Tps 5.4 Cli Ref
Tps 5.4 Cli Ref
Certain features available in Trend Micro products collect and send feedback regarding product usage and detection information to Trend Micro.
Some of this data is considered personal in certain jurisdictions and under certain regulations. If you do not want Trend Micro to collect personal
data, you must ensure that you disable the related features.
The following link outlines the types of data that the Security Management System collects and provides detailed instructions on how to disable the
specific features that feedback the information.
https://success.trendmicro.com/data-collection-disclosure
Data collected by Trend Micro is subject to the conditions stated in the Trend Micro Privacy Policy:
https://www.trendmicro.com/en_us/about/legal/privacy-policy-product.html
Legal Notice
© Copyright 2020 Trend Micro Incorporated. All rights reserved.
Trend Micro, the Trend Micro t-ball logo, TippingPoint, and Digital Vaccine are trademarks or registered trademarks of Trend Micro Incorporated.
All other product or company names may be trademarks or registered trademarks of their owners.
When you initially install the device and run the Setup Wizard, you create a superuser account that you will
use to access the device through the LSM or the CLI. By default, SSH and HTTPS are enabled on the device for
the management port IP address. You can access the CLI directly through the system console or remotely
through SSH. Non-secure connections, such as Telnet, are not permitted.
Note
When there has been no CLI activity for 15 minutes, connection to the device times out.
Your access to the CLI is determined by your group membership and roles and capabilities. To configure
granular levels of access, you can use the aaa (Authentication and Authorization and Auditing) context to
modify users, groups, roles, and their capabilities.
SSH configuration
To configure cryptographic parameters for an SSH remote syslog server or client that is not a TippingPoint
device, such as a Linux server, refer to the applicable online documentation.
For TippingPoint devices, you can enable and disable ciphers using a debug command in conjunction with
TippingPoint support. Contact support for information on whether other cryptographic parameters are
configurable.
To configure the "Remote System Log" contact to use SSH, use the following command:
ips{}edit
ips{running}notifycontacts
ips{running-notifycontacts}contact "Remote System Log"
To identify which syslog server to send the logs to, use the following command:
To identify the user of the remote syslog server, use the following command:
Consult the applicable online documentation for information on generating a key pair. To import the public
key for the remote syslog server, use the following command:
ips{}edit
ips{running}notifycontacts
ips{running-notifycontacts}contact "Remote System Log"
ips{running-notifycontacts-Remote System Log}ssh-host-key SERVER PORT PUBLICKEY
To import the private key for the remote syslog server, use the following command:
1
TPS Command Line Interface Reference
Administrators cannot specify whether users must use either password or key-based authentication.
However, key-based authorization is prioritized over password authentication (on a per-user basis) for users
that have the SSH public key set.
Note
After the maximum number of authentication attempts you have configured (the range is 1–10) is reached, a
lockout condition results.
To upload a user public key:
ips{}edit
ips{running}aaa
ips{running-aaa}user USER
ips{running-aaa-user-USER}ssh-public-key SSH_PUBLIC_KEY
ips{running-aaa-user-USER}commit
ips{}edit
ips{running}aaa
ips{running-aaa}user USER
ips{running-aaa-user-USER}delete ssh-public-key
ips{running-aaa-user-USER}commit
To enable the device to send logs to the remote syslog server, use the following commands:
CLI syntax
The CLI uses the following syntax:
Examples
In the example below, required arguments for the traceroute command must either use an IP address or the
hostname. An optional argument can be “from” a source IP address:
2
TPS Command Line Interface Reference
You can use the TAB key to complete partial commands. If the partial command is ambiguous, pressing the
TAB key twice gives a list of possible commands.
Shortcut Description
? Question mark at the root prompt or after a command (separated by space) lists the next valid sub-
commands or command arguments.
Question mark can also be used after sub-commands for more information.
A question mark immediately following a character(s) (no space) will list commands beginning with those
characters.
! Exclamation mark before a command allows you to execute the command from any feature context or sub-
level. Example: ips{running-gen}!ping 203.0.113.0
Ctrl + Y Pastes from the special clipboard used by Ctrl + U and Ctrl + K.
Hierarchical context
Prompts are displayed based in a hierarchical context. The following table shows the root, edit, and log
configuration modes.
Prompt Description
ips{} Displays the top-level root mode. This context is displayed when you first log in
to the CLI.
ips{running} Displays the configuration mode by changing the prompt to running. This
indicates you will be making changes to the running configuration.
3
TPS Command Line Interface Reference
Prompt Description
ips{}log-configure Enters the log-configure context to access the log configuration mode.
ips{running}! Leaves the configuration mode from any context and returns to the top-level
root mode.
Help
The help command provides a list of commands within the current context and the command line usage. You
can run issue the help command with or without an argument.
Command Description
help or ? Displays a list of all commands. (The question mark at any context level generates
a list of available commands within the context, along with a brief description).
string? Shows the commands or keywords that match the string. For example, s?.
Command modes
The TPS uses a hierarchical menu structure. Within this structure, commands are grouped by functional area
within one of three command modes:
Root When you first log in to the device, you enter the top of the hierarchy, the root mode.
ips{}
A context is an environment in which you can configure a set of parameters for a feature or named object. A
context can be the name of an instance of an object set by the administrator, or can be the feature itself. The
current context is indicated in the command prompt, as shown in the examples above.
Your user role determines whether you have access to all contexts or only specific contexts. Authorization is
controlled by granting users access through the authentication context (aaa).
The help and display commands are useful in becoming familiar with the context options. The question
mark (?) lists the next valid entry and help for this entry.
4
TPS Command Line Interface Reference
If the device is managed by SMS, you will have read-only access to the system resources. To determine if an
SMS controls the device, or to change the control, see the sms command.
To change the default ips { command prompt, use the host name command in the interface mgmt context
of the edit mode. For example:
ips{}edit
ips{running}interface mgmt
ips{running-mgmt}help host
This displays valid entries for configuring management port host settings.
To display valid entries for the host command, type:
ips{running-mgmt}host ?
Note
A valid hostname consists only of alpha-numeric characters and hyphens, and cannot exceed 63 characters or have
a hyphen at the beginning or end.
For a list of root commands and their usage see Root commands.
ips{}edit
ips{running}
5
TPS Command Line Interface Reference
The CLI prompt indicates that you are in the edit mode and you can then make configuration changes.
Configuration options, and sub contexts are available for use until you exit this mode.
To exit the current context, use the exit command.
ips{running}exit
To exit the edit configuration mode from the top-level ips{running} prompt, use the exit command.
ips{running}exit
To exit the edit configuration mode from any context, use the ! command.
ips{running}!
When you exit the edit configuration mode, the following warning is displayed: “WARNING: Modifications
will be lost. Are you sure to exit (y/n)? [n]”
y discards any uncommitted changes you made to the configuration file. n keeps you in the edit configuration
mode.
View and commit configuration changes
The display command is a helpful utility to view the current running configuration and to review your
configuration changes before you save them.
ips{running} display
You must use the commit command to save your changes to the running configuration.
Container and object statements
The command hierarchy has two types of statements. The container statement, which contain objects, and
the object statement, which are actual commands with options.
For example:
• Container statement in edit mode:
ips{running}log
ips{running-log}? (The question mark will list all the available entries.)
• Object statement:
ips{running}
6
TPS Command Line Interface Reference
• Run the exit command to leave the current context. If you are in the top-level root ips{} context, this
command leaves the configuration mode.
• Run the ! command to leave the configuration mode from the current context.
