator for i service packs?

A: For more information regarding service packs please go to Windows Operating Systems on the System i Access for Windows.

Q: How do I install Management Central?

A: Management Central is automatically installed as a part of Navigator for i. However, to get the most out of Management Central you must select and install the following Navigator for i components:

Q: Can I work with CUM tapes/packages using Management Central?

A: No.

Q: Can I use Management Central to download/order PTFs?

A: No.

Q: Is the PTF Alert function integrated into Management Central?

A: No.

Q: Does the compare and update function show me only the fixes that are missing or also the additional fixes?

A: Both missing and extra fixes can be viewed on the compare results dialog. If you choose to update your target systems, only missing fixes will be sent and installed. Extra fixes will not be removed from target systems.

Q: After I install new PTFs, why don't I see them in PTF inventory?

A: You must recollect (fixes) inventory data to refresh the Management Central inventory data repository.

Q: Can I use Management Central to create my own products or PTFs?

A: You can use Management Central to create your own products, as well as PTFs to your own products. For more information see Package and send your own software products using Navigator for i and Generate fixes for installed products in the Information Center.

Q: Can I use Management Central to create my own CUM tape/CD-ROM?

A: No.

Q: Can I install MRI PTFs for National Language Support (NLS) using Management Central?

A: No, MRI PTFs cannot be installed through the Management Central interface. Only via "green screen" can MRI PTFs be installed on a system.

Q: How can I improve the performance of Navigator for i?

A: There are a number of things you can do to improve the performance of Navigator for i. For more details please see Navigator for i Performance Tips & Techniques.

Q: When I select "Convert to PDF" on a printer output file, and try to save the PDF in the IFS, Navigator for i appears to do something but I can't find the PDF file anywhere. Where my PDF file it go?

A: The PDF will cannot be created in the IFS path if "QSPLJOB" does not have the correct authority to the path. Here is what is needed:

Q: What environment (user profile, job description, subsystem) are the remote commands run under?

A: Commands will be run under the owner's user profile. The job description used is QSYS/QYPSJOBD with some of the job attributes overridden based on options specified in the command definition. The subsystem is QSYSWRK.

Q: What user authority is needed to run a command?

A: Since the command will be run under the owner's user profile (see above), the user must have authority to the command on the system it is being run on.

Q: Does Management Central support parameter substitution variables in remote commands?

A: No.

Q: Why did you split Jobs into Active Jobs and Server Jobs lists?

A: The list of jobs isn't split, all server jobs appear in both the Active Jobs folder and the Server Jobs folder. We provided the Server Jobs folder as a convenience—a quick way to see which server jobs are running and the user each server job is working for. In addition, the default columns have been optimized to show the most meaningful information for server jobs.

Q: If Basic Operations is for end users, why can I go into "Include" and select to see jobs owned by other users? Isn't this a security hole?

A: While intended for use by users that need to see only their jobs, messages, and printer output, we provided this function so operators and administrators can access those objects for other users. Rest assured, Navigator for i doesn't permit you do anything you can't do on the green screen. The only way to be sure that users cannot access objects they shouldn't is to adhere to i5/OS security, including object level security.

Q: Using Management Central "Systems with Partitions", are there restrictions for scheduling an IOP move.

A: Yes. A scheduled IOP move is not valid after the Primary partition has re-IPLed. Why does this restriction exist? The IOP LPAR moves use an LPARSRID as a key to uniquely identify the IOP which the customer wants to move. This LPARSRID is only guaranteed to stay the same for a given IPL of the primary partition. Thus, after the primary partition is re-IPLed, the LPARSRID which is contained in the scheduled IOP move may be invalid. This is specific to the implementation of the LPAR IOP scheduling function and does not apply to processing/interactive/memory moves.

Q: Can I schedule resource moves between partitions?

A: Yes. See Scheduling LPAR Resource Moves on this website.

