Tipping Point - Comandos PDF
Tipping Point - Comandos PDF
Resets the device configuration settings to the factory defaults. Use the -
configuration clear configuration
echo option to echo the command when it is executed.
Use the blocks option to clear all connection table block entries. Use the
connection-tabl e clear connection-table blocks clear connection-table trusts
trusts option to clear all trust table entries.
counter interface Clears interface counters. clear counter interface
counter policy Clears policy counters. clear counter policy
interface Clears the interface. When used without options, it rests all interfaces. clear interface clear interface ethernet <port>
clear
log Clears log files. When used without options, it erases all entries in all logs. clear log clear log alert clear log audit clear log block clear log packet-trace clear log quarantine clear log system
Sets threshold values for disk usage, memory, and temperature values.
conf t monitor Disk and memory thresholds are expressed in percentages, and
conf t monitor threshold disk -major <60-100> -critical <60-100>
temperature thresholds are expressed in degrees Celsius. The major
threshold conf t monitor threshold memory -major <60-100> -critical <60-100>
threshold value must be set at a value less than the critical threshold value
conf t monitor threshold temperature -major <40-80> -critical <40-80>
and allow time to react before a problem occurs. The critical threshold
value should generate a warning before a problem causes damage.
add Adds a new named IP address to the system. conf t named-ip add <IP address> <name>
delete Removes a name. conf t named-ip remove <name>
conf t named-ip
modify
rename Renames a named IP address. conf t named-ip rename <old name> <new name>
community Sets the NMS community string. The string is limited to 31 characters. conf t nms community <string>
conf t nms trap-destination add <IP address> -port <port number>
Adds or removes an NMS trap IP address. You can also specify a port
conf t nms conf t nms trap-destination remove <IP address>
trap-destinati on number with the -port option. For SNMPv3, the following options are also
conf t nms trap destination add <IP address> port <port number> -user <user ID> -password <password> -engine <engine> -
available: -user -password -engine -des
des <destination>
add Adds a protocol to a port. conf t port <protocol> add <segment> <port>
conf t port
delete Removes a protocol from a port. conf t port <protocol> remove <segment> <port>
Command Subcommand Description Usage
add-pair Adds a port pairing to a profile. conf t profile <profile name> add-pair <port pair>
delete Deletes an existing profile. conf t profile <profile name> delete
description Enters a description string for the profile. conf t profile <profile name> description "<description>"
Sets the deployment mode. Deployment modes offer increased flexibility conf t profile deployment core
for filter settings. TippingPoint provides recommended settings customized conf t profile deployment edge
deployment
for different deployment types, including Core, Edge, or Perimeter. Use conf t profile deployment perimeter
conf t profile show deployment-choices to see your options. conf t profile deployment default
remove-pair Removes a port pairing from a profile. conf t profile <profile name> remove-pair <port pair>
rename Renames a profile. conf t profile <profile name> rename <new profile name>
Creates a security profile. You can add a description string with the - conf t profile <profile name> security
security
description option. conf t profile <profile name> security -description "<description>"
Creates a traffic management profile. You can add a description string with
traffic-mgmt conf t profile <profile name> traffic-mgmt conf t profile <profile name> traffic-mgmt -description "<description>"
the -description option.
Adds or removes a global exception for Application Protection and conf t protection-settings app-except add <source IP address> <destination IP address> -profile <profile name>
app-except
Infrastructure Protection filters. conf t protection-settings app-except remove <source IP address> <destination IP address> -profile <profile name>
Adds or removes an apply-only restriction for Application Protection and conf t protection-settings app-limit add <source IP address> <destination IP address> -profile <profile name>
app-limit
Infrastructure Protection filters. conf t protection-settings app-limit remove <source IP address> <destination IP address> -profile <profile name>
Adds or removes a DNS exception for Application Protection and conf t protection-settings app-except add <DNS> -profile <profile name> conf t protection-settings app-except remove <DNS> -
conf t protection- dns-except
Infrastructure Protection filters. profile <profile name>
settings
Adds or removes an IP address exception for Application Protection and
conf t protection-settings app-except add <IP address> -profile <profile name>
ip-except Infrastructure Protection filters. This exception applies to source and
conf t protection-settings app-except remove <IP address> -profile <profile name>
destination IP addresses.
