Cisco Cisco Firepower Management Center 4000 Entwickleranleitung

Seite von 536
 
6-7
FireSIGHT eStreamer Integration Guide
 
Chapter 6      Configuring eStreamer
  Managing the eStreamer Service
Starting and Stopping the eStreamer Service
License: 
Any
You can manage the eStreamer service using the 
manage_estreamer.pl
 script, which allows you to start, 
stop, reload, and restart the service.
Tip
You can also add command line options to the eStreamer initialization script. See 
 for more information.
The following table describes the options in the 
manage_estreamer.pl
 script you can use on the Defense 
Center or managed device.
eStreamer Service Options
License: 
Any
eStreamer provides many service options that allow you to troubleshoot the service. You can use the 
options described in the following table with the eStreamer service.
Use the above options by first stopping the eStreamer service, then running it with the options you want, 
and finally restarting the service. For example, you can follow the instructions provided in 
 to debug eStreamer functionality.
Table 6-1
eStreamer Management Options 
Option
Description
Select option Number....
enable
Starts the service.
3
disable
Stops the service.
2
restart
Restarts the service.
4
status
Indicates whether the 
service is running.
1
Table 6-2
eStreamer Service Options
Option
Description
--debug
Runs eStreamer with debug-level logging. Errors are saved in the syslog and 
(when used in conjunction with 
--nodaemon
) appear on screen.
--nodaemon
Runs eStreamer as a foreground process. Errors appear on-screen.
--nohostcheck
Runs eStreamer with host name checking disabled. That is, if the client host 
name does not match the host name contained in the subjectAltName:dNSName 
entry in the client certificate, access is still allowed. The 
nohostcheck
 option is 
useful in cases where the network DNS and/or NAT configuration prevent the 
host name check from succeeding. Note that all other security checks are 
performed.
Caution
Enabling this option can negatively affect the security of your system.