Q: I am using V5R3 and am connecting to a V5R2 System i system over SSL. I noticed that a few functions that were available from the V5R2 client are no longer available from the V5R3 client, and that when I "View -> Function Availability", these are flagged as "Not Available over Secure Sockets Layer". Examples include Messages, Printer Output, and Jobs, all in Basic Operations. I don't want to have to choose between the higher security of using SSL and the availability of these functions. Will they become available over SSL in future?

A: V5R3 service pack SI16496, released in December 2004, fixes this problem. You can also refer to Service Packs at the System i Access site for the latest System i Access service packs (which include Navigator for i).

Q: I'm getting an SSL error in the Management Central server's job log. What's happening?

A: It's likely that SSL has been turned on for Management Central, but the network has not been properly configured to use SSL. For V4R5 or earlier releases, refer to the Management Central Redbook for details on configuring SSL in your network. For V5R1, look at the following question.

Q: I would like to use Management Central with a secure SSL connection. How do I do that?

A: Detailed descriptions have been added to the System i and i5/OS Information Center about setting up Management Central to use SSL specific to your release. Please see Scenario: Secure all connections to your Management Central with SSL in the Information Center.

Q: Can I change the owner of a Management Central schedule task using the WRKJOBSCDE or WRKJOBJS commands (if AJS is installed)?

A: No. If you change the owner of a Management Central scheduled task with either of these commands Management Central won't be able to locate the task when its scheduled to run, resulting in an error message. This is because the owner is part of the database key of the task in the Management Central database.

Q: What is the IBM Advanced Job Scheduler?

A: Advanced Job Scheduler in the Working With Management Central topic of the System i and i5/OS Information Center.

Q: Does Management Central show all the scheduled entries from the System i?

A: No, only those scheduled entries created by Management Central will be shown in the Scheduled Tasks container. Note that Management Central job schedule entries will appear as job "Qnnnn", where nnnn is a hex number, on the "Work with Job Schedule Entries" display on a green screen.

Q: Can I schedule a Management Central task if I sign in as user QSECOFR?

A: We do not recommend signing on as QSECOFR to run Management Central function, and you will probably run into problems trying to schedule a task as QSECOFR. Copy the QSECOFR profile and use the new user profile to run commands or use another user profile with *ALLOBJ and *IOSYSCFG special authorities.

Q: How do I administer users with integrated Windows servers to allow Enterprise Identity Mapping (EIM) and single sign-on support?

A: In V5R3 user enrollment support is enhanced with EIM to allow easier setup for Windows single sign-on and to allow enrolled i5/OS user profiles to be different than Windows users profiles. In addition, enrolled users can now manage their Windows passwords in Windows. This provides greater security by reducing the number of passwords when supporting a single sign-on environment. For more information see Changing the LCLPWDMGT user profile attribute and the Enterprise Identity Mapping (EIM) articles in the Information Center. Cumulative service pack SI15176 (5722-XE1 for V5R3M0) adds the local password management (LCLPWDMGT) function to the System i Navigator Users and Groups properties. See the Navigator for i and Management Central knowledge base articles for documentation on changing the LCLPWDMGT user profile attribute from Navigator for i or Management Central. For detailed service pack information and downloads visit System i Access Service Packs.

Q: Can I copy the output results from SQL scripts to the clipboard?

A: Yes. To copy the results select the desired cells from the output pane of the Run SQL Scripts window. Then press the "Ctrl+C" keyboard shorcut to copy your selection to the clipboard.

Q: Why do I need "Job control" system privilege when using Visual Explain? Also, why does it try to start an SQL performance monitor?

A: Visual Explain needs to start an SQL performance monitor because the output of the SQL performance monitor is what is used to draw the picture. As a result, "Job control" is needed in order to start an SQL performance monitor.

Q: I want to edit text files in IFS, but the "Edit" menu option is disabled. How do I enable the edit tool in IFS?

A: You can enable the edit tool to work with specific file types (the default setting), or with all file types. These settings will apply to all users of the System i system. Note: the File Systems edit tool emulates the functionality of Notepad, opening and editing all files as text files, just as Notepad does.Enabling the edit tool for specific file types:

  1. In Navigator for i select which system you want to work with from the My Connections folder.
  2. Select File Systems -> Integrated File Systems.
  3. Select Properties from the File menu. The Properties dialog will appear.
  4. Enter a file extension (".txt" for example) into the "File Extension" field, then click "Add".
  5. Click "OK" to save your changes. The Edit menu should now work for that file type.