Snapshots capture the configuration of a device, which can then be delivered to technical support for
troubleshooting. Users can also use snapshots to save and re-apply configurations. Snapshots include the
currently installed OS version, and cannot be restored on a device that is not running the same version of the
OS. If a snapshot restore needs to be completed, use the following command:
A warning message is displayed, followed by an automatic reboot when snapshot restore is completed.
The CLI uses the deferred-commit model. In this capacity, the architecture maintains a set of configuration
files to ensure that a working configuration is persistently maintained. This configuration set includes the
following configuration files.
• Running configuration — This version is currently executing on the system. Any changes that
administrators make from the edit mode (except for IPS features, action sets, application groups, and
notification contacts) will take effect once they have been committed, by issuing the commit command. If
changes are not committed, all modifications are discarded on exit from the running context. If
multiple administrators are on the system, the version that was last committed is used as the current
running configuration and is visible to other administrators, once they have exited the edit mode. A
warning prompt is displayed if the committed changes would overwrite configuration that was made by
another administrator since the configuration was edited.
• Saved (persistent) configuration — This is the running configuration that was last committed prior to
executing the save-config command. The device copies the saved configuration to the start
configuration when the system reboots.
• Start configuration — This is a backup copy of the configuration file saved at the time of system startup,
and is loaded at the next system bootup. The rollback-config command can be used to rollback to a
persistent and running configuration that was the last known good configuration.
Note
Future versions of the product will support multiple named saved configuration sets.
Utilities
The display and show commands are helpful for troubleshooting and monitoring the operational status of
the system. Command line usage can be found in Root commands.
7
TPS Command Line Interface Reference
Display
Enter display to see your candidate configuration settings for a context. Any modifications you make can be
viewed using the display command. The output of the display command depends on where the command is
executed. If executed at the configuration level, it displays the entire configuration of the unit. Executing the
display command with a configuration name parameter, or from within a context displays the contents of
that particular configuration.
Show
The show command is most efficient in providing critical information, such as traffic usage, router platform
type, operating system revision, amount of memory, and the number of interfaces. The show command can
also be used to evaluate logging, troubleshooting, tracking resources, sessions, and security settings. To view
all the available show utilities, enter the help show command at the root command level. All the available
commands along with the correct command line usage are displayed.
Global commands
Global commands can be used in any context.
cls
Clears the terminal screen.
cls
commit
Commits your pending configuration changes to the Running configuration.
When you commit configuration changes, or when changes are committed automatically, the changes are
committed to the Running configuration, and the changes are visible to all users. However, when the device
reboots, the Running configuration is reset to the Startup configuration. Uncommitted changes and
committed changes in the Running configuration are lost.
Tip
To copy the Running configuration to the Startup configuration without exiting the configuration mode, prepend
the save-config command with an exclamation mark (!), for example !save-config. This command does not
commit any pending changes to the Running configuration.
Syntax
commit
To commit your pending changes to the Running configuration, and then copy the Running configuration to
the Startup configuration, enter the following commands:
ips{running}commit
ips{running}!save-config
8
TPS Command Line Interface Reference
Related commands
Command Description
display
Displays the current configuration, or the candidate configuration before a commit is issued. Display options
vary by context, enter the help display command in a context to view the available options.
Syntax
display
display [xml]
edit
The edit context modifies the configuration that identifies the security policy and interfaces that you can
configure for your device.
Edit takes an instance of the running configuration file. This instance is your version. After making
modifications to this candidate configuration version, you have the option of saving it to the running
configuration, or discarding any changes you made. To discard, simply exit. To save your candidates
configuration, enter the commit command before exiting the edit context. To see commands under the edit
context, see Edit configuration mode.
ips{}
ips{}edit
ips{running}
9
TPS Command Line Interface Reference
ips{running}commit
ips{running}exit
ips{}
Note
Use debug commands only when you are instructed to do so by TippingPoint product support. You must have
SuperUser permissions to use debug np commands.
help
Displays help information.
Syntax
help [full|COMMAND]
Root commands
The top level root command line mode displays the ips{} prompt. Commands at this level are used for
managing and monitoring system operations for the various subsystems. From the root command mode, you
can access the configuration mode, and the available commands that apply to the device as a whole. Enter
help full or help COMMANDNAME at the command prompt to display a list of available commands or help on
a specific command.
ips{}help
The default ips{} command prompt can be changed using the host name command in the interface mgmt
context of the edit mode. For example:
ips{}edit
ips{running}interface mgmt
ips{running-mgmt}help host (displays valid entries for configuring management port host settings)
Note
Use debug commands only when you are instructed to do so by TippingPoint product support. You must have
SuperUser permissions to use debug np commands.
boot
Lists software packages and rollback to a previous version.
Syntax
boot (list-image|rollback)
10
TPS Command Line Interface Reference
chpasswd
Enter this command to change the password for your local user account, or for another local user. To change
the password for another user, you must be associated with the SuperUser role.
You can use this command when the device is managed by the SMS, or is unmanaged.
Syntax
chpasswd user_name
clear
Clears system stats, logs, locked users, adaptive filter configurations (AFCs), or packet traces.
Syntax
clear adaptive-filter [all|FILTERNUMBER]
clear np reassembly ip
clear np rule-stats
clear np softlinx
clear np tier-stats
date
Used alone to set and display the current date and time, or with arguments to configure the date in a 24-hour
format. The date command shows the current time in the time zone configured on the device and the "gmt"
argument shows the time in GMT (UTC).
Syntax
date [MMDDhhmm[[CC]YY][.ss]])
11
TPS Command Line Interface Reference
date gmt
delete
Deletes various items.
Syntax
delete
delete auxdv
Delete Aux DV.
Syntax
display conf
Displays information on a particular configuration file in either the start configuration or the running
configuration.
Syntax
display conf start|running conf-name
Enter the display conf command and press the Tab key twice to display a list of available configuration
files.
display-config
Displays information on the configuration specified (either the start configuration or the running
configuration).
Syntax
12
TPS Command Line Interface Reference
display-config (start|running)
edit
The edit context modifies the configuration that identifies the security policy and interfaces that you can
configure for your device.
Edit takes an instance of the running configuration file. This instance is your version. After making
modifications to this candidate configuration version, you have the option of saving it to the running
configuration, or discarding any changes you made. To discard, simply exit. To save your candidates
configuration, enter the commit command before exiting the edit context. To see commands under the edit
context, see Edit configuration mode.
ips{}
ips{}edit
ips{running}
ips{running}commit
ips{running}exit
ips{}
Note
Use debug commands only when you are instructed to do so by TippingPoint product support. You must have
SuperUser permissions to use debug np commands.
13
TPS Command Line Interface Reference
fips-mode-enable
Enables the Federal Information Processing Standard (FIPS) on a TPS device.
Before you run this command, always reset the device to factory default settings.
When you run this command, it prompts you to confirm that you want to enable FIPS mode. After you enable
FIPS mode, it cannot be disabled except by resetting the device to factory defaults.
Note
Both RADIUS and TACACS+ authentication use protocols that are not FIPS-compliant. Do not enable FIPS mode if
you have remote authentication configured.
After you run this command, you must reboot the device to enable FIPS mode. If FIPS mode fails, the reboot
aborts and the user is sent to the system recovery prompt. In addition, the system log records a message with
a PASS or FAIL status of FIPS mode. For help diagnosing the issue, contact support.
Syntax
fips-mode-enable
Use the show fips-mode command to verify whether FIPS mode was successfully enabled.
halt
Enter the halt command to shut down the TippingPoint operating system and halt the CPU while
maintaining power to the device. After you run this command, the device still has power so Layer-2 Fallback
(L2FB) enables traffic to pass through the device:
• For the 440T, power can be removed by unplugging the unit or by turning off the power switch on the
back of the unit. To restart the 440T, wait at least 60 seconds before you re-apply power.
