Cisco Cisco Firepower Management Center 2000 Guía Del Desarrollador
1-11
FireSIGHT System Database Access Guide
Chapter 1 Introduction
Where Do I Begin?
Client System
On the computer that you want to use to connect to the Cisco database, you must install Java software,
also known as the Java Runtime Environment (JRE) or the Java Virtual Machine (JVM). You can
download the latest version of Java from
also known as the Java Runtime Environment (JRE) or the Java Virtual Machine (JVM). You can
download the latest version of Java from
http://java.com/
.
You must download and unzip a package from the Defense Center that contains the JDBC driver files
you will use to connect to the database. The package also contains executable files used to install an SSL
certificate for encrypted communication with the Defense Center, and other source files for these
utilities.
you will use to connect to the database. The package also contains executable files used to install an SSL
certificate for encrypted communication with the Defense Center, and other source files for these
utilities.
You should also understand how to change applicable system settings on your computer, such as
environment variables.
environment variables.
Query Application
To query the Cisco database, you can use commercially available reporting tools such as Actuate BIRT,
JasperSoft iReport, or Crystal Reports, or any other application (including custom applications) that
supports JDBC SSL connections. This guide provides the information you need to connect to the
database, including the JDBC URL, driver JAR files, driver class, and so on. However, you should refer
to your reporting tool documentation for detailed instructions on how to configure a JDBC SSL
connection.
JasperSoft iReport, or Crystal Reports, or any other application (including custom applications) that
supports JDBC SSL connections. This guide provides the information you need to connect to the
database, including the JDBC URL, driver JAR files, driver class, and so on. However, you should refer
to your reporting tool documentation for detailed instructions on how to configure a JDBC SSL
connection.
Cisco also provides a sample command-line Java application named RunQuery, which you can use to
test your database connection, view the schema, and run basic ad hoc queries manually. The RunQuery
source code is also a reference for setting up the database connection in a custom Java application. The
RunQuery source code is included in the ZIP package that you download from the Defense Center.
test your database connection, view the schema, and run basic ad hoc queries manually. The RunQuery
source code is also a reference for setting up the database connection in a custom Java application. The
RunQuery source code is included in the ZIP package that you download from the Defense Center.
RunQuery is a sample client only, not a fully featured reporting tool. Cisco strongly recommends
against using it as your primary method of querying the database. For information on using RunQuery,
refer to the README file included in the ZIP package.
against using it as your primary method of querying the database. For information on using RunQuery,
refer to the README file included in the ZIP package.
Note that the database access feature uses only the following JDBC functionalities:
•
database metadata, which includes information such as schema, version, and supported features
•
SQL query execution
Database access does not use any other JDBC functionality, including stored procedures, transactions,
batch commands, multiple result sets, or insert/update/delete functions.
batch commands, multiple result sets, or insert/update/delete functions.
Database Queries
To query the database, you should know how to construct and execute
SELECT
statements on single tables
and on multiple tables using join conditions.
To assist you, this guide contains information on supported MySQL query syntax, the Cisco database
schema, allowed joins, and other important query-related requirements and limitations.
schema, allowed joins, and other important query-related requirements and limitations.
Where Do I Begin?
After you have met the prerequisites described in
, you can begin configuring
your client system to connect to a Defense Center.