Enabling the edit tool for all file types:

  1. In Navigator for i select which system you want to work with from the My Connections folder.
  2. Select File Systems -> Integrated File Systems.
  3. Select Properties from the File menu. The Properties dialog will appear.
  4. Under "Enable edit menu option for" select "All files".

You can also enable the edit tool individually, on each user's PC.

Q: If I share a monitor or definitions I've created and someone else uses it, what profile does it run under?

A: Job, File, and Message monitors will always run under the owner of the monitor. If the monitor is shared and another user starts it, the monitor job as well as any commands or programs called by the monitor when it triggers or resets will run under the owner of the monitor. Definitions are different, they launch separate tasks to perform their defined function (for example, send a file, create a user, send and install a product). The tasks run under the user that activated the definition, not the owner of the definition.

Q: I see system groups with a number for the name, and owned by RIPS*******. What are they used for and can I delete them?

A: The reason you see them is because you are using the Management Central Application Administration capability, which enables a user to view system groups (and other Management Central objects) that are not shared. These are unique System Groups that are created when Inventory Collection is run to "Collect and Send data to IBM". These special system groups owned by RIPS******* are deleted when the associated Inventory Collection task is deleted. These special system groups were also created and deleted in prior releases but users never saw them. When using Management Central Application Administration, these special temporary system groups may be seen by a user.

Q: Why does the first task after a GO SAVE or ENDTCP run on an endpoint result in the task failing with a connection failure?

A: GO SAVE, ENDTCP, ENDSBS commands can all have the same affect on the Management Central server in that the Management Central server will not be able to notify the central system that the socket is going away. This results from TCP/IP ending and not notifying applications it is going away. When this occurs and the Management Central servers are back and running on the endpoint, the next task to that system will fail because the central system still believes it has a good connection to the endpoint. Before any action such as the three previous commands are run that result in TCP/IP being ended first, a user should run the command ENDTCPSVR SERVER(*MGTC). This will result in the central system knowing the socket is no longer usable, and a new connection will be established when the next task is run to the endpoint.

Q: What happens if an ENDTCP command is done prior to ending Management Central?

A: Help text for the ENDTCP command says: "It does not notify an application that is actively using a TCP/IP connection that TCP/IP processing will be ended". What this means is that the Management Central server on that system will not be able to clean up socket connections it has to other systems or partitions. A Management Central server on another system or partition will still think it has a good connection to the system or partition where the ENDTCP was done. The next task that attempts to use one of these now bad socket connections will result in a "Failed-Connection" status. Management Central will then clean up of the bad socket connection and the next task will establish a new connection. Prior to the use of the ENDTCP command, an ENDTCPSVR SERVER(*ALL) or ENDTCPSVR SERVER(*MGTC) command should be done.

Q: My Management Central Java functions such as Job Monitors, Message Monitors, File Monitors and System Values, show incorrect times.

A: These Java functions are dependent upon the LOCALE being set properly. See Appendix D "Setting the Time Values for Management Central Functions" of the " Managing IBM i with V5R1 Operations Navigator Volume 1: Overview and More" Redbook. Information about Locale can be found in the System i Systems Management.

Q: Is there a Redbook for Management Central?

A: Yes. See the Resources page.

Q: Are there i5/OS green screen interfaces to Management Central function?

A: No.

Q: When I am signed on as QSECOFR, I have problems scheduling tasks and working with Packages and Products. What can I do?

A: We do not recommend signing on as QSECOFR to run Management Central function. Copy the QSECOFR profile and use the new user profile to run commands or use another user profile with *ALLOBJ and *IOSYSCFG special authorities.

Q: Is there an easy way to prevent users from adding connections to Navigator for i once its installed on their PC?