Adds or removes an apply-only restriction for Performance Protection conf t protection-settings perf-limit add <source IP address> <destination IP address> -profile <profile name>
perf-limit
filters. conf t protection-settings perf-limit remove <source IP address> <destination IP address> -profile <profile name>
Immediately synchronizes the RAM disk with the hard disk. You can
force-sync conf t ramdisk force-sync all conf t ramdisk force-sync <file>
synchronize all files, or specify alert, audit, block, or sys
Sets the synchronization interval in seconds. With a value of zero (0), all
conf t ramdisk writes are immediatly written to the hard disk. With a value of -1, the file is
sync-interval written to the hard disk when a conf t ramdisk force-sync command is conf t ramdisk sync-interval <file>
executed, the device is rebooted or halted, or when the device enters high
availability fallback mode. You must specify alert, audit, block, or sys
conf t remote-syslog audit <IP address> -port <port>
audit Enables or disables remote syslog for the Audit log.
conf t remote-syslog no audit
delete Deletes a remote syslog collector. conf t remote-syslog delete <IP address> -port <port>
conf t remote-syslog rfc-format enable
rfc-format Enables or disables RFC format on the remote syslog.
conf t remote-syslog rfc-format disable
conf t remote-syslog quarantine enable
quarantine Enables or disables remote syslog for the Quarantine log.
conf t remote-syslog quarantine disable
conf t remote-syslog conf t remote-syslog system <IP address> -port <port>
system Enables or disables remote syslog for the System log.
conf t remote-syslog no system
Creates or updates a remote syslog collector. A collector is specified by IP
conf t remote-syslog update <IP address> -port <port> -alert-facility <number>
address and port. You also have the option to include a delimiter and
conf t remote-syslog update <IP address> -port <port> -block-facility <number>
update facility numbers for alert messages, block messages, and misuse/abuse
conf t remote-syslog update <IP address> -port <port> -misuse-facility <number>
messages. Facility numbers may be any number from 0-31 inclusive.
conf t remote-syslog update <IP address> -port <port> -delimiter <character>
Delimiter options include tab, comma, semicolon, and bar.
The action that the IPS takes on traffic coming from the specified IP
conf t reputation action-when-pending [-profile <security profile name>] permit
action-when-pending address while the IP reputation filter is caching the address. The default
conf t reputation action-when-pending drop [-profile <security profile name>] permit
action is permit.
conf t reputation check-dest-address [-profile <security profile name>] enable conf t reputation check-dest-address [-profile
check-dest-address Enables or disables action on the traffic destination IP address.
<security profile name>] disable
conf t reputation check-source-address [-profile <security profile name>] enable
check-source-address Enables or disables action on the traffic source IP address.
conf t reputation check-source-address [-profile <security profile name>] disable
conf t reputation
Configures reputation filters and maps a security profile to a reputation
group. delete-copy: deletes a filter disable: disables a filter without conf t reputation filter <group name> [-profile <security profile name>] delete-copy
deleting it. enable: enables a filter and maps it to a reputation group. conf t reputation filter <group name> [-profile <security profile name>] disable
filter
The -threshold option sets a reputation filter threshold based on the IP conf t reputation filter <reputation group name> [-profile <security profile name>] enable [-threshold <number>] -action-set
reputation information maintained by the TippingPoint TMC. Entries that <action set name>
exceed the TMC-set threshold are acted upon by the IPS.
add-domain Adds a domain to a reputation group. conf t reputation group add-domain <name> <domain>
add-ip Adds an IP address to a reputation group. conf t reputation group add-ip <name> <domain>
create Creates an IP reputation group. conf t reputation group create <name> [-description description of option]
conf t reputation
delete Deletes an IP reputation group. conf t reputation group delete <name>
group
remove-domain Removes a domain from a reputation group. conf t reputation group remove-domain <name> <domain>
remove-ip Removes an IP address from a reputation group. conf t reputation group remove-ip <name> <domain>
rename Renames an IP reputation group. conf t reputation group rename <old name> <new name>
Command Subcommand Description Usage
Sets the intrinsic network high availability (fallback) option for the
segment. If the segment is set to block, all traffic through that segment is conf t segment <segment name> high-availability block
high-availability
denied in the fallback state. If the segment is set to permit, then all traffic conf t segment <segment name> high-availability permit
is permitted in the fallback state.
Configures the Link-Down Synchronization mode and timeout length. The
following modes are available: hub: ensures the partner port is
conf t segment <segment name> link-down hub
unaffected when the link goes down breaker: requires both the port and
link-down conf t segment <segment name> link-down breaker -timeout <seconds>
its partner to be manually restarted when the link goes down wire:
conf t segment <segment name> link-down wire -timeout <seconds>
conf t segment automatically restarts the partner port when the link comes back up Valid
range of timeout is 0 to 240 seconds.
