New Features in the Incremental Release
New features prior to the 12.2 GA release
The following updates were made to
CA NetMaster NM for TCP/IPprior to the 12.2 GA release, and are broken down according to the increments in which they were originally released. The NetMaster suite of products no longer follows an incremental release cycle. It now utilizes a continuous delivery model, which is detailed in the Transition to Continuous Delivery topic in the Release Notes section of this documentation.
Tip:Use this link to view the PTF numbers for each new feature in this article. The PTFs in this link are updated programmatically, so you always have access to the current New Feature PTFs.
Updates Post Increment 3 and Pre-GA
Standardize F12 as Retrieve in OCS and COMMAND ENTRY
OCS (Operator Console Services) and Command Entry have been updated to use F12 as a Retrieve Key to bring them into line with ISPF, etc.
This enhancement is supplied via PTF SO01868.
VSAM Update Tracking
$$SYSPRO has been updated to provide VSAM maintenance checking. $$SYSPRO VSAM verifies that VSAM files have been updated by the NMVIP job as recommended in the PTF HOLDDATA.
This enhancement is supplied via PTF SO04199.
SmartTrace Enhancements for OSAENTA
SmartTrace has been enhanced to trace and view Open System Adapter (OSA) Ethernet level frames via the OSA-Express network traffic analyzer (OSAENTA) function. SmartTrace OSAENTA definitions support tracing of Ethernet types IPv4, IPv6, ARP, and SNA.
ADD’ing of OSAENTA Trace definitions is currently only supported on the 3270 UI.
The SELFTEST function $$SYSPRO NMIPDIAG has also been updated to report on TCPIP stack configuration settings.
The following prerequisites need to be met:
- The TCPIP stack PROFILE specification ‘NETMONITOR NTATRCSERVICE’ needs to be set. This will display as ‘NtaSrv: YES’ in a NETSTAT CONFIG display.
- The user ID assigned to the NETMASTER SSI (NMSSI) must have the following privileges:
- If a profile for the resource is defined, the user ID must have READ access to the SERVAUTH class resource named ‘EZB.NETMGMT.sysname.tcpname.SYSTCPOT’.
- If a profile for the resource is not defined, the user ID must be defined as a superuser.
In a multilevel secure environment, a profile for the resource must be defined.
For further details, refer to the Prepare IBM Communications Server (TCP/IP and FTM Only) topic in the CA NetMaster Shared Content Library 12.2 documentation.
The NETMASTER SSI region issues VARY TCPIP,stackname,OSAENTA commands when traces are activated and inactivated. Authorization was previously given for VARY TCPIP commands at initial product Install/Setup for the Packet Analyzer.
This enhancement is supplied via PTFs SO04418, SO04419, and SO04420.
IEESYSAS-started Procedure Replaced by UNIX System Services Spawn
PTFs SO05667 and SO05668 update
CA NetMaster NM for TCP/IPrelease 12.2 to replace the use of a IEESYSAS-started task procedure with a UNIX system services spawn. The resulting OMVS address space inherits the user environment of the NetMaster region, so no additional security definitions are required beyond what is currently documented in Define UNIX System Service (USS) Authorization in the CA NetMaster Shared Content Library.
Previously, in a scenario where the NetMaster region is called NETMA, an IEESYSAS-started task procedure would have run as IEESYSAS.NETMAn. With the new PTF applied, an OMVS task called NETMAn is spawned instead.
SELFTEST UNIXBSYS has also been updated to improve the reporting of problems with file NM129, which is used as a NetMaster USS support function.
Increased Maximum Smart Trace Size
PTFs SO06414 and SO06415 increase the SOLVE SSI parameter PAMMTTSIZE (Maximum Smart Trace size) from 99999 to 250000. The default value remains 20000. The default value can be changed by coding the PAMMTTSIZE parameter in the SSISYSIN member.
The Trace Limit field on 3270 trace definitions has been updated to allow a maximum value of 250000. WEB defintions have not been updated.
For information on the impact of increasing PAMMTTSIZE, see the 3270 Trace Limit online help.
FIPS 140 Compliance Indication
PTF SO06145 adds support for FIPS 140 compliance indication on the SD display of a connection, the /SECURE.A (AT-TLS Summary) list, and in the ATTLS section of the drilldown connection list.
IP History displays were updated to include FIPS 140 indication via zERT-related PTFs SO00328, SO00329, and SO00330.