A: Yes, you can remove a user's option to add connections, and even limit the systems defined in their environment, through Application Administration Central Settings. For example, in the following illustration, User1 has only System1 defined in their environment and is not allowed to add additional connections, or environments.

Application Administration dialog window.Application Administration dialog window.

In order for the Central Settings to work effectively, the Navigator for i user must discover these Central Settings in one of the following ways:

  1. Manually selecting the current administration server. The administrator must also manually configure each installation of Navigator for i with the appropriate administration system for that user.
  2. Installing from an "System i Access for Windows" image with a pre-defined current administration system.
  3. Using Navigator for i to sign on to an Administration system that can administer the current user (as long as the current end user does not already have a current administration system defined).

Q: If I don't want everyone in my shop using Management Central function, how can I control that?

A: The easiest thing to do would be to not install it on the client, but if you want a select few to have access, there are other options. Use Application Administration (menu item on the Management Central folder). You can remove entire function or grant/refuse access for specific users and groups. It's important to note the user profile that a particular user performs Management Central function under needs to have the proper authority to perform those actions on the System i. For example, even if someone can get at Fixes function in Operations Navigator, Fixes actions will fail if they don't have the proper authority in the System i user profile.

Q: I have the Management Central property checked to "Automatically restart monitors on failed systems", but they don't automatically restart, why not?

A: This enhancement was added in V5R2 to automatically restart monitors after an endpoint connection failure, or when the central system server has been stopped and restarted. If the overall status of a monitor is "Failed", it will not be restarted. This enhancement was added in V5R2 to automatically restart monitors after an endpoint connection failure, or when the central system server has been stopped and restarted. If the overall status of a monitor is "Failed", it will not be restarted. In the case where the Management Central server is stopped and restarted, for monitors that were running with failed endpoints an attempt will be made to restart the monitor and all its failed endpoints. In the case where the Management Central server remains running, endpoints on a running monitor will only be restarted if just a subset of the endpoints have failed, for example "Failed on 1 of 3", and the detail status of the failed endpoints indicates a connection failure. If the monitor has a single endpoint, the monitor will only be automatically restarted if it was running when the Management Central server was stopped and restared. For this single endpoint example, if there is a connection failure or monitor failure on the single endpoint, the monitor will not be restarted because the overall status is "Failed" due to the single endpoint failure.

Q: What's the difference between "average" and "maximum" metrics in the system monitors?

A: In general the difference between an average metric and a maximum metric is that the average metric takes the values for each of the entities in the Level 2 graph (the top entries contributing to that metric value) and adds them up and divides by the number of entities and produces an average value of an entity to graph, while the maximum metric takes the entity with the largest value and graphs that value. Note: Every utilization value in the level 2 and level 1 graph is really an average over the sampling period. This is because for every metric being collected, a value will be given that is the average value over the given interval (like number of CPU cycle seconds used) and it is divided by the time interval represented to give an average utilization per second.

Q: Can the Events generated by the Monitors notify administrators using an instant message?

A: Using Management Central monitors and the Sametime Event Monitor for System i, a free download from alphaWorks. System, job, server, and message monitor events are processed by the the Sametime Event Monitor and sent to administrators as an instant message through Sametime.

Q: Why do I see gaps in Graph History data?

A: Normally, this is because the data has not been collected during that time. There are two ways data is collected for use by Graph History:

  1. System and Job Monitors,
  2. Collection Services

So, if you see gaps in your Graph History results, you may need to investigate the following:

  1. Were the monitors stopped?
  2. Was Collection Services stopped?
  3. Is the QYPSPFRCOL job running?

Q: Why does the SNDDST command fail when a System Monitor runs a SNDDST command based upon a trigger or reset?

A: The SNDDST command is not safe for a multi-threaded job like the Management Central server. The SNDDST command calls QOSINIT which is part of the QDLS file system. The QDLS file system is not thread safe. Unpredictable results may occur. Thus, the trigger or reset command should be changed to do a Submit Job (SBMJOB) to invoke the SNDDST command. This same solution would hold true for any non-thread safe command being used on a System Monitor trigger or reset command.