Defines a name for the segment with a maximum of 32 characters. Set the
name to "" to remove the name from the segment. Names must conform
name to the following rules: Can only contain letters A-Z and a-z, digits 0-9, conf t segment <segment name> name "<segment name>"
single spaces, periods (.), underscores (_), and dashes (-) Must include
at least one non-digit character Cannot begin or end with spaces
physical-ports Specifies the physical ports. conf t interface mgmtEthernet physical-port <port a> <port b>
restart Restarts a segment. conf t segment <segment number> restart
browser-check Enables and disables browser checking. conf t server browser-check conf t server no browser-check
Enables and disables HTTP. You must reboot the device after changing
http conf t server http conf t server no http
HTTP settings.
conf t server Enables and disables HTTPS. You must reboot the device after changing
https conf t server https conf t server no https
HTTPS settings.
ssh Enables and disables SSH. conf t server ssh conf t server no ssh
telnet Enables and disables telnet. conf t server telnet conf t server no telnet
columns Sets the column width of the terminal session. conf t session columns <number of columns>
more Enables or disables page-by-page output. conf t session more conf t session no more
rows Sets the row height of the session. conf t session rows <number of rows>
conf t session
Sets the inactivity timeout. The -persist option applies the this value to
timeout conf t session timeout <minutes> conf t session timeout <minutes> -persist
future sessions for all users as well as the current session.
wraparound Enables or disables text-wrapping for long text lines. conf t session wraparound conf t session no wraparound
[no options] Enables SMS management. conf t sms
ip Sets the IP address and port of the SMS that will manage the IPS. conf t sms ip <IP address> -port <port>
Enables or disables restriction of SMS management to a specified IP
must-be-ip conf t sms must-be-ip <IP address or CIDR> conf t sms no must-be-ip
conf t sms address. Only the SMS with this IP can manage the device.
no Disables SMS management. conf t no sms
v2 Enables or disables SNMP v2 communication. conf t sms v2 conf t sms no v2
v3 Enables or disables SNMP v3 communication. conf t sms v3 conf t sms no v3
[no options] Enables SNTP. conf t sntp
Sets the interval at which the IPS will check with the time server. A zero
duration conf t sntp duration <minutes>
value will cause time to be checked once on boot.
no Disables SNTP. conf t no sntp
If the difference between the new time and the current time is equal to or
offset greater than the offset, the new time is accepted by the IPS. A zero value conf t sntp offset <seconds>
conf t sntp will force time to change every time the IPS checks.
port Identifies the port to use for the time server. conf t sntp port <port>
primary Sets or removes the IP address of your primary SNTP time server. conf t sntp primary <IP address> conf t sntp no primary
Sets the number of retries that the device attempts before declaring the
retries conf t sntp retries <number>
SNTP connection is lost.
secondary Sets or removes the IP address of your secondary SNTP time server. conf t sntp secondary <IP address> conf t sntp no secondary
Sets the number of seconds that the device waits before declaring the
timeout conf t sntp timeout <seconds>
SNTP connection is lost.