Packet Direction Added to TCP SmartTrace Criteria
The SmartTrace (/SMART) packet capture criteria on page 2 of a TCP trace definition has been updated to support packet direction. This change applies to 3270 UI only. It does not apply to Multiple TCP Trace definition.
This enhancement is supplied via PTF SO06853.
Customizer Updated to Add USS and ZFS Parameters
PTFs SO06908, SO06976, and SO07368 update
CA NetMaster NM for TCP/IP(and FTM) release 12.2 to add two new parameters to Customizer (/PARMS). Additionally, the USSCMD command has been added.
Parameter USS allows control of UNIX debug tracing.
Parameter ZFS moves the definition of the ZFS path from the WEBCENTER parameter group. The ZFS path contains WEB and non-WEB related content.
PTF HOLDDATA provides guidance to ensure that the ZFS path is correct and that the Customizer INIFILE is regenerated if used.
USSCMD is a new command for issuing one-off USS commands from NCL &INTCMD environments. This command runs the shell in a batch mode and frees resources automatically at command termination.
Automatic Update of MODS and PANEL Libraries
NetMaster VSAM files MODSDIS and PANLDIS are updated in batch from VSAM initialization files that are SMP/E controlled ++DATA elements. This action is described in ++HOLD data in related PTFs.
Enhancement PTF SO07237 provides a VSAMUPDATE parameter group that enables automated VSAM updates.
For details, see Update VSAM Data Sets in the CA NetMaster Shared Content Library.
Updates in Increment 3
Machine Learning Capabilities
CA NetMaster NM for TCP/IPoffers machine learning capabilities to help you prevent downtime and optimize IT operations. These capabilities proactively detect when systems are behaving abnormally and help expedite problem resolution.
This machine-learning environment consumes the data that you specify from
CA NetMaster NM for TCP/IPand streams it through multiple data science algorithms. The resulting insights help provide additional time for you to remediate potential issues before they impact your business.
Embedded intelligence and a modern, easy-to-use collaboration hub also provide actionable insights. These insights help novice IT ops staff triage potential problems and analyze root causes faster. You can also configure the machine-learning environment to trigger automated problem remediation, which further simplifies management, increases efficiency, and protects your experts.
CA NetMaster NM for TCP/IPsupports the following machine learning capabilities:
- Adaptive Thresholding – Proactively warns of abnormal patterns so that you can take corrective action sooner. You can improve mean time to resolution (MTTR) with real-time dynamic notification of issues.
- Visual Analytics – Provides reports and dashboards for viewing and monitoring performance data. You can analyze the historical performance to identify trends and take corrective and proactive actions when necessary.
To learn more about these capabilities, refer to the Machine Learning Capabilities documentation, including its Release Notes. To configure machine learning, see Configure CA NetMaster NM for TCP/IP and Machine Learning.
CA NetMaster® Network Management for TCP/IP Metrics
After you integrate the CA NetMaster NM for TCP/IP Adapter,
CA Mainframe Operational Intelligencedisplays data for the following groups of metrics:
- Metrics for Address Spaces in Network Ports (IP Resource Monitor)
- Metrics for Business Applications (TCP/IP Summary)
- Metrics for Stack Interfaces and Activities (Condition Summary)
For more information, see Configure CA NetMaster NM for TCP/IP and Machine Learning.
Create and Manage SmartTrace Definitions on
Mainframe Team Center - Network Management
You can now use
Mainframe Team Center - Network Managementto create, edit, delete, and activate SmartTrace definitions. With these enhancements,
Mainframe Team Center - Network Managementnow lets you perform nearly all the same tasks with SmartTrace definitions that you can perform on the mainframe.
For details about using these SmartTrace enhancements, see the Mainframe Team Center - Network Management 12.2 documentation.
Originally supplied in PTF RO99583
Use zERT Data to Help Enhance Application Security
You can use
CA NetMaster NM for TCP/IPto efficiently leverage zERT data about whether and how traffic from an application is cryptographically protected. This data helps you verify regulatory compliance for application security and helps you find applications that might need stronger security.
zERT data focuses on important security attributes of the mechanisms that protect application traffic, especially the cryptographic protocols, algorithms, and keys.
CA NetMaster NM for TCP/IPretrieves this data from the new SMF 119 subtype 11 records that zERT creates. For more details about zERT, see this IBM Documentation article.
