1. How do I contact TippingPoint Support?TippingPoint Support is available 24/7/365 by telephone. For a complete list of phone numbers, click HERE. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2. How do I create an online support request?Online support requests are managed via the Trend Micro TippingPoint Business Support Portal (BSP). The BSP facilitates case management for the Trend Micro TippingPoint customer community. You can use this site to:
In addition, you can also search for solutions to a problem or general information about your Trend Micro TippingPoint product. You can access the Business Support Portal at the following URL | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3. Where can I find my Customer ID Number?Your Customer ID Number can be found on the billing invoice that arrived with the order. Sometimes, the Customer ID Number is not included in the invoice document. If you cannot locate the Customer ID Number, contact TippingPoint Support. They can provide your Customer ID Number if given the Certificate Serial Number of the TippingPoint product. For information on the device certificate number, click HERE. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4. What information should I provide when opening a support case?When contacting support, please have the following information ready:
Please also provide the output from the following CLI commands:
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5. How do I create Tech Support Report?The TSR collects diagnostic information into a report that TippingPoint Technical Support can use to debug and troubleshoot system issues. It includes diagnostic commands, log files, and a full system snapshot optionally. To generate a TSR, perform the following steps;
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
6. How do I run the SMS Diagnostic Tool?To run the SMS Diagnostics, perform the following steps;
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
TPS | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7. How do I find the Certificate Serial Number of my device?The Certificate Serial Number can be found by connecting via SSH or serial console to the device and running the following Command Line Interface (CLI) command: show version If the device is not accessible via the CLI, the Certificate Serial Number can also be found on a white sticker on the underside of the device. For information on the device certificate number, click HERE. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8. How do I perform a Factory Reset on the TPS device?To perform a factory reset, connect to the device via SSH and log in using a SuperUser account. From the CLI, issue the following command: debug factory-reset Once issued, you will get the following response: WARNING!!! This command WILL reset this device to factory default configuration. This will remove all network and security configuration, user accounts, log files, snapshots and applied software upgrades. You will NOT be able to recover any of this data from the device after this command has been confirmed. After the factory reset completes, the device will automatically reboot and display the OBE. Warning: Type the word 'COMMIT' to continue: Type the word "COMMIT" in uppercase and press Enter. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9. What happens if I exceed the maximum rated bandwidth of my TPS device?The TPS can handle short traffic spikes above the maximum rated bandwidth with minimal packet loss. However, exceeding the maximum rated bandwidth of the device for periods can lead to system performance degradation, congestion, adaptive filter configuration, and Layer 2 Fallback. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10. If I upgrade the TOS on my device, will it cause a loss of network connectivity?Trend Micro TippingPoint devices can perform a TOS software upgrade without interrupting traffic through the device segments. During the reboot, each segment continues to handle traffic based on the Intrinsic Network (HA) Layer-2 Fallback settings configured for the segment (Permit All or Block All). No traffic is inspected during the reboot phase, but traffic inspection will resume once the system completes the reboot process. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11. Why do my rate-limiting action sets sometimes appear inaccurate?Rate-limiting action sets define a maximum bandwidth that can be used by traffic that matches filters assigned to that action set. Incoming traffic over the defined rate limit for the filter that the traffic matches is dropped. If two or more filters use the same rate-limiting action set, then all packets matching these filters share the bandwidth. For example, if filters 164 (ICMP Echo Request) and 161 (ICMP Redirect Undefined Code) use the same 10 Mbps action set, then both "Echo Requests" and "Redirect Undefined Codes" filters share the 10 Mbps "pipe" as opposed to each filter getting a dedicated 10Mbps pipe. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
12. How can I recover the password to my TPS device?You cannot recover the SuperUser password of a TPS device, but you can reset it to a new value or create a new login with SuperUser privileges. Caution: This procedure requires a reboot operation which will disrupt traffic!
Starting keystore....................................[ OK ]
Starting health monitoring...........................[ OK ]
Starting fast path...................................[ OK ]
Starting TippingPoint OS.............................[ OK ]
Starting segments....................................[ OK ]
Starting XMS.........................................[ OK ]
Starting certificate status monitoring...............[ OK ]
Loading configuration................................[ OK ]
Starting process monitoring..........................[ OK ]
Updating boot counts.................................[ OK ]
Loading ...
Welcome to Super User Password Recovery Please enter the Super User account username and password. Password recovery will create a new super user account, or will reset the password on an existing super user account. Spaces are not permitted in username or password. Minimum password requirements currently configured on the system are: Maximum: The password must contain 8 characters or more, at least 2 alpha characters, at least 1 digit, and at least 1 non-alphanumeric character.