Q: I need more information about the OS400 command parameter substitution capabilities for Management Central monitors, can you help me?

A: Download the Monitor Management Central Monitors: OS400 Command Substitution Parameters (PDF, 122KB) PDF document for more details.

Q: What is the overhead on the system when collecting performance data?

A: We don't have any quantitative numbers, but our experience has been there is minimal impact on the system. It may also depend on what else is running on the system and how often data is being collected.

Q: Have any performance measurements been done to identify the load on the network when collecting the data or moving the data over the network?

A: No.

Q: How much data is actually sent back to the client?

A: The minimum needed. The more specific, detailed data is only sent to the client if it is requested.

Q: Where is the data collected and stored on the System i?

A: Monitor data is collected and stored on the endpoint system. The data is currently stored in *MGTCOL objects that reside in library QUSRSYS.

Q: Can I view PM/400 (Performance Management/400) or historical data?

A: Yes, with the graph history function. For more information go to Graph history in the Information Center, or see Chapter 3: "Graph History" of the " Managing IBM i with V5R1 Operations Navigator Volume 5: Performance Management" Redbook.

Q: How do Management Central monitors relate to PM/400?

A: Please see Applications for performance management in the Information Center, or see the " Managing IBM i with V5R1 Operations Navigator Volume 5: Performance Management" Redbook.

Q: What are some other products that work with System i performance data?

A: Performance Tools, Performance Management, IBM's Workload Estimator (integrated with PM), and BMC ProactiveNet Performance Management product for distributed systems.

Q: What user profile are threshold commands run under and how is it determined where the threshold command is run from (i.e., library list, etc.)?

A: Threshold commands will be run under the monitor's owner's user profile. The threshold command is submitted either as a job or a thread from the Management Central server, under the owners profile, using the server's environment. This means the server's job description will be used. That job description will have an initial library list value, most likely defined by a system value, which will be used to find the specified threshold command.

Q: When a threshold gets triggered/reset, does my PC client need to be up and running to run the host command?

A: No. You can quit Navigator for i or power down your PC and the host command will still be run on the System i if the threshold trigger/reset condition is met.

Q: Is there a limit on the number of endpoint systems that a monitor can be started on?

A: There is no limit but you do encounter usability issues when displaying the graph. The more systems in the graph, the more difficult it is to view.

Q: Can I monitor a job, a subsystem, etc.?

A: Yes. In V5R1, Job monitors were added (as well as Message monitors). Using a job monitor, you can monitor any number of jobs using a variety of criteria,, as well as monitor all jobs for any selected server. For example, if you wanted to monitor your web server, you could select "HTTP Server", and all the jobs running under that server would be monitored. There are a number of metrics to choose from as well. For more information, go to Management Central Functions in the New for V5R1 section.

Q: Where can I find information on what a specific metric is?

A: For more information go to Selecting metrics for monitors in the Information Center.

Q: Why are the time scales on the monitor graph off?

A: In V5R3 the only reason the time scales should be off is an incorrect time zone setting. To check the time zone setting in Navigator for i go to "Configuration and Service" > "Time Management" for the system showing the incorrect time scales. Open the "Date and Time" properties and select the "Time" tab to see the surrent time zone setting. If you change the value, you must restart the Management Central servers and the Collection Services job QYPSPFRCOL to pick up the change. If the time zone settings are correct but you still experience time scale problems ensure that the time zone and time zone offset values are set correctly across all the monitored systems.

Q: Are their any restrictions when setting a message monitor to permanently remove message from a message queue?

A: Yes. If a message queue displays in break mode (such as QSYSOPR), message monitors to that queue will fail when they are set to permanently remove monitored messages from the message queue. Why? Because, when the display is in break mode it gets an exclusive lock on the message queue. The message monitor will not also be able to get a lock, which it needs to remove the message. If the delivery mode of the message queue is changed to *HOLD, then the above restriction is not a problem. Or, if the message monitor is not set to remove messages from the message queue, the display of the message queue in break mode is not a problem.