• For the 2200T, power can be removed by holding down the front panel power button for 5 seconds, and
can be restored by pressing the power button.
Syntax
halt
high-availability
Use the high-availability context to manage Intrinsic Network High Availability (INHA) and Zero-Power
High Availability (ZPHA).
• INHA determines how the device manages traffic on each segment in the event of a system failure:
• Layer-2 Fallback (L2FB) – Either permits or blocks all traffic on each segment, depending on the INHA
L2FB action setting for the segment. Any permitted traffic is not inspected.
Important
If you enable INHA L2FB, L2FB not persist when you reboot the device.
• ZPHA determines how the device routes traffic in the event of a loss of system power:
14
TPS Command Line Interface Reference
• Bypass – Bypasses traffic at the port level to maintain high availability of any network segments that
have ZPHA support. When ZPHA bypass is enabled, the INHA Layer-2 fallback action setting for
each segment is ignored.
Important
If you enable ZPHA bypass, bypass persists when you reboot the device.
• Normal – Routes traffic from each network segment to the Threat Suppression Engine (TSE) for
inspection.
• On a TippingPoint TX Series device, optional bypass I/O modules provide high availability for copper
and fiber segments. You can enable bypass mode on a particular slot or all slots with a bypass I/O
module. When you configure a TX Series device, use the slot parameter to specify a particular I/O
slot or the all parameter to specify all slots.
• On a TippingPoint 2200T security device, ZPHA support is built-in for copper segments. An external
ZPHA module is required to enable ZPHA on SFP and SFP+ segments. Bypass mode can be enabled
on all segments of the device only.
• On a TippingPoint 440T security device, ZPHA support is built-in for copper segments only. Bypass
mode can be enabled on all segments of the device only. You do not need to specify the all
parameter to enable ZPHA bypass on a TPS 440T or 2200T security device
• On a TippingPoint Virtual Threat Protection System (vTPS) security device, ZPHA bypass mode
cannot be enabled.
Syntax
keystore
Changes the keystore mode to enable private keys to be secured in the device keystore or the SMS. This
command automatically clears the contents of the keystore. If the device is managed by the SMS, first
unmanage the device, then use this command to persist private keys on the device.
Only use this command when absolutely necessary, such as when the device has lost contact with the SMS,
or other similar troubleshooting situations. Under normal conditions, this setting should only be changed by
using the SMS.
Change the keystore mode, for example, if the SMS is unreachable and you want the device to persist its own
private keys. Use the sms-unmanage command to unmanage the device, and then use the keystore on-
device command to change the keystore mode to the local keystore. After you change the keystore mode, use
the save-config command to copy the running configuration (which includes the private keys in the
Running configuration) to the Start configuration. If the private keys are not in the running configuration, for
example, because you rebooted the device after you unmanaged it, use the private-key command to import
the private keys manually.
15
TPS Command Line Interface Reference
Note
When the keystore mode is sms-managed, private keys are not persisted in the device keystore.
Syntax
keystore on-device|sms-managed
Related commands
Command Description
ips{running-certificates}private-key Import the private key from your web server into the local
keystore on the device.
ips{running-certificates}certificate Import the certificate from your web server into the local
keystore on the device.
ips{running-sslinsp}server Add an SSL server proxy to the device with the same security
settings as your web server, and assign the corresponding
certificate and private key.
ips{running-sslinsp}client-proxy Add an SSL client proxy to the device with the same security
settings and signing certificate of the web server that decrypts
the client traffic it receives.
list
Displays traffic capture file list.
Syntax
list traffic-file
log-configure
Enters log configuration context.
Syntax
log-configure
logout
Logs you out of the system.
Syntax
logout
master-key
You can set the master key to a device-generated key that is unique to the device or specify your own master
key passphrase. By default, TOS v5.0.0 and later encrypts the system keystore with a device-generated master
key.
(Best Practice) To avoid keystore issues with a TOS rollback, set the master key to a passphrase that you
specify. If the keystore in the rollback image is secured with a different master key than the master key that is
16
TPS Command Line Interface Reference
set on the device, you can set the master key to the correct passphrase. For more information, see the Local
Security Manager User Guide.
Before you change the master key, keep in mind the following points:
• By default, the external user disk is not encrypted. You can easily access the contents of the external user
disk from a different device.
• If you choose to encrypt the external user disk, the master key encrypts and decrypts the external user
disk.
• If you change the master key while the external user disk is encrypted, all traffic logs, snapshots,
ThreatDV URL Reputation Feed, User-defined URL Entries database, and packet capture data are
erased from the external user disk.
• To access the contents of an encrypted external user disk from a different device, for example to
restore a snapshot, the same master key must also be set on the device.
Note
For security purposes, these commands require you to re-enter your password. If you incorrectly enter your
password too many times, you are temporarily locked out for two minutes. To verify your account lock status, enter
the show user locked command.
Syntax
master-key (set [device-generated-key|passphrase]|reset-keystore)
ping
Tests connectivity with ICMP traffic. The mgmt option uses the management interface.
Syntax
ping (A.B.C.D|HOSTNAME) [count INT] [maxhop INT] [from A.B.C.D] [datasize INT]
ping6 (X:X::X:X|HOSTNAME) [count INT] [maxhop INT] [from X:X::X:X] [datasize INT]
ping6
Tests connectivity with ICMPv6 traffic.
17
TPS Command Line Interface Reference
Syntax
ping6 (X:X::X:X|HOSTNAME) [count (1-900000)] [maxhop (1-800)] [from X:X::X:X] [datasize
(64-65468)]
quarantine
Manages the quarantined traffic and IP address. Enables you to see and clear a quarantine list, and add or
remove quarantined IP addresses.
Syntax
quarantine add <IP> <Actionset>
quarantine empty
quarantine list
Related commands
show quarantine-list
reboot
Reboots the system. On a TPS device, this command puts the device in Intrinsic HA Layer-2 Fallback mode
until the TOS completes its boot sequence. On a vTPS device, traffic flow is interrupted until the boot
sequence completes because, unlike a TPS device, the network ports on the vTPS device are virtual.
Specify a full system restart with the full option. On a TPS device, this command temporarily removes
power from the device which puts the device in ZPHA Bypass mode until the TOS completes its boot
sequence. On a vTPS device, traffic flow is interrupted until the boot sequence completes because, unlike the
TPS device, the network ports on the vTPS device are virtual.
Syntax
reboot [full]
reports
Configure data collection for on-box reports.
Syntax
reports (reset|enable|disable) [all|cpu|disk|fan|memory|network|rate-limiter|temperature|
traffic-profile|vpn]
Valid entries:
reset Delete report data
enable Start data collection for reports
disable Stop data collection for reports
Related commands
show reports
resize
Resizes the terminal.
18
TPS Command Line Interface Reference
Syntax
resize
save-config
Copies the Running configuration to the Startup configuration. When you reboot the device, the Startup
configuration is applied to the device.
Note
To run this command, you must be at the top-level root ips{} mode. To run this command without exiting the
current context, prepend an exclamation mark (!) to the command. When run from a context, this command does
not commit your pending changes to the Running configuration.
Syntax
save-config
Related commands
Command Description
service-access
Enables or disables service access.
Syntax
service-access (enable|disable)
set
Configures an item.
Syntax
set cli filtering rule (auto-comment|no-auto-comment|(last-auto-comment-value INT))
setup
Runs the setup wizard.
Syntax
setup
show
View current system configuration, status, and statistics.