CA NetMaster NM for TCP/IPhas added zERT data in the following areas:
- IP Connection List
- List display: IPsec and SSH data in the security protocol level
- Connection Information display: Security-related details
- EE UDP Connections
- List display: Security status
- Connection Information display: Security-related details
- FTP and Telnet Connection Lists
- /CONNF, /CONNT, /SECURE.F and /SECURE.T Connection List displays: Security cipher information
- IP Security
- Summary List displays: Secure/Unsecure options
- Encryption Summary menu displays active and total connection counts for the protocols in use
- IP History
- Connection Events: zERT-related detailsAlso, for ease of use, Connection Events includes all INIT/TERM command types in one record.
- Event Detector
- New sample event detector TCPSECLV monitors the protocols and ciphers for application connections. It issues alerts for each local port and remote address that uses an insecure protocol.For instructions and requirements for using TCPSECLV, see Configuring Event Monitoring.For a detailed scenario about how you can use TCPSECLV to help enhance application security, see Use zERT Data to Verify That Incoming Connections Adhere to Security Policy.
- $$SYSPRO NMIPDIAG command
- Reports zERT setup issues
To use this feature, you must meet the following prerequisites. For details about meeting them, see your IBM documentation.
- Run z/OS Release 2.3.
- Enable the following zERT-related parameters in the IBM STACK PROFILE dataset:
- GLOBALCONFIG parm ZERT
- SMFCONFIG TYPE119 parm ZERTDETAIL
- NETMONITOR parm ZERTSERVICE
Originally supplied in PTFs SO00328, SO00329, and SO00330
SmartTrace Enhancements for SMC
SmartTrace has been enhanced to decode SMC-R and SMC-D packets.
Originally supplied in PTFs RO94885 and RO94940
Password Phrases in Logon Data
To support password phrases in login data, set the value of the /PARMS LOGONUSRDATA parameter group to PHR. The PHR setting treats the first 100 characters of login data after the userid as a phrase. Any characters after the 100th character are treated as a menu option.
For more information about using passphrases, refer to the Security topics in the CA NetMaster Shared Content Library documentation.
Originally supplied in PTF RO93893
New Parameter Visible in Customizer
The Customizer provides easy visibility for parameter groups. You can quickly view the parameters in each group without searching for data set names. The Customizer now includes a new /PARMS SXCTL parameter group. This group displays external security control parameters in the SXCTL file.
Originally supplied in PTF RO94056
Monitor More Ports in ASMON Resources
You can monitor more TCP and UDP ports in ASMON resources by adding more input lines. The limits on the number of lines of input have increased, as follows:
- For TCP/IP: from one line of input to four lines
- For UDP: from one line to two
Originally supplied in PTF RO94983
Security Cipher Added to Connections List
The connections list on the SSL/TLS Summary screen has been enhanced to include the security cipher that each task used to establish a connection.
Originally supplied in PTFs RO97239 and RO97240
Monitor HVCOMM Storage Pool
You can now monitor the HVCOMM storage pool from the
CA NetMaster NM for TCP/IPIP Resource Monitor. The HVCOMM storage pool is part of the Communications Storage Manager (CSM), a component of IBM Communications Server. The output of the D (Display CSM Usage) command now includes HVCOMM storage information.
After you apply INC03, perform the following tasks in
CA NetMaster NM for TCP/IPto monitor attributes in the HVCOMM storage pool:
- On the CSM Monitoring Definition screen in the CSM resource definition, add the new HVCOMM attributes that you want to monitor. These attributes all begin with the HVCOMM* prefix. Examples include HVCOMMCurrent, HVCOMMCurrentPercent, HVCOMMMaximum, and HVCOMMMaxUsed.For instructions, see Monitoring and Diagnosing IP Resources and Nodes and How to Add an IP Resource.
- Set up any required alerting for the attributes that you added.For instructions, see Configuring Event Monitoring.
Originally supplied in PTFs RO99429, RO99126, and RO99127
New $CALL Parameter for $NCL Process
The $NCL Process is a special process definition that lets you execute an existing NCL procedure directly. The $NCL process has a new $CALL=YES|NO parameter. You can use $CALL=YES to invoke the NCL procedure using CALL instead of EXEC. For details about using the $NCL Process, see $NCL Process -- Execute an NCL Procedure in the CA NetMaster Shared Content Library.