Q: Why doesn't the &FROMJOB parameter work when specifying a trigger or reset command?

A: Help for the parameters is inaccurate. The parameter should be &FRMJOBNAME. This allows you to run a command and have Management Central replace the parameter with the real job name that logged the message that was found.

Q: I want to monitor a file in QSYS.LIB. Are there any special considerations I need to know?

A: Yes. See the following table to see how certain metrics work with QSYS physical files through IFS.

Special Considerations for Monitoring QSYS.LIB Files

Metric Details
Text File monitors obtain a shared read lock on the file being monitored. So, programs which obtain a shared update lock to change the file will not interfere with the file monitor. Other users, programs and commands (such as WRKOBJPDM or STRSEU) that obtain an exclusive lock will interfere with the file monitor.
Size File monitors use IFS to access and monitor files which treats QSYS physical files as directories, only the physical file members are actually treated as "files". If you want to monitor the size of the entire contents of the QSYS physical file you would have to monitor all of the members it contains, typically a single file member. For example, to monitor the size of the database file QAYPSTSK (which is a Management Central database in QUSRSYS) enter "/qsys.lib/qusrsys.lib/qaypstsk.file/qaypstsk.mbr" under Files To Monitor. You can also view the size of the database file from within the Navigator for i File System.

Q: What rules apply to a file monitor against QHST files.

A: When a file monitor is created and the box is checked for System Logs, this monitor will examine QHST, but for QHST the only metric that should be specified is text. The metrics of size and file status are not considered valid. The message id is considered part of the QHST message text and can be specified in the trigger text field.

Q: Why is the "Delete..." context menu item on a system group grayed-out?

Q: Why can't I change the properties on a system group?

A: You are not the owner of the system group and do not have "Full" access to it. In addition, a third party plug-in system group cannot be deleted.

Q: Why is the "Remove..." context menu item on an endpoint system in a system group grayed-out?

A: There are two reasons for this:

  1. You are not the owner of the system group and do not have "Full" access to it. In addition, an endpoint system cannot be removed from a third party plug-in system group.
  2. You are trying to remove the last endpoint systems from the system group.

Q: Why doesn't the status of Collection Services change to "Stopped"' when I successfully complete a "Stop Performance Collection" command?

A: The status of Collection Services will change to "System Collection Stopped. Collecting for Applications Only." when another application is using performance API's to access performance data. This is the case for system montiors as well as other applications.

Q: What is the difference between the status messages "Stopped." and "System Collection Stopped. Collecting for Applications Only."?

A: When Collection Services is "Stopped.", no performance data is being collected on the given system. When the status reads "System Collection Stopped. Collecting for Applications Only.", Collection Services is not running a collection profile, but it is collecting performance data for another application, such as Navigator for i's system monitors, using the performance API's.

Q: Is there a limit or restriction on the amount of Inventory data I can export to a file on my PC?

A: Yes. The requested data to be exported is built in a string array on the client prior to writing the data to a file on the PC. The amount of memory used is dependent on the type of data selected, number of systems selected and the format of the output file. An HTML output format requires considerable more memory per system on the client for the string array than a comma separated value (CSV) or a text format. If the string array exceeds the available memory, the task will fail.

Q: What authorization is required to collect User and Group inventory information on an endpoint system?

A: The user profile must specify *ALLOBJ and *SECADM. This must be specified in the user profile and not in a group profile specified for the user. The group profile is not checked.

Q: Since inventory data is stored in database files, how can I be sure that the information I'm working with is current?

A: Typically, inventory data seldom changes. To ensure it stays relatively current we recommended scheduling a weekly inventory collection task. You can also collect inventory data when you know the inventory has changed.

Q: I use the file and folder packaging function in Navigator for i, and I found some large objects in QRPLOBJ which never get cleaned up. Why is that?

A: When we send files and folders using the packaging function, we place the temporary files in QRPLOBJ because that library is supposed to be cleaned up by the utility that runs on the system. However, if that cleanup utility is not running, these temporary files would stay around. We recommend you run the cleanup utility program on your system.