Creates an ICMP traffic management filter. You can also specify the ICMP conf t traffic-mgmt icmp [-type <ICMP type>] <filter name> [-profile <profile name>] [-srcaddr <source IP address>] [-destaddr
icmp
type, or use any to apply the filter to all types. <destination IP address>]
Creates aan ICMPv6 traffic management filter. You can also specify the conf t traffic-mgmt icmp6 [-type <ICMPv6 type>] <filter name> [-profile <profile name>] [-srcaddr <source IP address>] [-
icmp6
ICMPv6 type, or use any to apply the filter to all types. destaddr <destination IP address>]
conf t traffic-mgmt ip [-ip-frag-only] <filter name> [-profile <profile name>] [-srcaddr <source IP address>] [-destaddr
Creates a IP traffic management filter. You can also specify the whether IP <destination IP address>]
conf t traffic-mgmt ip
fragments are filtered with the -ip-frag-only or -no-ip-frag-only options. conf t traffic-mgmt ip [-no-ip-frag-only] <filter name> [-profile <profile name>] [-srcaddr <source IP address>] [-destaddr
<destination IP address>]
conf t traffic-mgmt ip6 [-ip-frag-only] <filter name> [-profile <profile name>] [-srcaddr <source IP address>] [-destaddr
Creates an ipv6 traffic management filter. You can also specify the whether <destination IP address>]
ip6
IP fragments are filtered with the -ip-frag-only or -no-ip-frag-only options. conf t traffic-mgmt ip6 [-no-ip-frag-only] <filter name> [-profile <profile name>] [-srcaddr <source IP address>] [-destaddr
<destination IP address>]
Creates a TCP traffic management filter. You can also specify the TCP conf t traffic-mgmt tcp [-srcport <TCP port>] [-destport <TCP port>] <filter name> [-profile <profile name>] [-srcaddr <source
tcp
source and destination ports. IP address>] [-destaddr <destination IP address>]
conf t traffic-mgmt
Creates a UDP traffic management filter. You can also specify the UDP conf t traffic-mgmt udp [-srcport <UDP port>] [-destport <UDP port>] <filter name> [-profile <profile name>] [-srcaddr <source
udp
source and destination ports.+ IP address>] [-destaddr <destination IP address>]
Command Subcommand Description Usage
allow Permits all traffic that fits the named filter. conf t traffic-mgmt <filter name> [-profile <profile>] allow
block Blocks all traffic that fits the named filter. conf t traffic-mgmt <filter name> [-profile <profile>] block
delete Deletes the named filter. conf t traffic-mgmt <filter name> [-profile <profile>] delete
position Changes the priority of the filter. conf t traffic-mgmt <filter name> [-profile <profile>] position <number>
conf t traffic-mgmt
rate-limit Rate-limits and applies the named action set to all traffic that fits the filter. conf t traffic-mgmt <filter name> [-profile <profile>] rate-limit <action set name>
rename Renames the filter. conf t traffic-mgmt <filter name> [-profile <profile>] rename
trust Enables trust of all packets that match the filter. conf t traffic-mgmt <filter name> [-profile <profile>] trust
conf t tse adaptive-filter mode automatic
adaptive-filter Sets the adaptive filter mode to automatic or manual.
conf t tse adaptive-filter mode manual
Sets the severity of messages logged by the Adaptive Filter Configuration
afc-severity conf t tse afc-severity <severity>
(AFC). Options include: critical error warning info
Enables or disables asymmetric mode for the TSE. Use asymmetric mode if conf t tse asymmetric-network enable
asymmetric-network
your network uses asymmetric routing. conf t tse asymmetric-network disable
Enables or disables notification when traffic congestion reaches a defined conf t tse congestion notify enable -threshold <threshold>
congestion
threshold. conf t tse congestion notify disable
Sets the timeout for the connection tables. non-tcp-timeout: Defines the
timeout for non-TCP connections. The range is 30 to 1800 seconds. conf t tse connection-table non-tcp-timeout <seconds>
connection-table timeout: Defines the global connection table timeout. The range is 30 to conf t tse connection-table timeout <seconds>
1800 seconds. trust-timeout: Defines the timeout for the trust table. The conf t tse connection-table trust-timeout <seconds>
range is 30 to 1800 seconds.
conf t tse gzip-compression enable
gzipcompression Enables or disables GZIP decompression.
conf t tse gzip-compression disable
Specifies inspection of encoded HTTP responses. accelerated: Hardware
conf t tse acceleration is used to detect and decode encoded HTTP responses. conf t tse http-encoded-resp accelerated
http-encoded-resp
inspect: Enables strict detection and decoding of HTTP responses. conf t tse http-encoded-resp inspect conf t tse http-encoded-resp ignore
ignore: The device does not detect or decode HTTP responses.
Enables or disables IDS mode. When enabled, IDS mode configures the
device to operate in a manner similar to an Intrusion Detection System
(IDS). Performance protection is disabled. Adaptive Filtering mode is
conf t tse ids-mode enable
ids-mode set to Manual. Filters currently set to Block are not switched to Permit,
conf t tse ids-mode disable
and Block filters can be still be set. NOTE: IDS mode will be disabled if you
manually enable performance protection or set Adaptive Filtering mode to
Automatic.
Sets the logging mode: conditional: Improves performance by turning off
alert/block logging when the device experiences a specified amount of
congestion. This feature is enabled by default. The -threshold setting
conf t tse logging-mode conditional -threshold <percentage> -period <seconds>
logging-mode defines the percentage of packet loss that turns off logging. The -period
conf t tse logging-mode unconditional
setting sets the length of time logging remains off. unconditional: The
device always logs alerts and blocks, even if traffic is dropped under high
load.
quarantine Sets the quarantine duration. The range is 1 to 1440 minutes. conf t tse quarantine <minutes>
Adds a user. Requires the following options: name: Login name.
