Symantec™ ESM Agent For IBM AS/400

Version 6.5

Installation Guide

Introduction

The scope of this Installation Guide is to document the procedure for installing the Symantec ESM AS/400 Agent and Registering the AS/400 agent with the manager.

This document includes the following topics:

  • Before you install
  • System requirements
  • Installing the Symantec ESM Agent
  • Registering the Symantec ESM Agent with an ESM manager

(Please note – references to AS/400 may be inclusive to OS/400, i5/OS, iSeries, System i)

Before you install

When you plan to install an ESM agent on your AS/400 system, complete the following:

  1. Select the systems where you want to install the Symantec ESM agent.
  2. Obtain access to the QSECOFR account on each selected system.
  3. Select the Symantec ESM managers where you want to register each Symantec ESM agent.
  4. For each ESM manager, have the following information available:
    • The name of the host computer where the ESM agent will be installed
    • The name and password of an account on the ESM manager with privileges to register Symantec ESM agents
    • The communication protocol
    • The port number
  5. Add the managers to the AS/400 TCP/IP host table by typing 'CFGTCP' and selecting option 10.
  6. Edit the host file by adding the AS/400 system IP address and name, and save the file on the Symantec ESM manager.
  7. The host file is located at the following path on your Windows Symantec ESM Manager: C:\WINNT (or Windows)\system32\drivers\etc\hosts
  8. You should edit the host file by adding the AS/400 systems IP address and name, as shown in the following example: 10.10.100.100 my_AS/400
  9. Ensure that the ESM manager to where you plan to register the AS/400 agent uses a password that is no longer than eight characters in length.
  10. Delete or rename any library that is named ESMOLD or ESM_OLD. When you attempt to upgrade your installation, one of these libraries is created, allowing you to restore your previous installation. If the upgrade succeeds, Symantec ESM automatically deletes the library. If the upgrade fails for any reason, the library remains intact. If these libraries exist on your computer prior to beginning a new installation, you cannot install the Symantec ESM agent until they are removed or renamed.
  11. Do not install the Symantec ESM manager on a computer that has the IBM Operations Console software currently installed.
    • Note: Symantec ESM 6.x managers only run on computers with Windows or UNIX OS.

System requirements

Computers that have AS/400 operating systems must meet these minimum requirements to install and run Symantec ESM software:

  • 256 MB RAM memory
  • 1600 MB of free disk space
  • 30 MB pool size

You can install Symantec ESM agents on IBM iSeries computers that have an OS/400 V5R3, V5R4, & V6R1 operating system.

Installing Symantec ESM agents

The installation process consists of extracting the Symantec ESM libraries from the CD-ROM, running the installation program, and registering the AS/400 agent to the ESM manager.

Symantec distributes Symantec ESM software on an ISO 9660 (High Sierra Format) CD-ROM disk. To access this software, at least one OS/400 must have access to a CD-ROM drive.

The ESM agent installation process includes the following steps:

  • Starting the Symantec ESM installer
  • Selecting the type of installation
  • Performing the installation
  • Registering the agent to a manager

To start the Symantec ESM installer

  1. Insert the Symantec ESM CD-ROM in the system's CD-ROM drive.
  2. Log in to the AS/400 system as QSECOFR.
  3. Type LODRUN DEVICE <OPT01>

    OPT01 is the default name of the CD-ROM drive. If your OS/400 uses a different name for the CD-ROM drive, substitute the correct name in the command.

To select the type of installation

  1. Type Y to select the New Install option.
  2. Select Enter=Accept if you agree to the terms of the Software License agreement.

To install a Symantec ESM agent

  1. Type N in the Transfer data field.
  2. Type N in the Submit to batch field.

These steps let you install the software interactively and lock the workstation until you finish the installation.

Press Enter to execute the command. As soon as the installation is complete, a registration screen appears.

Registering Symantec ESM OS/400 Agent with a Manager

Registering a Symantec ESM agent with a manager establishes secured communications between the agent and manager. Each agent must register to at least one manager. Do not use more than one agent name to register a Symantec ESM agent to a manager, or ESM reports an error when you try to run a policy on the agent.

Do not register the Symantec ESM agent to a manager version earlier than Symantec ESM 6.0. This causes database errors on the manager. Instead, you must upgrade the managers to the latest Symantec ESM version before registering the agent.

The manager must be running to register the agent. If the manager is not running, you can restart the manager and use the Register agent option in the Symantec ESM menu to register the agent.

Symantec ESM agents registered to an ESM manager prior to an upgrade of the manager continue to function with the upgraded manager. However, you must upgrade these agents to use new functions and features.

To register the Symantec ESM agent to a manager

  1. Log in to the OS/400 using ESM as the profile.

    You must change the password after the first login.

  2. If you are reregistering the agent, select option 40 to start the ESM subsystem.
  3. On the ESM main menu, select option 6, Register with Manager.
  4. Specify the following information:
    • TCP/IP port number (the default value is 5600)
    • Symantec ESM manager user name
    • Symantec ESM manager password
    • Symantec ESM manager name

    If you have not modified the hosts file on the Manager computer, you must use the IP address.

  5. Press Enter to end the terminal session.
  6. If you are reregistering the agent, restart the Symantec ESM console.

PDF preview unavailable. Download the PDF instead.

ESM OS400 Agent Installation Guide-1 Acrobat Distiller 6.0 (Windows)

Related Documents

Preview Symantec Endpoint Protection Installation and Administration Guide
Comprehensive guide for installing and administering Symantec Endpoint Protection (SEP), covering setup, client deployment, policy management, threat prevention, and reporting.
Preview Symantec Protection for SharePoint Servers 6.1.0 Implementation Guide
This guide details the installation, configuration, and management of Symantec Protection for SharePoint Servers 6.1.0, designed to secure Microsoft SharePoint 2013, 2016, and 2019 environments against malware and active content threats.
Preview THINK C 5.0 User Manual - Symantec Macintosh Development
Comprehensive user manual for Symantec THINK C 5.0, a powerful IDE for Macintosh. Covers installation, tutorials, debugging, language reference, and Macintosh application development.
Preview Ransomware 2017: An Internet Security Threat Report by Symantec
An in-depth analysis of ransomware threats in 2017, detailing major outbreaks like WannaCry and Petya, their impact on businesses, methods of spread, and essential protection strategies. Includes data on infection trends, ransom demands, and a comprehensive list of ransomware families.
Preview Veritas Storage Foundation Cluster File System High Availability Administrator's Guide for Solaris 6.0
Administrator's guide for Veritas Storage Foundation Cluster File System High Availability (SFCFSHA) 6.0 on Solaris. Covers installation, configuration, management, and technical support for high-availability storage solutions.
Preview Symantec Endpoint Protection インストールおよび管理者ガイド
このドキュメントは、Symantec Endpoint Protection (SEP) 14.3 RU2 のインストール、設定、および管理に関する包括的なガイドです。Windows、Mac、Linux クライアントの導入、セキュリティポリシーの管理、ファイアウォール保護、侵入防止、ウイルス対策、およびレポート機能について詳しく説明しています。
Preview Secure Web Gateway Content Analysis Policy Best Practices Improvement
This document provides best practices for configuring Symantec's Secure Web Gateway (SWG) solution, including ProxySG, Advanced Secure Gateway, and SWG virtual appliances, for content scanning with Content Analysis. It details a risk-based content scanning model, policy templates, and customization options to optimize security and performance.