Q: What types of objects can I distribute?

A: QSYS objects, QSYS libraries, IFS directories and IFS files.

Q: Can I distribute all of QSYS?

A: No.

Q: Can I distribute the latest i5/OS release, or migrate to a later release using Management Central?

A: No. LPPs and Base i5/OS Options can be distributed and installed, but not Base i5/OS (QSYS and SLIC).

Q: Can I mix QSYS and IFS files in a single package?

A: No. Management Central uses save/restore function, therefore is bound by the restrictions it imposes regarding mixing different file systems. You can create a package containing QSYS files and another one containing IFS files, then send each package to an endpoint system, but you cannot combine them into a single package. A workaround would be to place your IFS objects into a save file, then include the save file with your QSYS objects. You would then have to manually restore the save file to IFS or use a post command.

Q: How is the data being moved to each system in the network?

A: A TCP/IP sockets application is similar to FTP.

Q: Once I have created a snapshot for the package, can I refresh the snapshot or do I have to create a new package?

A: You can refresh the snapshot by right-clicking on the package definition and selecting 'Update Snapshot' from the context menu. Note that you must resend the package after the snapshot has been refreshed to the systems that you want the updates on.

Q: What user profile, job description, and subsystem does the post-distribution command run under?

A: The post distribution command runs under the user profile of the person who started the distribution (the person signed on to Navigator for i). The job description used is QSYS/QYPSJOBD. The subsystem is QSYSWRK.

Q: What user profile are the save/restores being done under?

A: User profile of the user signed on to Navigator for i.

Q: Can I distribute CUM tapes/packages using Management Central?

A: No.

Q: Can I distribute any object or are special authorities required?

A: If it is an IFS file that you have created, then you do not need any additional authorities. If it is a QSYS object that you created, then you will need *RWX authority to library QRPLOBJ on the source system. If someone else created it, then you may need additional authorities.

Q: Do I have to be authorized to SAVOBJ/RSTOBJ to use the Management Central package distribution function?

A: Authority to RSTOBJ is only required when you are sending all the objects from a library.

Q: Why don't I see any of my monitors in Navigator for i for Wireless?

Q: Can I add monitors to my list using Navigator for i for Wireless?

A: Only active monitors are displayed. Make sure you start any monitor you want displayed on your wireless device. Currently, the only way to start monitors is from Management Central in Navigator for i.

Q: Can I add systems to my list using Navigator for i for Wireless?

A: Yes. Each user has a customized list of systems that Navigator for i for Wireless will monitor. On the phone, go to the system list, select Menu, then Add system or Remove system. On a PDA browser, select the Settings button, then add or remove systems as needed.

Q: What releases does Navigator for i for Wireless support?

A: Your central system must be at V4R5 or later. Your endpoints can be running any release where Management Central runs.

Q: Is it really true that I only need to install Navigator for i for Wireless on one of my systems?

A: Yes, Navigator for i for Wireless only needs to be installed on systems that will be used as the central system for Management Central. Endpoint systems will be monitored through that central system, so they do not require any additional installation. Minimally, this means that you may only need to install on one system.

Q: I have recently used Navigator for i for Wireless successfully, but now it is not responding. What is the problem?

A: More than likely the problem is either caused by a weak signal or a low battery. A weak signal can be caused by the location you are using your device. There are parts of some buildings where signals do not reach very well. There are geographic locations where wireless service is not available. Low battery conditions seem to occur most often in the wireless modems for PDAs. A low battery in the PDA itself or in your Internet phone may also be causing this problem.

Q: Things aren't working and I'm not sure if its related to my wireless device or to my web server setup. What can I do to determine where the problem actually is?

A: Try accessing Navigator for i for Wireless through a web browser running on a PC or other workstation. Use the exact same URL that you are using from your device. If Navigator for i for Wireless does not work from the workstation web browser, then your problem has nothing to do with your wireless device. Make sure that your web application server is up and running. Also, check that you've performed all of the configuration Items detailed in the Navigator for i for Wireless Users Guide and make sure that the URL you are using is correct. If Navigator for i for Wireless works from your workstation web browser, then the problem is related to your wireless device. Check if you can access any other Internet sites. If you cannot, there is problem with your wireless device or service. If you have never successfully accessed an Internet site from your wireless device, contact your wireless service provider. If you have connected to the Internet before, the problem could be related to a low battery, a weak signal or a temporary wireless service outage.