Command Description
19
TPS Command Line Interface Reference
Command Description
show np rule-stats Show network processor rules, number of flows, successful matches.
show np tier-stats Show network processor throughput and utilization for each tier.
20
TPS Command Line Interface Reference
Command Description
show aaa
Syntax
show aaa capabilities USER
show auxdv
Displays AuxDV package.
Syntax
show auxdv
show date
Shows the GMT time or the local time and time zone for the device.
Syntax
show date [gmt]
show dns
Syntax
show dns
show filter
Displays the filters.
Syntax
show filter [XFILTERNUMBER | UDVFILTERNUMBER]
Note
You can locate the application filter numbers from the LSM page, Reports > Top Filter Matches.
show health
Shows health information.
21
TPS Command Line Interface Reference
Syntax
show health
show high-availability
Syntax
show high-availability
Related Commands
show inspection-bypass
Syntax
show inspection-bypass
show interface
Syntax
show interface [INTERFACE [statistics [update INT]]]
show key
Shows local server SSH key.
Syntax
show key
show license
Syntax
show license
show log-file
The following log files are available:
• system
• audit
• boot
• ipsAlert
• ipsBlock
• reputationAlert
• reputationBlock
• quarantine
22
TPS Command Line Interface Reference
Sytnax
show log-file boot [tail [COUNT]] [more]
If using the more option, the colon will display in the output, to indicate more information is available. Press
the Enter key for the scroll to continue, or enter a q to exit and return to the ips{} prompt.
Syntax
23
TPS Command Line Interface Reference
24
TPS Command Line Interface Reference
Shows the beginning sequence number, ending sequence number, and number of messages for the given log
file.
Syntax
show log-file FILE_NAME stat
Syntax
show log-file summary [verbose]
show mfg-info
Shows manufacturing information.
Syntax
show mfg-info
25
TPS Command Line Interface Reference
show np engine
Shows network processor information.
Syntax
show np engine(filter|packet|parse|reputation(ip|dns)|rule)
filter - Show filter-level statistics
packet - Show packet-layer statistics
parse - Show packet parsing statistics
reputation - Show reputation statistics on either IP or DNS
rule - Show rule statistics
show np mcfilt-rule-stats
Shows microfilter rules, number of flows, and successful matches.
Syntax
show np mcfilt-rule-stats
show np protocol-mix
Syntax
show np protocol-mix
show np reassembly
Syntax
show np reassembly (ip|tcp)
show np rule-stats
Syntax
show np rule-stats
show np softlinx
Syntax
show np softlinx
show np tier-stats
Displays statistics for monitoring activity since the last reboot of the device. Reboot the device to reset these
counters.
Syntax
show np tier-stats
26
TPS Command Line Interface Reference
show ntp
Syntax
show ntp
show quarantine-list
Syntax
show quarantine-list
show reports
Shows the status of the data collection for reports.
Syntax
show reports
show service
Shows the state of all the services.
Syntax
show service
show sflow
Syntax
show sflow
show slot
Displays slot configuration, including the module type currently in the slot. Changes to the slot configuration
are not reflected in the output of this command until after you reboot the device.
Syntax
show slot
show sms
Sytnax
show sms
show snmp
Syntax
show snmp
27
TPS Command Line Interface Reference
Values Definition
Connection rate Average number of SSL-inspected connections per second over the previous
10 minutes.
Congested action Action taken by the device when the maximum number of active SSL-
inspected sessions is reached:
• Pass: Sessions beyond the maximum count are not decrypted and are
treated like all other IPS traffic.
• Block: Sessions beyond the maximum count are blocked.
show stacking
Enter this command to show stacking status information.
Syntax
show stacking
Reference
Parameter Information
Stack member state Indicates the current working state of this device on the stack.
Stack master Indicates whether this device manages the state of the stack.
Number of devices configured in stack Indicates the number of TippingPoint TPS security devices that are
connected together through the stacking bus.
Number of devices required in stack Indicates the minimum number of devices that must be available
to the stack for normal operation. If the number of normal devices
falls below this threshold, the stack goes into Intrinsic HA L2FB.
Advertised state Indicates the state that the device advertises to the stack master.
28
TPS Command Line Interface Reference
29
TPS Command Line Interface Reference
show terminal
Shows terminal type information.
Syntax
show terminal
show traffic-file
Syntax
show traffic-file FILENAME [verbose INT] [proto PROTO] [without PROTO] [pcap FILTER]
[pager]
Options
show tse
Shows threat suppression engine information.
Syntax
show tse (adaptive-filters|connection-table(blocks|trusts)|rate-limit|ssl-inspection)
Syntax
show tse connection-table TYPE
show user-disk
Syntax
show user-disk
show users
Syntax
30
TPS Command Line Interface Reference
show version
Syntax
show version
sms
Allows you to configure SMS settings and release SMS.
Syntax
sms must-be-ip (A.B.C.D|A.B.C.D/M)
sms unmanage
Related commands
show sms
snapshot create
Allows you to manage system snapshots.
Syntax
snapshot create NAME[(reputation|manual|network)]
snapshot list
Syntax
snapshot list
snapshot remove
Syntax
snapshot remove
snapshot restore
A snapshot enables you to restore a device to a previously known working state. Restore a snapshot to the
same device or to a different device. You can also export a snapshot and send it to TippingPoint Technical
31
TPS Command Line Interface Reference
Support for assistance with troubleshooting or debugging the device. All snapshots are stored on the external
user disk (CFast or SSD).
Make sure the device where you want to restore the snapshot meets the following requirements:
• The TOS version on the device is the same as the TOS version that was installed when the snapshot was
taken.
• The device is the same model as the device where the snapshot was taken. For example, you can restore a
snapshot from a 2200T to a 2200T.
When restoring a snapshot, keep in mind:
• The contents of the system keystore are not included in the snapshot. When you restore a snapshot to a
different device, you should plan to also import any private key information from the device where the
snapshot was taken.
• Never delete certificates that are used in snapshots that have, or have had, SSL configurations. Although
the system will still complete its reboot sequence after restoring a snapshot that has had its SSL
configuration (and corresponding device certificate) removed, the restored SSL configuration will not be
functional until you update the private key for each certificate or replace the entire SSL configuration.
• When you want to restore a snapshot to a different device, and URL Reputation Filtering is enabled, a full
synchronization of the Reputation database is required after you restore the snapshot. The snapshot does
not include the ThreatDV URL Reputation Feed and User-defined URL Entries database. For more
information, see the SMS User Guide.
• The snapshot includes the license package. The license package provides license information for each of
your TippingPoint devices. If the license package that was included in the snapshot is outdated, restore
the snapshot and then download and install an updated license package from the TMC.
• If an external ZPHA was configured on the original device, be sure to add an external ZPHA to the target
device or update the device configuration to remove ZPHA.
Syntax
snapshot restore NAME
tcpdump
Allows you to capture network traffic to the terminal or a file. You can specify a maximum packet count or a
maximum capture file size. If you record the capture to a file you must specify a maximum packet count or
maximum capture file size. Maxsize is the maximum size of the capture file in millions of bytes, which is
limited by the currently available disk allocation.
Syntax
tcpdump INTERFACE [record FILENAME [maxsizebytes 1-10000000]]
[count 1-10000000] [verbose 0-990000]
[proto (icmp|igmp|tcp|udp|esp|ah|pim|snp|vrrp|stp|isis|sctp)] [without
(icmp|igmp|tcp|udp|esp|ah|pim|snp|vrrp|stp|isis|sctp)] [pcap FILTER]
[cponly][pager] [background]
tcpdump stop
tech-support-report
Collects diagnostic information into a Tech Support Report (TSR) that TippingPoint Support can use to debug
and troubleshoot system issues. It includes diagnostic commands, log files, the core file directory, and
32
TPS Command Line Interface Reference
optionally a full system snapshot. The Tech Support Report snapshot captures the system’s current running
configuration.