Originally supplied in PTF SO00208
Streamlined Documentation for Installing and Upgrading CA NetMaster Products
We have combined and condensed the installation, upgrade, and maintenance procedures for the following CA NetMaster products into a single set of instructions in the CA NetMaster Shared Content Library:
- CA NetMaster Network Management for TCP/IP (CA NetMaster NM for TCP/IP)
- CA NetMaster File Transfer Management (CA NetMaster FTM)
- CA NetMaster Network Automation (CA NetMaster NA)
- CA NetMaster Network Management for SNA (CA NetMaster NM for SNA)
- CA SOLVE File Transmission Services (CA SOLVE:FTS)
Customers can now follow the instructions in a single document space (instead of five) to install all these products in a single process (instead of five).
We also performed these tasks:
- Updated the text for accuracy, eliminating much duplicate and obsolete information.
- Added missing context and processes where necessary, especially at the high level for users who are upgrading or migrating or who are not using every NetMaster product.
For details, see Install or Upgrade CA NetMaster Products in the CA NetMaster Shared Content Library.
Miscellaneous Updates in INC03
In addition to the updates earlier on this page, the INC03 pax file also include the following miscellaneous update
s, andthe updates in the next section, Updates in INCO3 Support PTFs.
- Improves the options for installing the product in the CA CSM-related XML
- Applies all defect fixes released after INC02 through SO00851, including:
- Updates for UNIX support
- Several other minor improvements
Updates in INC03 Support PTFs
The INC03 support PTFs (SO00689, SO00611, and SO00612) include these updates:
- Updates the product-level displays to INC03
- Updates the Install Utility to use the SMP/E RECEIVE SYSMODS FROMNTS command
- Removes references to tape-based installs from the Install Utility
- Corrects the sample security member $NMSXCTL
Updates in Increment 2
INC02 consisted of the following PTFs:
nothave a PAX file.
The INC02 enhancements were as follows:
- Added the TLSv1.2 column to /SECURE displays
- Added the product release number to the product region Primary menu
- Added the release number to the start messages for SSI and for the product region
- Updated APPC conversations to avoid hangs on RECEIVE_AND_WAIT conditions
- Updated the Resource Monitor to allow access from more than two systems
- Corrected S0C3 abends on UDBOPEN of RRDS
- Corrected the sockets related message TVJ101
- Corrected the WebCenter SYSVIEW command error
- Updated the Customizer $RM SYSLOGD parameter to more reliably obtain the Process ID
- Updated the Dataset Services to display library numbers when the STEPLIB DD name is used
- For the IIA Install Utility: increased space for SMPWRK6 DDDEF and added SMPPTS1 DDDEF
- Updated the CONCAT macro to preserve blanks
- Removed tracking of TCP connection retransmit events in the /CONNCF display
- For UNIX support: updated messages, improved error reporting, and updated code to avoid storage-related shortages and abends
- Added support for z/OS 2.2 system symbols; maximum sizes are 16 bytes for names and 44 bytes for values
Mainframe Team Center - Network Managementand WebCenter:
- Updated the default value for the “Enable Secure URL Prefix?” field under the Customizer $NM WebCenter parameter group to YES. If you are installingCA NetMaster NM for TCP/IPfor the first time, verify that this setting matches your site setup.
Mainframe Team Center - Network Management:
- Added the About page and updated the Login page
- Corrected the handling of plus signs and spaces
- Correct same System Name appearing in IP Summary drop down
- For SmartTrace, on the Active Traces tab, added the following actions:
- Inactivate an active trace definition
- Save a running or ended trace
- Download a trace in PCAP format
Updates in Increment 1
The following updates to CA NetMaster NM for TCP/IP were supplied with Release 12.2 Increment 01 (INC01).
INC01 was a pax file. There was no INC00 pax file.
SMC-R and SMC-D Support
The IBM Shared Memory Communications (SMC) protocol lets TCP socket applications exploit direct access to shared memory in your data center. We updated the following panels to include the new SMC fields. For example, the TRS panel lets you see SMC traffic statistics for ports, remote networks, address space, application, and stack home address.
NetMaster requires no additional setup. Data is displayed if SMC has been implemented at the customer site. For more details about SMC, see this IBM Knowledge Center article.
