Configure system values for a restore operation

After you plan how you want a restore operation to function, use iSeries™ Navigator to set the system values to reflect how to handle the restore operation. At this point, your system is ready for a restore command.

To set the required system values in iSeries Navigator, complete the following steps:
  1. In iSeries Navigator, expand your system > Configuration and Service > System Values.
  2. Select Save and Restore.
  3. On the Conversion page, set the Convert objects during restore system value to the way you want to handle object conversion.
  4. On the Signatures page, set the Verify object signatures on restore system value to the way you want to handle signatures of objects.
  5. On the Objects page, select the objects you want to allow to be restored in the Allow restore of security sensitive objects system value.
  6. On the Access paths page, select whether access paths are saved in the Save access paths system value.
  7. Click OK to close the Save and Restore system values.
  8. If you want to scan objects on the next access after the object is restored, complete the following:
    1. Select Security to open the Security system values.
    2. On the Scan page, select Use registered exit programs to scan the root (/), QOpenSys, and user-defined file systems. For more information about registering exit programs, see Scan option.
    3. Select Use specified scan control options.
    4. Select the Scan on next access after object has been restored option.
    5. Click OK to close the Security system values.

After you configure your system values settings, you are ready to run a restore operation that uses these system value settings. However, there are more precautions to take to restore single objects or an entire system. See how to run a restore command, for more information.

Related concepts
Prepare system values for a restore operation
Save and restore system values: Convert objects during restore
Save and restore system values: Verify object signatures during restore
Save and restore system values: Allow restore of security sensitive objects
Save and restore system values: Save access paths
Scan option
Run a restore command
Related tasks
Plan system values for a restore operation