If you include a snapshot with your Tech Support Report, the snapshot does not contain the following
sensitive information:
• User names and passwords
• LDAP and remote server passwords
• SNMPv3 passphrase
• HA passphrase
• VPN IPsec keys
• Keystore
Only one report can exist on the device. When you create a new report, the previous report is replaced.
After you create a TSR, use the Local Security Manager (Tools > Tech Support Report) to export and view the
TSR.
You should execute this command only when requested to do so by TippingPoint Support personnel.
It can take several minutes to execute this command. By default, this command is allowed to run as long as
necessary to generate the TSR. Use the max-runtime option, if necessary, to set a maximum threshold for the
amount of time, in seconds, that the command is allowed to run before interrupting the report generation.
Syntax
tech-support-report include-traffic-logs|exclude-traffic-logs
include-snapshot|exclude-snapshot include-all-corefiles|exclude-all-corefiles
[max-runtime INSECONDS]
traceroute
Traceroute shows you the path a packet of information takes from your computer to your designation. It lists
all the routers it passes through until it reaches its destination, or fails. Traceroute tells you how long router
to router hops take.
Syntax
traceroute (A.B.C.D|HOSTNAME) [from A.B.C.D]
traceroute6
Trace IPv6 network routes.
Syntax
ips{}traceroute6 (A.B.C.D|HOSTNAME) [from A.B.C.D]
user-disk
Mounts, unmounts, and formats the external user disk (CFast or SSD).
After you mount the user disk, the device can automatically mount the disk when you reboot the device.
33
TPS Command Line Interface Reference
You can also enable encryption on the external user disk to secure its contents with the system master key.
The external user disk stores all traffic logs, snapshots, and packet capture data. By default, the external user
disk is not encrypted.
Before you secure the external user disk, keep in mind the following points:
• When you change the encryption status of the external user disk, the device automatically formats the
disk and all traffic logs, snapshots, and packet capture data are erased. On large, external CFast disks (32
GB or more), it can take 40 seconds or more to complete disk format and encryption operations.
• The system master key encrypts and decrypts the external user disk. To access the contents of an
encrypted external user disk from a different device, for example to restore a snapshot, the same master
key must also be set on the device.
Syntax
user-disk (encryption (enable|disable) | format | mount | unmount)
• Mount – Mount the external disk and enable the device to automatically mount the disk on boot.
show user-disk
master-key
display
Displays log configuration settings. In contrast to the show command, which shows the status of a
configuration, the display command shows what you have configured. For example, if you enable high-
availability on one device but not the other, the display command will show that you have high-availability
configured and the show command will show that high-availability is not in effect.
Syntax
display [log-sessions] [xml|verbose]
email
Allows you to set logging email daemon parameters.
Syntax
34
TPS Command Line Interface Reference
log-file-size
Sets log file allocation as a percentage of the total 100 percent allowed for all log files. When audit log data
reaches 75% of its allocated space, an alert is generated (not configurable).
Syntax
log-storage
Sets local log file allocation of external user disk (CFast or SSD) space. Usage value can range from 50 to 99
percent. By default, 3.5 GB of the disk is a reserve for non-logging storage, which includes the Reputation
databases. Although this space can be reduced or increased when rare circumstances require it, reducing the
reserved space can interfere with URL filtering.
Syntax
log-storage external USAGE[%]
log-test
Sends a test message to the logging system(s).
Syntax
Valid entries:
all All log systems
audit Audit system
quarantine Quarantine system
logID LogID system
35
TPS Command Line Interface Reference
rotate
Sets log rotation parameters.
Syntax
rotate (set|delete) defaultCheckRecords (100-65535)
rotate (set|delete) defaultFiles (2-20)
rotate (set|delete) maxFileSize (10-500MB)
rotate (set|delete) rotateMsgSeverity SEVERITY
rotate (set|delete) sleepSeconds (1-65535)
rotate (set|delete) audit [Files (2-20)] [Records (100-65535)]
rotate (set|delete) ipsAlert [Files (2-20)] [Records (100-65535)]
rotate (set|delete) ipsBlock [Files (2-20)] [Records (100-65535)]
rotate (set|delete) quarantine [Files (2-20)] [Records (100-65535)]
rotate (set|delete) reputationAlert [Files (2-20)] [Records (100-65535)]
rotate (set|delete) reputationBlock [Files (2-20)] [Records (100-65535)]
rotate (set|delete) system [Files (2-20)] [Records (100-65535)]
rotate (set|delete) visibility [Files (2-20)] [Records (100-65535)]
36
TPS Command Line Interface Reference
associated with the SuperUser role or the Administrator role to edit the configuration context. The
configuration mode has different context levels that provide access to a specific set of configuration
commands.
Note
Use debug commands only when you are instructed to do so by TippingPoint product support. You must have
SuperUser permissions to use debug np commands.
aaa
Syntax
aaa
Related Commands
actionsets
Enters the action sets context mode. Changes are committed and take effect immediately.
Syntax
actionsets
autodv
Enters Auto Digital Vaccine context mode.
Syntax
autodv
certificates
Enters certificates context mode.
Syntax
certificates
delete
Deletes file or configuration item.
Syntax
delete interface
37
TPS Command Line Interface Reference
display
Displays file or configuration item.
Syntax
display
dns
Enters DNS context mode.
Syntax
dns
gen
Enters general context mode.
Syntax
gen
high-availability
Enters high-availability context mode.
Syntax
high-availability
interface
Enters interface context mode.
On TX Series devices, ports are presented in the format Slot-SegmentPort. For example, port 4A on slot 3
would be specified as “3-4A”.
Syntax
Configure network interface 1A in slot 3.
ips{}interface 3-1A
ips{running-3-1A}
ips{}interface mgmt
ips{running-mgmt}
Example settings
38
TPS Command Line Interface Reference
Physical-media settings
Line speed
Duplex setting
The duplex setting for the port. Copper can be set to full or half. Fiber ports can be set to full.
Auto negotiation
The auto negotiation setting determines whether the port negotiates its speed based on the connection it
can make.
ips
Enters IPS profile context mode.
Note
When IDS mode is enabled, it adjusts the device configuration so that the device operates in a manner suitable for
Intrusion Detection System (IDS) scenarios and filter configurations. When IDS Mode settings are changed, reboot
the device for the change to take effect.
Syntax
ips
log
Enters log context mode. Note that the Management Console notification contact for the Audit log cannot be
modified.
Syntax
log
notifycontacts
Enters notify contacts context mode.
Syntax
notifycontacts
39
TPS Command Line Interface Reference
ntp
Enters notify contacts context mode.
Syntax
ntp
reputation
Enters Reputation context mode.
Syntax
reputation
security-policy-reset
Resets IPS security policy to the default values.
Syntax
security-policy-reset
segments
Enters segments context mode, which enables you to rename segments.
Syntax
segments
services
Enters services context mode.
Syntax
services
sflow
sflow
snmp
Enters SNMP context mode.
Syntax
snmp
ssl-inspection
Enters SSL inspection context mode.
40
TPS Command Line Interface Reference
Syntax
ssl-inspection
Related commands
Command Description
traffic-management
Enters traffic-management profile context.
Syntax
traffic-management
virtual-segments
Enters virtual-segments context.
Syntax
virtual-segments
ips{running-aaa}delete
ips{running-aaa}display
Display configuration.
