Submit a ticketCall us

AnnouncementsWeb Help Desk Integrations eCourse

Looking to reduce response times? Sign up for our eCourse to learn how integrating Web Help Desk with Dameware Remote Support, Network Configuration Manager, Network Performance Monitor, and Server & Application Monitor can improve communication efficiencies.

Register here.

Home > Success Center > Log & Event Manager (LEM) > LEM Administrator's Guide > CMC service menu

CMC service menu

Table of contents
No headers

Updated: Jun 5, 2018

The cmc::service> menu includes commands for managing restrictions, SSH access, and Snort.

See About the CMC command line in LEM for information about using the CMC command line.

Type the service command at the main menu to open the cmc::service> prompt. Commands available from the service menu are listed in the following table in alphabetical order. A ü in the "Restart Required" column indicates that a command requires an automatic restart of the LEM Manager service. See Starting and Stopping LEM components for help.

Command Description Restart Required

disableflow

Disables the flow Collection Service on the appliance (and in the SolarWinds Explorer).

 

enableflow

Enables the flow Collection Service on the appliance (and in the SolarWinds Explorer).

ü

exit

Exits the service menu and returns to the main menu.

 

help

Displays a brief description of each command within the service menu.

 

loadsnortrules

Loads Snort rules from a disk or a network file share onto the LEM Manager. This allows you to update the Snort rules on the Manager. The disk must be in the same format (that is, use the same names and directories) that the copysnortrules command uses to issue the original rules, otherwise the rules will not be updated.

 

restartssh

Restarts the SSH service. If the SSH service is running, this command stops and then restarts the service.

 

restrictconsole

Restricts access to the LEM console to only certain IP addresses or hostnames. This command prompts you to provide the IP addresses or hostnames that should be allowed access. Once the restriction is in place, only the listed IP addresses or hostnames can connect to the LEM console. Also see unrestrictconsole.

 

restrictreports

Restricts access to reports to only certain IP addresses or hostnames. This command prompts you to provide the IP addresses or hostnames that should be allowed access. Once the restriction is in place, only the listed IP addresses or hostnames can create and view reports. Also see unrestrictreports.

 

restrictssh

Restrict the SSH service to only certain IP addresses. This command prompts you to provide the IP addresses that should be allowed access. Once the restriction is in place, only the listed IP address and user combinations can connect to the LEM Manager using the SSH service. Also see unrestrictssh.

 
snmp

Configures the SNMP Services.

 

startssh

Starts the SSH service.

 

stopopsec

Terminates any connections from the LEM Manager VM to Check Point® Open Platform for Security (OPSEC) hosts.

 

stopssh

Stops the SSH service. If you issue this command, you can only access the LEM Manager with a keyboard and monitor until you issue a reboot command.

To restrict access to the SSH service (outside of the user name and password requirements), see the restrictssh command.

 

unrestrictconsole

Removes access restrictions placed on the LEM console. The only remaining protection is the user name and password combination. This command removes all other restrictions and allows system users with a user name and password to connect to the console.

 

unrestrictreports

Removes access restrictions placed on the LEM reports application. The only remaining protection is the user name and password combination. This command removes all other restrictions and allows anyone who has either the reports application or any alternative database connection software installed, to create and view reports and browse the database, provided that they have a valid username and password.

 

unrestrictssh

Removes access restrictions placed on the SSH service. The only remaining protection is the user name and password combination

 
Last modified

Tags

Classifications

Public