Saving information ...Done TippingPoint Threat Protection System ready TippingPoint Operating System Model Number : 440T (IPS) Serial Number : 440T-XXXX-XXXX Build : 4.1.0.4472 Fri May 20 19:07:48 UTC 2016 Digital Vaccine: 3.2.0.8846 Hardware Rev : B309 IPM Version : 1.d (working) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
13. What is License Manager?License Manager is an application available via the Threat Management Center that allows for the license configuration for the Threat Protection System (TPS) family of products (vTPS, 440T, 2200T, 1100TX, 5500TX, 8200TX, 8400TX). To properly license your TPS device, go to the TippingPoint License Manager (TLM) application on the Threat Management Center website under My Account → License Manager.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
14. How do I capture packets with the TPS?The Traffic Capture feature enables you to capture a selection of traffic received by the device, including traffic that triggers filters and traffic that does not trigger any filters.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
15. How do I perform traffic captures from the Command Line Interface (CLI)?For TPS: tcpdump The CLI command uses TCPDUMP expressions to define the traffic captures. TCPDUMP is free distributed software under the BSD license. You can find a complete listing of command expressions in the Trend Micro TippingPoint Command Line Interface (CLI) reference documentation. tcpdump INTERFACE [record FILENAME [maxsizebytes 1-10000000]] [packetcount 1-10000000] [verbose 0-990000] [proto (icmp|igmp|tcp|udp|esp|ah|pim|snp|vrrp|stp|isis|sctp)] [without (icmp|igmp|tcp|udp|esp|ah|pim|snp|vrrp|stp|isis|sctp)] [pcap FILTER] [cponly][pager] [background] | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
SMS | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
16. How can I recover the password to my SMS?The password for the SMS cannot be recovered. However, the SMS does provide two options to reset the password. Both of these methods reset the password to the SMS's serial number (CERT). The serial number can be found on the bottom of the SMS unit on the white sticker or by pressing Alt-F12 from the login screen (press Alt-F12 to return to the main login screen). Method 1: Note: Connection to the SMS server with a local keyboard and monitor is required to complete the reset; a serial connection will not work.
Method 2:
Initializing...
Calling the system activity collector (sadc): [OK]
Ip6tables: Applying firewall rules: [OK]
Iptables: Applying firewall rules: [OK]
Bringing up loopback interface: [OK]
Bringing up interface eth0: [OK]
Starting system logger: [OK]
Starting kernel logger: [OK]
Starting rpcbind: [OK]
Starting RPC idmapd: [OK]
Starting system message bus: [OK]
Starting acpi daemon: [OK]
Starting HAL daemon: [OK]
Starting ipmi drivers: [OK]
Starting sshd: [OK]
ntpd: Synchronizing with time server: [OK]
Starting ntpd: [OK]
Starting crond: [OK]
Starting mgmt: P
Password recovery enabled
IMPORTANT: TippingPoint highly recommends changing the password immediately following the reset. Once logged in, the password can be changed with the "getpasswd" command. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
17. How do I find the certificate serial number of my SMS?The Certificate Serial Number can be viewed by connecting via SSH to the device and running the following command: get sys In addition, the SMS Certificate Serial Number can also be found on a white sticker on the device. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
18. How do I perform a Factory Reset on the SMS?To perform a factory reset of the SMS, SSH into the SMS and log in using a SuperUser account. From the CLI issue the following command: factoryreset NOTE: Issuing this command will cause all information and settings on the SMS to be completely lost. If you require any data from the SMS, it must be backed up before issuing the command to be recovered. It is strongly recommended that you perform a complete SMS backup and export the file to a safe location before running this command. When the SMS finishes the factory reset process, it must be reconfigured using the Initial Setup Configuration Procedure by connecting a monitor and keyboard or via the Serial Console. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
19. Where can I find the system log of my SMS?The system log of an SMS can be viewed using the SMS client by clicking the Admin button at the top and expanding General in the tree menu on the left. Select System Log from the menu, choose the date range you wish to view and click the Refresh button. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
20. Can I roll back an SMS upgrade if I find issues with the new version?No, once an SMS has been upgraded to a new TOS version, there is no way to roll back the upgrade. The only roll-back that can be performed is on TOS patches. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
21. If the SMS loses contact with the device, will I lose the alerts from the device during that time?No, alerts are stored on the device in the Block and Alert logs. Once communication between the device and SMS is re-established, the alerts that occurred during the outage time will be retrieved from the device by the SMS. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
22. Why is SMS memory utilization high?The SMS uses all available memory by design, so high memory usage is normal. This happens as the SMS pre-allocates (caches) memory for often-used data and binaries (TOS and SMS database), so it is common to see memory utilization above 90%. As long as the CPU utilization is not high, the device functions as designed. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
23. I purchased a vSMS/vTPS; where do I get the certificate file?The Certificate file utilized to deploy a new vSMS/vTPS appliance is downloaded from the TippingPoint License Manager (TLM) application on the Threat Management Center (TMC) website. To download the certificate package
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Digital Vaccine (DV) \ ThreatDV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
24. Why are there different versions of the DV?There are different DV versions due to the difference in product architecture. The DV version number is the last four digits of the Digital Vaccine package. In addition to the different DV version numbers, the DV name consists of a number that designates the base TOS on which the DV should be installed. The base TOS release numbers are the first three digits separated by periods. The current base TOS release numbers are 3.2.0 and 4.0.0.