Maximum of 31 characters. role: Privilege level. Privileges may be
operator, administrator, or super-user. password: Password. Maximum
add conf t user add <username> -password <password> -role <role>
32 characters. If you do not create a password, you will be asked if you
want to do so. -tech-support: Enables the Technical Support Landing
Page when the user logs into the LSM. (TippingPoint 10 only)
conf t user
enable Enables a user account that has been disabled due to lockout or expiration. conf t user enable <username>
Modifies the named user. Requires one or more of the following options:
role: Privilege level. Privileges may be operator, administrator, or super-
modify user. password: Password. Maximum 32 characters. -tech-support: conf t user modify <username> -password <password> -role <role>
Enables the Technical Support Landing Page when the user logs into the
LSM. (TippingPoint 10 only)
remove Removes a user login. conf t user remove <username>
Specifies the action to take when the maximum number of login attempts
is reached. disable: Requires a super-user to re-enable the user. conf t user option attempt-action disable
attempt-action
lockout: Prevents the user from logging in for the lockout-period. notify: conf t user option attempt-action lockout
Posts a notification to the audit log.
Specifies the action to take when a user account expires. disable: conf t user option expire-action disable
expire-action Disables the account. expire: Expires the account. notify: Audits the conf t user option expire-action expire
conf t user options
expiration to the audit log. conf t user option expire-action notify
Sets the number of days before a password expires. Valid values are 0, 10,
expire-period conf t user option expire-period <value>
20, 30, 45, 90, 332, and 365. With a value of 0, passwords do not expire.
Sets the number of minutes that a user is locked out after the maximum
lockout-period conf t user option lockout-period <value>
number of unsuccessful login attempts.
Command Subcommand Description Usage
Sets the maximum number of login attempts that are permitted before the
max-attempts action specified in attempt-action takes place. Valid values are integers conf t user option max-attempts <value>
conf t user options between 1 and 10, inclusive.
Sets the security level for user names and passwords. Valid values are
security-level conf t user options
integers between 0 and 2 inclusive. See Security Levels on page 64.
Configures the physical port, VLAN ID, and CIDR associated with a virtual
add-row conf t virtual-port <port name> add-row -port-list <physical port> -vlan-list <VLAN ID> -cidr-list <CIDR address>
port. Leaving a option blank sets the value to any.
Creates a virtual port and assigns a name. The maximum number of
create characters is 32. Spaces are not allowed. Use the -description option to conf t virtual-port <name> create [-description "<description>"] <zones>
add a description.
conf t virtual-port delete Deletes a virtual port. conf t virtual-port <name> delete
description Enters a description of the virtual ports. conf t virtual-port <name> description "<description>"
Removes the physical port, VLAN, and CIDR associated with a virtual port,
remove-row conf t virtual-port <port name> remove-row
resetting its values to any.
rename Changes the name of the virtual ports. conf t virtual-port <name> rename <new name>
zones Sets the physical port list and VLAN list for a virtual port. conf t virtual-port <name> zones <VLAN range>
delete Deletes a virtual segment. conf t virtual-segment <incoming virtual port> <outgoing virtual port> delete
Sets the precedence of a virtual segment. Assigning a position of 1 gives
conf t virtual-segment position conf t virtual-segment <incoming virtual port> <outgoing virtual port> [-position <position in list>]
the segment topmost precedence.
update Creates, moves, or edits a virtual segment. conf t virtual-segment <incoming virtual port> <outgoing virtual port> update
dp-ps Lists all processes. debug information dp-ps
Lists the number of processes currently running in the control and data
planes, the maximum CPU usage, and the average CPU usage. The
debug information
ticks following options provide more information: -details: Provides a more debug information ticks
detailed list of processes and CPU usage. -tiers: Lists processes and CPU
usage by tier.
clear-caches Clears the reputation caches. debug reputation clear-cache
debug reputation lookup Looks up an address in the reputation database. debug reputation lookup <IP address>
show-cachestats Shows the reputation cache statistics. debug reputation show-cache-stats
debug best-effort- enable Enables Best Effort mode. debug np best-effort enable [-queue-latency <microseconds>] [-recover-percent <percent>]
mode disable Disables Best Effort mode. debug np best-effort disable
Defines the latency threshold at which Best Effort mode is entered. The
-queuelatency debug np best-effort enable -queue-latency <microseconds>
default is 1000 microseconds.