Syntax
41
TPS Command Line Interface Reference
ips{running-aaa}disable-inactive-users
disable-inactive-users
ips{running-aaa}ldap-group
ldap-group LDAPNAME
ips{running-aaa}ldap-schema
ldap-schema SCHEMA
SCHEMA
(active-directory|novell-edirectory|fedora-ds|rfc2798|rfc2307nis|samba|custom)
ips{running-aaa}login
Configure login settings, including the timeout period for inactivity in the CLI and the LSM. By default, the
timeout period for inactivity in the CLI and the LSM is 15 minutes.
Syntax
ips{running-aaa}help login
ips{running-aaa}login-banner
42
TPS Command Line Interface Reference
login-banner (enable|disable)
login-banner text (1500 character max)
login-banner title (50 character max)
ips{running-aaa}password
Syntax
• None – User names cannot contain spaces. The maximum password length is 32 characters.
• Low – The same user name and password requirements as the None setting, plus the following
additional requirements:
• A new password must be different than the current password, and passwords must be at least eight
characters in length
• Medium – The same user name and password requirements as the Low setting, plus the following
additional password complexity requirements:
• Contains at least one non-alphanumeric character (examples include ! ? $ * #). Do not use spaces
in the password.
• High – The same user name and password requirements as the Medium setting, but passwords must be
at least 15 characters and meet the following additional password complexity requirements:
• At least half the characters cannot occupy the same positions as the current password.
ips{running-aaa}radius-group
Syntax
radius-group RADIUSNAME
ips{running-aaa}remote-login-group
Configure LDAP, RADIUS group, or TACACS+ group to use for administrative login.
43
TPS Command Line Interface Reference
Note
You can also configure the SMS as a remote authentication source. Configure this using the SMS interface only. For
more information, refer to the SMS User Guide.
The name you provide for each group cannot be changed. To give a group a new name, you must delete the
group and re-create it with the new name.
Note
Both RADIUS and TACACS+ authentication use protocols that are not FIPS-compliant. Before configuring RADIUS
or TACACS+ for remote authentication, disable FIPS mode. For more information, see fips-mode-enable.
Syntax
ips{running-aaa}role
ips{running-aaa}tacacs-group
tacacs-group TACACSNAME
ips{running-aaa}user
Configure a name identified user. When you enter a username that does not exist, a new user is created.
Syntax
user NAME
ips{running-aaa}user-group
user-group GROUPNAME
ips{running-aaa-ldap-group-mygroup1}base-dn
44
TPS Command Line Interface Reference
base-dn DN
ips{running-aaa-ldap-group-mygroup1}bind-dn
bind-dn DN
ips{running-aaa-ldap-group-mygroup1}delete
ips{running-aaa-ldap-group-mygroup1}port
port <0-65535>
ips{running-aaa-ldap-group-mygroup1}retries
retries RETRY
ips{running-aaa-ldap-group-mygroup1}server
ips{running-aaa-ldap-group-mygroup1}timeout
Configure timeout.
Syntax
timeout SECONDS
ips{running-aaa-ldap-group-mygroup1}tls
Configure TLS.
Syntax
tls (enable|disable)
tls start-tls (enable|disable)
tls require-valid-server-cert (enable|disable)
45
TPS Command Line Interface Reference
ips{running-aaa-radius-group-2}default-usergroup
Default usergroup.
Syntax
default-usergroup GROUP|none
ips{running-aaa-radius-group-2}delete
ips{running-aaa-radius-group-2}auth-type
Specifies the authentication protocol for the RADIUS group. When the authentication protocol is PEAP/EAP-
MSCHAPv2, be sure to also import the CA root certificate. The RADIUS group authenticates against the
available CA root certificates on the device.
Syntax
auth-type PAP|MD5|PEAP/EAP-MSCHAPv2
Related commands
Command Description
ips{running-aaa-radius-group-2}retries
retries (0-3)
ips{running-aaa-radius-group-2}server
Configure server.
Syntax
ips{running-aaa-tacacs-group-group1}auth-type
Specifies the authentication protocol for the TACACS+ group. Supported protocols include ASCII, PAP, and
CHAP. The TACACS+ group authenticates against the available CA root certificates on the device.
Syntax
46
TPS Command Line Interface Reference
auth-type ASCII|PAP|CHAP
Related commands
Command Description
ips{running-aaa-tacacs-group-group1}default-usergroup
Syntax
default-usergroup GROUP
ips{running-aaa-tacacs-group-group1}delete
Syntax
ips{running-aaa-tacacs-group-group1}retries
Syntax
retries (0-3)
ips{running-aaa-tacacs-group-group1}server
Syntax
ips{running-actionsets}actionset
Syntax
actionsets ACTIONSETNAME
ips{running-actionsets}rename
Syntax
47
TPS Command Line Interface Reference
ips{running-actionsets-myactionset1}action
Syntax
action (permit|rate-limit|block|trust)
ips{running-actionsets-myactionset1}allow-access
Syntax
allow-access DESTIP
ips{running-actionsets-myactionset1}bytes-to-capture
Syntax
bytes-to-capture BYTES
ips{running-actionsets-myactionset1}delete
Syntax
ips{running-actionsets-myactionset1}http-block
Syntax
http-block
ips{running-actionsets-myactionset1}http-redirect
Syntax
48
TPS Command Line Interface Reference
http-redirect URL
ips{running-actionsets-myactionset1}http-showdesc
ips{running-actionsets-myactionset1}limit-quarantine
ips{running-actionsets-myactionset1}packet-trace
ips{running-actionsets-myactionset1}priority
ips{running-actionsets-myactionset1}quarantine
ips{running-actionsets-myactionset1}tcp-reset
Set tcp reset option for block action. Available options: none (disable), source, dest, or both.
Syntax
tcp-reset (none|source|dest|both)
ips{running-actionsets-myactionset1}threshold
ips{running-actionsets-myactionset1}verbosity
49
TPS Command Line Interface Reference
Syntax
verbosity (partial|full)
ips{running-autodv}calendar
Syntax
calendar
ips{running-autodv}delete
Syntax
delete proxy
delete proxy-password
delete proxy-username
ips{running-autodv}disable
Disable service.
Syntax
disable
ips{running-autodv}enable
Enable service.
Syntax
enable
ips{running-autodv}list
Syntax
list
ips{running-autodv}periodic
Syntax
periodic
50
TPS Command Line Interface Reference
ips{running-autodv}proxy
Syntax
ips{running-autodv}proxy-password
Syntax
proxy-password PASSWD
ips{running-autodv}proxy-username
Syntax
proxy-username USER
ips{running-autodv}update
Update AutoDV.
Syntax
update
ips{running-autodv-periodic}day
Syntax
day (Sunday|Monday|Tuesday|Wednesday|Thursday|Friday|Saturday)
ips{running-autodv-periodic}period
Syntax
period PERIOD
PERIOD Value range is 0 - 99, unit is days
ips{running-autodv-periodic}time
Syntax
51
TPS Command Line Interface Reference
time HOURS:MINUTES
HOURS Value range is 0 - 23
MINUTES Value range is 0 - 59
ips{running-certificates}certificate
Add or update a device certificate with the certificate contents from your web server or with signing
certificates and their associated private keys for use in client proxies. To inspect secure sessions, the TPS
requires both the certificate and private keys from the web server or client proxy.
(Best Practice) Name the certificate so that you can safely and reliably assign it to the correct SSL server or
client proxy.
When the keystore mode is sms-managed, use the SMS to manage device certificates and private keys.