Q: Why do I get an Error 500 when I try and run the servlet under WebSphere?

A: This results from WebSphere not being able to find the McYpvPervasive.class servlet. Remember when you enter the URL, it is case sensitive. If the servlet name was specified correctly, then the WebSphere web application server classpath does not have the correct path specified where this servlet is located.

Q: My brand of phone is not listed in your Users Guide. Will it work?

A: If you already have an Internet phone, just give it a try and see if it works with Navigator for i for Wireless. If it works, let us know and we will add it to the users guide. If it doesn't work or doesn't work perfectly, also let us know. Compatibility on a wide range of devices is our goal.

Q: I don't have a wireless modem, but my PDA says it has wireless connectivity built-in. Do I need a separate modem?

A: Some PDAs have built-in modems instead of a separate device that snaps on the back. The term "modem" might not be used when they describe their product, but that's effectively what is built-in. A built-in modem meets the need for a wireless modem.

Q: Can I use a wired modem with my PDA instead of a wireless modem?

A: Yes, a wired modem can be used. You need to use the modem to dial an Internet service provider or dial into your corporate intranet. The ability to dial into an intranet is an advantage that a wired modem has over a wireless one.

Q: Can I work with Navigator for i tasks in a Web browser?

Q: I hear I can work with a subset of Navigator for i function from a Web browser. How do I do that?

A: Running core systems management tasks in areas such as Basic Operations, Work Management, Configuration and service, and Database from a Web browser is easy. For more information about how to setup, secure, and run your Navigator for i tasks from the Web see Navigator for i tasks on the Web topic in the System i and i5/OS Information Center.

Q: What can I do if I get a ''Password not correct for user profile *SST'' message while trying to use the disk management tasks?

A: You need to set the system DST/SST password level 2 and the service tools user ID and password must match the i5/OS user profile and password in uppercase, for example if the user profile and password combination is BOB and my1pass, then the DST user ID and password combination must be BOB and MY1PASS.

Contact an IBM Sales Specialist

Browse Power Systems

Next generation applications for big data and analytics and cognitive computing are providing unprecedented insights into opportunities, threats and efficiencies. IBM Power Systems is at the forefront of delivering solutions to gain faster insights from analyzing both structured information and unstructured big data. With the secure, flexible and open platform of IBM Power Systems plus solutions and software, organizations can outpace their competitors by delivering faster services, providing differentiated offerings and turning operational cost into investment opportunity.

To draw insights and make better decisions, businesses rely on the secure, flexible and open platform of IBM Power Systems. Built with the first processor designed for big data workloads, the design of Power Systems combines the computing power, memory bandwidth and I/O in ways that are easier to consume and manage, building on strong resiliency, availability and security.

IBM Power Systems deliver flexibility and choice of operating systems to enable your business to support the next generation applications for big data and analytics and cognitive computing that are transforming how organizations work today. Whether running 1, 2, or all 3 - coupled with PowerVM, they maximize the benefit of Power Systems in your business.

Transform your business with Systems Software that enables virtualization, high availability, flexibility, security and compliance on Power Systems™. IBM’s integrated approach to developing Systems and Systems Software together delivers optimized results with Power Systems.

As an open innovation platform, Power Systems is optimized for big data and analytics performance and to deliver scale-out economics and security for the cloud. IBM and IBM Business Partner solutions exploit key capabilities in IBM Power Systems.

Over the last five years thousands of clients have migrated to IBM Power Systems for choice and flexibility. Learn how Power Systems has helped them revolutionise the way IT is developed and delivered, optimise for big data and analytics, and support private, public and hybrid offerings for scale-out or scale-up implementations all while improving business performance, reducing risk, and establishing a platform for growth.