debug np best-effort Defines the recovery percentage at which Best Effort mode is exited. The
options default is 20%; if the latency threshold is 1000 microseconds, the device
-recoverpercent debug np best-effort enable -recover-percent <percent>
exits Best Effort mode when latency drops to 200 microseconds (20% of
1000).
list Returns a list of all traffic captures currently saved on the IPS. debug traffic-capture list
Removes a saved traffic capture. Use the -f flag to force the removal of the debug traffic-capture remove <traffic capture filename>
remove
file when a traffic capture is in progress. debug traffic-capture remove -f <traffic capture filename>
Initiates a traffic capture. This subcommand can be used in conjunction
start debug traffic-capture start [-c <number of packets>] [-C <file size>] [-i <virtual segment>] [-w <file>] <expression>
debug traffic-capture with the options or with an expression.
If only one traffic capture is currently in progress, terminates the traffic
debug traffic-capture stop
stop capture in progress. If two or more traffic captures are currently in
debug traffic-capture stop <filename>
progress, you must specify a filename.
stop-all Stops traffic captures currently in progress. debug traffic-capture stop-all
Defines the number of packets at which the traffic capture will stop. The
-c debug traffic-capture start -c <number of packets>
default is 100.
Defines the capture file size at which the traffic capture will stop. The size
-C debug traffic-capture start -C <file size>
is defined in bytes. The default is 100000.
Sets the virtual segment on which the traffic will be captured. The default
debug traffic-capture
-i is all defined virtual segments. The segment should be defined with the debug traffic-capture start -i <virtual segment> <expression>
start options
syntax 1A-1B.
Defines a name for the traffic capture file. Do not include an extension; the
TOS will automatically append one. The default file name is the date and
-w debug traffic-capture start -w <file>
time at which the traffic capture was initiated, in the format YYYYMMDD-
HHMMSS.pcap.
Command Subcommand Description Usage
Reboots the device and wipes out the user database. Use the -add and -
password options to create a new default super user. If you do not specify
a username and password, you will be forced to create one via the serial
auth delete port terminal when the device reboots. -add: Defines the new default fips auth delete fips auth delete -add <user name> -password <password>
super-user name. -password: Creates a password for the user. If you
specify an asterisk (*) for the password, you will be prompted for the
password.
Manages generated keys and SSL keys. You must specify two options for
fips managing SSL keys. The first option specifies what to do with the
generated keys: keep: Saves the keys when the box is rebooted.
generate: Generates a new key on reboot. delete: Deletes the generated
keys fips keys <keep/generate/delete> <keep/delete/restore-default>
keys on reboot. The second option specifies the action for the authorized
SSL key that was originally obtained with the device. This option does not
take effect until after a reboot keep: Saves the key. delete: Deletes the
default key. restore-default: Restores the default key.
restore-ssl Restores the default SSL key. fips restore-ssl
The fallback option forces the TippingPoint into fallback or Intrinsic
high-availability force fallback
force Network High Availability (INHA) mode. The normal option causes the
high-availability force normal
TippingPoint to return to normal (non-INHA) operation.
Forces a ZPHA module into one of two modes: normal: traffic passes
through the IPS bypass: traffic bypasses the IPS With no options
high-availability high-availability zero-power bypass-ips [-segment <segment name>]
specified, this command affects the external ZPHA module. Use the -
high-availability zero-power no bypass-ips [-segment <segment name>]
zero-power segment option to set the mode of a Smart ZPHA module. A ZPHA module
high-availability zero-power bypass-ips [-all]
may be one of the following: An external module connected to the device
high-availability zero-power no bypass-ips [-all]
through the ZPHA interface. A Smart ZPHA module on the 2500N,
5100N, or 6100N.