Syntax
certificate CERTNAME
Related commands
Command Description
ips{running-certificates}private-key Import the private key from your web server or client proxy into
the local keystore on the TPS device.
ips{running-sslinsp}server Add an SSL server proxy to the TPS device with the same
security settings as your web server, and assign the
corresponding certificate and private key.
ips{running-sslinsp}client-proxy Add an SSL client proxy to the device with your specified
security settings and assign a signing certificate.
ips{running-certificates}ca-certificate
Add CA certificate.
Syntax
ca-certificate CANAME
ips{running-certificates}cert-request
cert-request CERTNAME
ips{running-certificates}delete
52
TPS Command Line Interface Reference
ips{running-certificates}delete ?
Valid entries at this position are:
ca-certificate Delete CA cetificate
cert-request Delete certificate request
certificate Delete device certificate and private key
signingcert-request Delete certificate request
trust Delete certificate authority trust
trust-store Delete ca-store (all|NAME)
ips{running-certificates}display
Syntax
display ITEM [pem|text]
ips{running-certificates}display ?
Valid entries at this position are:
ca-certificate Display CA certificate content
cert-request Display certificate requests
certificate Display device certificate content
default Select a Default Certificate Authority
signing-cert Display signing certificate requests
xml Display in XML format
ips{running-certificates}private-key
Import a private key into the keystore on the device and assign it to the specified device certificate. Use the
save-config command to secure the private key in the keystore.
To inspect secure sessions, the TPS requires both the certificate and private key from your web server or
client proxy.
When the keystore mode is sms-managed, this command is not applicable. Use the SMS to manage device
certificates and private keys.
Syntax
private-key CERTNAME
Related commands
Command Description
ips{running-certificates}certificate Import the certificate from your web server or client proxy into the
local keystore on the TPS device.
ips{running-sslinsp}server Add an SSL server to the TPS device with the same security
settings as your web server, and assign the corresponding
certificate and private key.
ips{running-sslinsp}client-proxy Add an SSL client proxy to the device with your specified security
settings and assign a signing certificate.
ips{running-certificates}rename
Syntax
53
TPS Command Line Interface Reference
ips{running-certificates}signing-cert
Generate a signing certificate to authenticate any SSL server certificate to your client.
Syntax
signing-cert CERTNAME
(Enter 'exit' to abort the command)
Enter Common Name (string, required):
Enter Country (two letter code or 'none')[none]:
Enter State (string or 'none')[none]:
Enter Locality (string or 'none')[none]:
Enter Organization (string or 'none')[none]:
Enter Unit (string or 'none')[none]:
Enter E-mail (string or 'none')[none]:
Enter FQDN (a string or 'none')[none]:
Enter User FQDN (string or 'none')[none]:
-----BEGIN CERTIFICATE-----
<cert_contents>
-----END CERTIFICATE-----
ips{running-certificates}trust
ips{running-certificates}trust-store
ips{running-certificates}trust-store TRUSTSTORE
ips{running-certificates-TRUSTSTORE}?
Valid entries at this position are:
add-ca Add CA certificate to trust store
default-ca Add or remove default CA certificates to trust store
description Add description to trust store
display Display trust store configuration item
help Display help information
remove-ca Remove CA certificate from trust store
ips{running-dns}delete
Immediate Commit Feature. Changes take effect immediately. Delete file or configuration item. A secondary
domain-search can only be deleted if no tertiary exists. A primary domain-search can only be deleted if no
secondary exists.
Syntax
54
TPS Command Line Interface Reference
delete domain-name
delete domain-search (primary|secondary|tertiary|all)
delete name-server (all|A.B.C.D|X:X::X:X)
delete proxy cache cleaning interval
delete proxy cache forwarder (all|A.B.C.D|X:X::X:X)
delete proxy cache maximum negative ttl
delete proxy cache maximum ttl
delete proxy cache size
ips{running-dns}domain-name
Immediate Commit Feature. Changes take effect immediately. Configure domain name.
Syntax
domain-name NAME
ips{running-dns}domain-search
Immediate Commit Feature. Changes take effect immediately. Configure domain search. A secondary
domain-search can only be entered after a primary is entered and a tertiary can only be entered after a
secondary is entered.
Syntax
ips{running-dns}name-server
name-server (A.B.C.D|X:X::X:X)
ips{running-dns}proxy
Configure proxy.
Syntax
proxy (enable|disable)
proxy cache cleaning interval cache cleaning interval in minutes
proxy cache forwarder A.B.C.D|X:X::X:X
proxy cache maximum negative ttl cache maximum negative ttl in minutes
proxy cache maximum ttl cache maximum ttl in minutes
proxy cache size cache size in megabytes
ips{running-gen}delete
55
TPS Command Line Interface Reference
ips{running-gen}ephemeral-port-range
ips{running-gen}host
ips{running-gen}https
Disable and enable HTTPS access on the TPS management port. By default, HTTPS access is enabled to allow
access to the device through the LSM, and to enable the Security Management System (SMS) to manage the
device.
Note that this command does not disable SSH access on the TPS management port. See ips{running-gen}ssh for
more information.
Syntax
https (enable|disable)
ips{running-gen}lsm
lsm (enable|disable)
ips{running-gen}sms-allowed-ip
ips{running-gen}ssh
Disable and enable SSH access on the TPS management port. By default, SSH access is enabled to allow CLI
access to the device.
When the SSH connection to a remote syslog breaks, the device automatically attempts to reconnect three
times over the course of a minute (once every 20 seconds for one minute). Each failed attempt is logged
locally, and if the connection is still broken after one minute, the device stops attempting to reconnect.
56
TPS Command Line Interface Reference
If the automatic attempts to reconnect fail, you must manually bring back up the SSH connection by
disabling and then re-enabling the "Remote System Log" configuration. Any data that was queued before the
connection was lost gets sent after the connection is re-established. All data is sent in real time.
Note that this command does not disable HTTPS access on the TPS management port. See ips{running-
gen}https for more information.
Syntax
ssh (enable|disable)
ips{running-gen}timezone
Note
Use the US option to specify a standard time zone in the United States.
Syntax
timezone GMT
timezone REGION CITY
REGION
(Africa|America|Antarctica|Arctic|Asia|Atlantic|
Australia|Europe|Indian|US|Pacific)
ips{running-gen}tls
Disable older TLS versions to secure the management interface. When deciding which TLS versions to
disable, keep in mind that the LSM, SMS, and Captive Portal communicate through the device's management
interface.
Syntax
ips{running-high-availability}disable
Disables HA.
Syntax
disable
ips{running-high-availability}enable
57
TPS Command Line Interface Reference
Syntax
enable
ips{running-high-availability}encryption
ips{running-high-availability}partner
For 440T and 2200T devices that use the HA port, enter the partner device serial number. For TX Series
devices that use the MGMT port, enter the partner device MGMT port IP address.
Syntax
HA port:
partner SERIAL
MGMT port:
partner IP ADDRESS
Important
When creating an inspection bypass rule that includes source and destination ports or IP addresses, you must first
specify the IP protocol as UDP or TCP.
You can now define up to 32 inspection bypass rules on a TippingPoint TPS. Rule configurations that bypass
IPv6 traffic or VLAN ranges require additional hardware resources. For example, a single inspection bypass
rule for IPv6 or VLAN traffic can result in multiple port-VLAN rule combinations.
Each TPS supports a maximum number of port-VLAN rule combinations. If the number of configured port-
VLAN rule combinations exceeds the maximum threshold for the device, you cannot commit the changes.
58
TPS Command Line Interface Reference
Syntax
ips{running-inspection-bypass}help
Valid commands are:
delete RULENAME
help [full|COMMAND]
rule NEWRULENAME
rule RULENAME
When you edit or create an inspection bypass rule, the context changes to that rule.