Stack IP Performance Metrics
The Stack IP Performance Metrics display (/STKMON.IPM) output includes the following SMC-D and SMC-R statistics:
The current number of active SMC-R and SMC-D links
Link Activation Timeouts
The number of attempts that were made to establish SMC-R and SMC-D links, in cases where the attempts failed due to timeout conditions
Active Links Opened
The number of times that SMC-R and SMC-D links were established and this stack performed the client role during link establishment
Passive Links Opened
The number of times that SMC-R and SMC-D links were established and this stack performed the server role during link establishment
The number of closed SMC-R and SMC-D links
Connections - Currently Established
The number of TCP connections over SMC-R and SMC-D links in the ESTABLISHED or CLOSE-WAIT state
Connections - Active Opened
The number of times TCP connections over SMC-R and SMC-D links have made a direct transition from the CLOSED to SYN-SENT state
Connection - Passive Opened
The number of times TCP connections over SMC-R and SMC-D links have made a direct transition from the LISTEN to SYN-RCVD state
Connections - Closed
The number of connections over SMC-R and SMC-D links that have corresponding sockets closed
Segments - Received
The total number of RDMA (SMC-R) and DMA (SMC-D) inbound write operations. RDMA and DMA inbound write operations are considered as received segments.
Segments - Sent
The total number of RDMA (SMC-R) and DMA (SMC-D) outbound write operations. RDMA and DMA outbound write operations are considered as sent segments.
Resets - Received
The total number of RDMA (SMC-R) and DMA (SMC-D) inbound write operations that contained the abnormal close flag. This flag has the same effect as the TCP RST flag.
Resets - Sent
The total number of RDMA (SMC-R) and DMA (SMC-D) outbound write operations that contained the abnormal close flag. This flag has the same effect as the TCP RST flag.
Traffic Statistics Display
The Traffic Statistics displays for Address Space, Application, Stack Home Address, Remote Address, Remote Network and TCP Port (/IPTRS) include the following new columns in the panel:
- SMC Connections Active
- SMC Connections Total
- SMC Connections Started
- SMC Connections Ended
- SMC Bytes In
- SMC Bytes Out
Connection List Criteria Display
The Connection Link Criteria Display /CONNC panel has been enhanced to show SMC-R and SMC-D types. You can optionally filter the list to display either or both SMC types.
Device Link List Display
The Device Link List Display (the DL option of the /DEVLINK menu) has been enhanced to show SMC-R and SMC-D types.
Transport Resource List Display
The Transport Resource List /IPTRL panel includes the following changes to support SMC-R and SMC-D:
- The PNetid field is added.
- The ISM and ROCE entries are added.
- The XCF page is removed.
The Transport Resource List /APPNTRL panel includes the following changes to support SMC-R and SMC-D: The IP-specific content (QDIO page) and IP-related entries are removed.
ASN.1 Maps Moved to PDS/E
The repository for ASN.1 Maps has moved from the OSCNTL VSAM file to the MAPOBJ PDS/E partitioned, concatenated data set. The OSCNTL file (hlq.OSCNTL) is no longer created. Instead, the MAPOBJ dataset (hlq.CC2DMAPO) is created. This data set is easier to manage than VSAM files.
In the NMDRVCTL DD, the RUNSYSIN member of the TESTEXEC library no longer references OSCNTL. This member now references MAPOBJ instead.
The parameter OSINP has been removed and is no longer valid.
If you are
upgrading, these changes require that you regenerate your RUNSYSIN member. Otherwise, errors occur when you run the member. The member is regenerated automatically when you follow the process to configure
CA NetMaster NM for TCP/IP. Configuring your product is part of the standard installation or upgrade process, whether you use CA CSM or a PAX file.
For details about maintaining maps, see Maintaining Maps in the Shared Content Library documentation.
New zFS File System
CA NetMaster NM for TCP/IPinstallation process creates a zFS file system using SMP/E DD definitions (DEFs) AC2DZFS and CC2DZFS.
The following SMP/E DD definition (DEFs) have been removed, and their data has been moved to the new zFS file system:
- The ReportCenter DEFs from AC2DHFSR and CC2DHFSR
- TheMainframe Team Center - Network Management(web interface) DEFs from AC2DHFS and CC2DHFS
For details about AC2DZFS, CC2DZFS, and other data sets, see the Reference section in the Shared Content Library documentation.