-q Suppresses statistics ping <IP address> <packet count> -q
-v Returns verbose results. ping <IP address> <packet count> -v
ping
-4 IPv4 traffic only. ping <IP address> <packet count> -4
-6 IPv6 traffic only. ping <IP address> <packet count> -6
Adds an IP address to the quarantine list. You can also enter an action set
add quarantine add <IP address> <action set name>
that will apply to all traffic from that IP address.
empty Flushes the quarantine list of all IP addresses. quarantine empty
quarantine Displays a list of quarantined IP addresses. You can filter the addresses
list with the filter subcommand and an IP string, and you can use * as a quarantine list quarantine list filter <IP address>
wildcard, as in 100.*.*.*.
remove Removes an IP address from the quarantine list. quarantine remove <IP address>
emaildefault Configures the default email contact. setup email-default
ethernetport Configures the ethernet ports. setup ethernet-port
host Configures the management port. setup host
setup servers Configures Web, CLI, and SNMP servers. setup servers
sms Restricts SMS to a specified IP address. setup sms
time Configures time management. setup time
vlan-translation Configures VLAN translation. setup vlan-translation
action-sets Displays all action sets with their settings and contacts. show action-set
arp Displays the link level ARP table. show arp
autodv Displays the state of the automatic DV feature. show autodv
clock Displays the time and timezone for the internal clock. show clock show clock -details
Displays whether the compact flash is mounted, and if so, its model
compact-flash number, serial number, revision number, capacity, operation mode, and show compact-flash
mount status.
Displays the to and from addresses and SMTP settings for the default alert
defaultalert-sink show default-alert-sink
sink.
default-gateway Displays the IP address of the default gateway. show default-gateway
show subcommands deployment-choices Displays the deployment modes available for the device. show deployment-choices
dns Displays the DNS that the device is using. show dns
filter Displays the filter information. Specify the filter by number. show filter <number>
Displays FIPS and key information. Use the -details option for more
fips show fips show fips -details
information.
show health disk-space
show health fans
show health i2c-bus
Displays the disk space, memory usage, power supply status, temperature,
health show health memory
fans, I2C bus timeouts, and voltage of the device.
show health power-supply
show health temperature
show health voltage
high-availability Displays the current HA status. show high-availability
Displays the host management port configurable options and the current show host
host
settings. Use the -details option for more information. show host -details
show inspection-bypass
inspection-bypass Displays the inspection bypass rules.
show inspection-bypass -details]
Displays network interface data. Specify one of the following:
show interface mgmtEthernet
interface mgmtEthernet: Management interface. ethernet: Port specifier (1A, 1B,
show interface ethernet
etc.)
Command Subcommand Description Usage
license Shows the license status for the TOS, Digital Vaccine, and IP Reputation. show license
show log alert
show log audit
Displays a log file. Only users with super-user privileges can view the audit show log block
log
log. show log quarantine
show log summary
show log system
Displays manufacturing information, including the device serial number and
mfg-info show mfg-info
MAC address.
show np engine
show np engine filter
show np engine packet
show np engine parse
show np engine reputation dns
show np engine reputation ip
show np engine rule
np Displays the network processor statistic sets. show np general
show np general statistics
show np protocol-mix
show np reassembly
show np reassembly ip
show np reassembly tcp
show np rule-stats
show np softlinx
show subcommands policy counters Displays the counters for Total, Invalid, Alert, and Blocked. show policy counters
Displays detailed information about a named profile. Enclose the name of
profile show profile "<profile name>"
the profile in quotes "".
protection-settings Displays category settings. show protection-settings -profile <profile name>
show ramdisk files
ramdisk Displays the RAM disk status.
show ramdisk stats
rate-limitspeeds Displays all valid rate limit speeds. show rate-limit-speeds
show reputation
reputation Displays the reputation groups and filters. show reputation filter <filter name>
show reputation groups
routes Displays the configured routes. show routes
server Displays the servers running on the device. show servers
service-access Displays the status of service access to the device. show service-access
session Displays the current session settings. show session
Indicates whether an SMS is managing the device and displays information
sms show sms
about the SMS.
sntp Displays the current SNTP settings. show sntp
timezones Displays the available timezones. show timezones
Displays all traffic management filters defined in a traffic management
traffic-mgmt profile. You must specify the profile by name unless there is only one show traffic-mgmt -profile <profile name>
profile on the device.
show tse adaptive-filter top-ten
show tse connection-table blocks
tse Displays information and settings regarding the Threat Suppression Engine. show tse connection-table timeout
show tse connection-table trusts
show tse rate-limit streams
user Displays the user login accounts on the TippingPoint device show user show user -details
version Displays the version of the TOS software running on the IPS device. show version
virtual-port Displays information about a virtual port. show virtual-port <port number>
virtual-segments Displays all of the virtual segments configured on the device. show virtual-segments
Lists all action sets that have been defined for this device. You can also show conf action-set
action-set
view a single action set by specifying the action set name. show conf action-set <action set name>
authentication Displays the remote authentication configuration. show conf authentication
Shows configuration settings for the automatic update service for Digital
autodv show conf autodv
Vaccine packages.
