Because IP packets can contain sensitive information, authority to view the payload data must be granted by your external security system (CA ACF2 for z/OS, CA Top Secret for z/OS, or RACF). The user must have READ access to NETMSTR.PKTTRACE.region, where region is the region's ACB name, as specified in the PRI= parameter in the RUNSYSIN member.
To set up definitions to allow access to SmartTrace in your region with ACB NMTEST, issue the following commands:
TSS ADD(dept) IBMFAC(NETMSTR) TSS PERMIT(USER1) IBMFAC(NETMSTR.PKTTRACE.*) ACCESS(NONE)
To allow user USER1 to access SmartTrace data, issue the following command:
TSS PERMIT(USER1) IBMFAC(NETMSTR.PKTTRACE.NMTEST) ACCESS(CONTROL)
To set up definitions to allow access to SmartTrace in your region with ACB NMTEST, issue the following commands:
[ACF] SET RESOURCE(FAC) COMPILE * $KEY(NETMSTR.PKTTRACE.*) TYPE(FAC)
To allow user USER1 to access SmartTrace data, issue the following command:
$KEY(NETMSTR.PKTTRACE.NMTEST) TYPE(FAC) USER1(USER1) READ(ALLOW) STORE [END]
To set up definitions to allow access to SmartTrace in your region with ACB NMTEST, issue the following commands:
RDEFINE FACILITY NETMSTR.PKTTRACE.* UACC(NONE) RDEFINE FACILITY NETMSTR.PKTTRACE.NMTEST UACC(NONE) SETROPTS RACLIST(FACILITY) REFRESH
To allow user USER1 to access SmartTrace data, issue the following command:
PERMIT NETMSTR.PKTTRACE.NMTEST CLASS(FACILITY) ID(USER1) ACCESS(READ)
| Copyright © 2012 CA. All rights reserved. |
|