We recommend downloading the same DVs for all your managed devices. For example, if the weekly DV is #DV9892, and the Security Management System (SMS) manages a vTPS and a 1100TX, after downloading the DVs, the DV Inventory should include the following versions:
If the DV version does not match, click Download from TMC and review the list of available DVs. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
25. Are filter-specific settings preserved for filters that are modified in a DV?Filters that are overridden retain their filter-specific settings even though they have been modified in a DV. The only time filter-specific settings are not preserved is when a DV actually removes a filter. If a filter is configured to use Recommended Settings and the DV modifies the default action for that filter, the filter's action will change. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
26. What is ThreatDV?ThreatDV is a premium subscription service that includes the Reputation Feed and the Malware Filter Package. Reputation Feed: The ThreatDV Reputation Feed identifies and delivers suspect IPv4, IPv6, and Domain Name System (DNS) security intelligence feeds from a multi-vendor, global reputation database so that customers can actively enforce and manage reputation security policies using the Trend Micro TippingPoint Next-Generation Intrusion Prevention System (NGIPS) Platform. The addresses are tagged with reputation and geographic identifiers for ready and easy security policy creation and management. The Reputation Feed provides the addresses and tags multiple times a day (two hours on average) in the same manner as standard Digital Vaccines. Malware Filter Package: The ThreatDV Malware Filter Package is an advanced collection of threat protection filters available to subscribers of the Threat Digital Vaccine (ThreatDV) service now available from DVLabs. The Malware Filter Package uses a different technology than the Digital Vaccine filters to provide more targeted malware protection. The Malware Filters alert on a wide range of currently active malware families. These filters are designed to detect post-infection traffic such as bot activity, phone-home, command-and-control, data exfiltration, and anonymous proxy. The Malware Filter Package includes a large set of filters that are refreshed on a scheduled basis but independently of the regular Digital Vaccines. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Miscellaneous | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
27. What data should I backup for disaster recovery?We suggest regularly creating and saving device snapshots, SMS backups, and Security Profiles for the most comprehensive backup protection. Export each of these to a secure location external to the devices each time a change is made to one of your TippingPoint products. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
28. How do I get an account for the Threat Management Center (TMC)Before you can get an account in the TMC, you will need to have the following;
|
29. What is ThreatLinQ, and how do I get an account?ThreatLinQ (https://threatlinq.tippingpoint.com) is a website created by Trend Micro TippingPoint to collect and analyze information about the security posture of the Internet. ThreatLinQ presents this information to TippingPoint customers and acts as a portal for the DVLabs team to provide additional information about TippingPoint filters and Reputation. This information helps customers decide how, why, and when to enable different filters. ThreatLinQ is also designed to provide Trend Micro TippingPoint customers with extra security information about Filter IDs and attack activity by country, TCP ports, and IP addresses. Because this data is concentrated in one easy-to-use dashboard, customers can access security information quickly and easily. Access to ThreatLinQ is available if you have an active Threat Management Center (TMC) account. |
30. Where can I get the latest product documentation?The most current product documentation can be found on the Trend Micro document center. https://docs.trendmicro.com/en-us/documentation/productgroup/?groupname=tippingpoint |
31. Where can I get the Visio Stencil files?Visio Stencils are available for download from HERE. |
32. Where can I get product datasheets? |
33. Where can I get management MIB files?The MIB files can be found on the Trend Micro document center. https://docs.trendmicro.com/en-us/documentation/productgroup/?groupname=tippingpoint |