Shows configuration settings for filter categories. You can also view the show conf category-settings
category-settings
settings for a single profile by specifying the profile name. show conf category-settings -profile <profile name>
show configuration clock Shows timezone and daylight saving time settings. show conf clock
compact-flash Shows the compact flash operation mode. show conf compact-flash
default-alertsink Shows the default email address to which attack alerts will be directed. show conf default-alert-sink
default-gateway Shows the device default gateway. show conf default-gateway
Shows the maximum number of email notifications the system will send
email-ratelimit show conf email-rate-limit
every minute. The minimum is 1; the maximum is 35.
filter Shows the filter data for a specific filter, identified by filter number. show conf filter <number>
high-availability Shows high availability configuration settings. show conf high-availability
host Shows the host name and location. show conf host
inspection-bypass Shows the current inspection bypass rule configuration. show conf inspection-bypass
Command Subcommand Description Usage
When used without qualifiers, shows configuration of all ports. ethernet
shows Ethernet port information. Without options, this subcommand shows show conf interface
the status of all Ethernet ports. Use port specifiers (1A, 2A, etc.), to view show conf interface ethernet
interface
the status of a single port. mgmtEthernet shows Management Ethernet show conf interface mgmtEthernet
port information settings shows the persistent configuration settings for show conf interface settings
MDI-detection.
lcd-keypad Shows the configuration setting for the LCD keypad. show conf lcd-keypad
show conf log
log Shows log configuration.
show conf log audit-log
monitor Shows the persistent configuration of monitor thresholds. show conf monitor
nms Shows the NMS settings. show conf nms
notify-contacts Shows the notification contacts and settings. show conf notify-contacts
port Shows the configuration of all ports on the IPS. show conf port
Lists all profiles that have been configured on the device. You can view an show conf profile
profile
individual profile by including the profile name. show conf profile <profile name>
Shows the protection settings. You can also view the settings for a single show conf protection-settings
protection-settings
profile by specifying the profile name. show conf protection-settings -profile <profile name>
show configuration ramdisk Shows the RAM disk configuration. show conf ramdisk
Shows the remote syslog configuration and the IP address of the remote
remote-syslog show conf remote-syslog
log.
show conf reputation
Shows the configuration of reputation filters and groups, and of the IP
reputation show conf reputation group
Reputation feature.
show conf reputation filter
Shows the segment configuration. You can view an individual segment by show conf segment
segment
including the segment name. show conf segment <segment name>
server Shows the device server configuration. show conf server
service-access Shows whether service access is enabled or disabled. show conf service-access
Shows the session timeout settings. Use show session to view the current
session show conf session
session configuration.
sms Shows if SMS is enabled and other SMS configuration settings. show conf sms
sntp Shows the SNTP configuration. show conf sntp
traffic-mgmt Shows the traffic management configuration. show conf traffic-mgmt
Shows the TSE information, including connection table timeout,
tse asymmetric network setting, adaptive aggregation threshold, adaptive filter show conf tse
mode, and IDS mode.
show conf user
user Shows user options. Use the -detailsoption to view additional information.
show conf user -details
Shows virtual port configuration. To show the configuration of a specific show conf virtual-port
virtual-port
virtual port, specify the virtual port name. show conf virtual-port <virtual port name>
virtual-segments Shows the configuration of the virtual segments. show conf virtual-segments
vlantranslation Shows the VLAN translation configuration show conf vlan-translation
create Creates a snapshot with the given name. snapshot create <snapshot name>
list Lists all snapshots saved on the device. snapshot list
remove Deletes the named snapshot. snapshot remove <snapshot name>
snapshot
Replaces the current configuration settings with the settings in the named
restore snapshot. This process may take some time and will require a reboot of the snapshot restore <snapshot name>
device.
When this flag is included in the command, the snapshot will include the
-include-reput ation snapshot create -include-reputation
files from the Reputation DV pacakge in the snapshot.
When this flag is included in the command, the snapshot will include the
-include-manua l-entries snapshot create -include-manual-entries
user-defined IP and DNS reputation entries in the snapshot.
snapshot options When this flag is included in the command, the snapshot will include
-include-network snapshot create -include-network
management port configuration information.
When this flag is included with the snapshot restore command, the
-exclude-network snapshot excludes management port configuration information during the snap
restore process.