Enhanced Support for UNIX System Services (USS) Commands
Support has been enhanced for UNIX System Services (USS) commands, as follows:
- USS commands no longer require an NMSSI region configured with UNIX=YES.
- The commands now run under a UNIX shell environment that is dynamically created by the NetMaster region.
- You can authorize the commands under the issuing user.
- The documentation for implementing USS commands is enhanced.
Verify that you meet the following requirements:
To access any of the PTFs listed below, access the download center area of the Broadcom support site and copy the PTF number into the search box.
- Apply the following PTFs: RO95282, RO96733, and RO97359.
- The user ID for the NetMaster region has an OMVS segment that specifies a UID number and a home directory in the external security product definition.
- The data set CC2DLINK is in the system linklist and is APF-authorized.
- USS and Netstat commands are authorized to run as the issuing user. This authorization requires either passticket generation or access to the BPX.DAEMON facility. For details, see Define UNIX System Service (USS) Authorization in the CA NetMaster Shared Content Library.
New and Changed Commands
This section describes new and changed commands. For complete details about commands, see the Online Help.
The new SHOW UNIX command displays all environments active for running UNIX commands.
The SYSCMD command has been changed–The obsolete MIGID operand is removed.
Remove the MIGID operand from any user NCL procedures.
Changes to Data Sets
The names of some data sets have changed, as indicated in the previous two sections,
ASN.1 Maps Moved to PDS/Eand
New zFS File System.
The content of data set CC2DLOAD has been moved into CC2DPLD. CC2DLOAD is no longer allocated.
Review these changes to determine any impact to your installation.
Changes to the Installation Utility
Similarly, the installation utility has been updated to support the changes indicated in the previous two sections,
ASN.1 Maps Moved to PDS/Eand
New zFS File System.
If you intend to perform both of the following actions, include HLQ NMC2 as the last qualifier of your dsnpref, for example, yourhlq1.yourhlq2.NMC2:
- InstallCA NetMaster NM for TCP/IP, using CA CSM.
- Configure, set up, or maintain your product, using the installation utility that you run from CC2DJCL.
Changes that Affect Resource-Level Security
This release contains no changes that affect resource-level security.
Changes to Distributed Knowledge Base
This following resource definitions have been removed from the distributed knowledge base:
- CIP (Class 44)
- Router (Class 45)
Change to SOLVE SSI Parameter
The default value of the SOLVE SSI PATRACENMI parameter has changed to Yes. Verify that this parameter is set appropriately for your site.
The PATRACENMI parameter specifies whether the Packet Analyzer uses the IBM real-time application-controlled TCP/IP trace network management interface (Trace NMI) to collect packets for IBM stacks at the z/OS V2R1 release level or later. The Trace NMI has security requirements and high virtual storage requirements. For details, see Packet Analyzer and SOLVE SSI topic in the Shared Content Library.
New Security Parameter to Comply with PCI Standards
The new LOGONMSG SXCTL security parameter lets administrators comply with Payment Card Industry Data Security Standards (PCI DSS) for incorrect login attempts. These standards specify that users who attempt to log in to a product with an incorrect password or an incorrect user name receive a generic failure message that one of these credentials is incorrect. These standards enhance security by not informing potential hackers of which credential (user name or password) is valid.
Enhancements Supplied Early, for Release 12.1 Post-GA
The following Release 12.2 enhancements are included in the base 12.2 PAX file, and were also delivered through PTFs for Release 12.1 after it went GA, as follows:
OpenSSH Event Recording
Packet Analyzer Support for Trace NMI
Add Exclude Option to Log Message Filtering
Collect TCP Port Statistics by Owner
Password phrase support, which enables multi-factor authentication (MFA)
Enable HttpOnly Cookies parameter
Enable Secure URL Prefix parameter
RO89840 is required for secure cookie support
Track User Logins – Helps verify that only authorized users access
Mainframe Team Center - Network Management. Administrators can review the "user-tracking" log files that record a detailed entry for each user session.
Multiple earlier PTFs, including the cumulative PTF
Mainframe Team Center - Network Managementfeatures, including IP Summary, Command Entry, Ping & Traceroute, SmartTrace, Alert Monitor, and Resource Monitor. For SmartTrace,
Mainframe Team Center - Network Managementdisplays a different set of packet sequence numbers than
CA NetMaster NM for TCP/IPor WebCenter.