From the context of an inspection bypass rule, type help and press Enter for a list of commands, or type help
command for help on a particular command.
ips{running-inspection-bypass-rule-myrule1}action
Note
Redirect and Mirror options are not supported for inspection bypass when there are no target ports available.
ips{running-inspection-bypass-rule-myrule1}action block
To copy traffic entering the port and send it to segment port 5B before the traffic gets inspected:
ips{running-inspection-bypass-rule-myrule1}action ingress-mirror 5B
ips{running-inspection-bypass-rule-myrule1}eth
Specifies the Ethernet Type that you do not want to inspect. When you define an inspection bypass rule, an
option without a specified value defaults to a value of “any”. For example, if you do not specify a value for
eth, it defaults to a value of any Ethernet Type.
59
TPS Command Line Interface Reference
Enter help eth and press Enter to display options for specifying an EtherType. Note that a value of ip
specifies both IPv4 and IPv6.
Note
A full list of Ethernet Type values can be found at the Internet Assigned Numbers Authority website. When
specifying an Ethernet Type as a hexadecimal value, prepend 0x, for example, 0x0806 for ARP.
ips{running-inspection-bypass-rule-myrule1}ip-proto
Specifies the IP protocols that you do not want to inspect. When you define an inspection bypass rule, an
option without a specified value defaults to a value of “any”. For example, if you do not specify a value for ip-
proto, it defaults to a value of any IP protocol.
If you change the IP protocol to a protocol other than TCP or UDP, the corresponding TCP or UDP ports are
automatically removed. Edit an inspection bypass rule and enter ip-proto udp to not inspect UDP traffic.
Note
A full list of IP protocol values can be found at the Internet Assigned Numbers Authority website at http://
www.iana.org/assignments/protocol-numbers.
Syntax
Enter help ip-proto and press Enter to display options for specifying an IP protocol.
ips{running-inspection-bypass-rule-myrule1}help ip-proto
Enter ip protocol for inspection bypass rule
Syntax: ip-proto PROTO_OPTION|PROTO_VALUE
ip-proto Enter ip protocol for inspection bypass rule
PROTO_OPTION Enter ip protocol (udp or tcp) for inspection bypass rule
Possible values for PROTO_OPTION are:
udp udp protocol
tcp tcp protocol
PROTO_VALUE Enter ip protocol value (e.g. 115 for L2TP)
ips{running-inspection-bypass-rule-myrule1}vlan-id
Specifies the VLAN traffic that you do not want to inspect. When you define an inspection bypass rule, an
option without a specified value defaults to a value of “any”. For example, if you do not specify a value for
vlan-id, it defaults to all tagged and untagged traffic.
Syntax
Enter help vlan-id and press Enter to display options for specifying a range of VLAN IDs.
ips{running-inspection-bypass-rule-myrule1}help vlan-id
Valid commands are:
vlan-id none
vlan-id VLANID
vlan-id range MINVLANID MAXVLANID
Edit an inspection bypass rule and enter vlan-id none to not inspect untagged VLAN traffic. Then, type
display and press Enter to view your change.
60
TPS Command Line Interface Reference
ips{running}interface nM
Enters context for configuring Ethernet settings. The port name, for example, 1A, is case-sensitive.
Syntax
interface nM
Valid entries at this position are:
delete Delete file or configuration item
help Display help information
physical-media Configure ethernet port settings
restart Restart Ethernet port
shutdown Shutdown logical interface state
ips{running}interface mgmt
interface mgmt
Valid entries at this position are:
delete Delete file or configuration item
description Enter description for the management interface
help Display help information
host Configure host name, location, or contact
ip-filter Limit which ip addresses can access mgmt port
ipaddress Configure IP address
physical-media Configure mgmt port speed/duplex
route Add IPv4/IPv6 static route
ips{running-ips}afc-mode
Syntax
afc-mode AFCMODE
ips{running-ips}afc-severity
Syntax
afc-severity SEVERITY
ips{running-ips}asymmetric-network
Syntax
61
TPS Command Line Interface Reference
ips{running-ips}connection-table
Syntax
ips{running-ips}delete
Syntax
ips{running-ips}deployment-choices
Lists deployment choices. Note that the deployment options displayed will vary according to the Digital
Vaccine (DV) that is installed.
Syntax
deployment (Aggressive|Core|Default|Edge|Perimeter)
Note
Enter the full deployment name without quotes, including any [DEPRECATED] label.
ips{running-ips}display
Syntax
display
ips{running-ips}display-categoryrules
Syntax
display-categoryrules
ips{running-ips}gzip-decompression
Syntax
gzip-decompression (enable|disable)
62
TPS Command Line Interface Reference
ips{running-ips}http-encoded-resp
ips{running-ips}http-mode
Configures HTTP mode, which allows all TCP ports to be treated as HTTP ports for inspection purposes. If a
flow does not have HTTP traffic, HTTP processing stops so that optimum performance is maintained.
Syntax
http-mode enable | disable
ips{running-ips}profile
Allows you to create or enter an IPS profile and configure whether the True-Client-IP address and additional
HTTP context information are collected for the profile.
Syntax
profile PROFILENAME client-ip [enable|disable] http-context [enable|disable]
ips{running-ips}quarantine-duration
ips{running-ips}rename
Renames a profile.
Syntax
rename profile PROFILENAME NEWPROFILENAME
ips{running-ips-1}categoryrule
ips{running-ips-1}delete
63
TPS Command Line Interface Reference
Syntax
delete filter FILTERNUMBER
FILTERNUMBER Existing filter number
ps{running-ips-1}deployment
Specify a profile deployment. Deployment options will vary according to the Digital Vaccine (DV) that is
installed.
Syntax
deployment DEPLOYMENTNAME
Note
Enter the full deployment name without quotes, including any [DEPRECATED] label.
ips{running-ips-1}description
ips{running-ips-1}filter
ips{running-log}delete
ips{running-log}log
64
TPS Command Line Interface Reference
Syntax
log audit CONTACT-NAME [ALL|none]
log quarantine CONTACT-NAME [ALL|none]
log system CONTACT-NAME [SEVERITY]
Valid entries at this position are:
<Enter> Execute command
audit Configure log for audit services
quarantine Configure log for quarantine services
system Configure log for all services
ips{running-log}log-option
ips{running-log}logging-mode
65
TPS Command Line Interface Reference
ips{running-log}sub-system
Syntax
ips{running-notifycontacts}contact
Syntax
contact CONTACTNAME
contact NEWNAME email
contact NEWNAME snmp COMMUNITY IP [PORT]
ips{running-notifycontacts}delete
Syntax
ips{running-notifycontacts}email-from-address
Syntax
66
TPS Command Line Interface Reference
email-from-address EMAIL
ips{running-notifycontacts}email-from-domain
email-from-domain DOMAIN
ips{running-notifycontacts}email-server
email-server IP
ips{running-notifycontacts}email-threshold
email-threshold THRESHOLD
THRESHOLD Threshold-value, value range 1-35 per minute
ips{running-notifycontacts}email-to-default-address
email-to-default-address EMAIL
ips{running-notifycontacts}rename
ips{running-ntp}delete
67
TPS Command Line Interface Reference
ips{running-ntp}key
ips{running-ntp}ntp
ips{running-ntp}polling-interval
ips{running-ntp}server
ips{running-rep}delete
68
TPS Command Line Interface Reference
ips{running-rep}group
group USERGROUP
Valid entries:
USERGROUP Reputation usergroup name
ips{running-rep}nxdomain-response
Responds with NXDOMAIN (name does not exist) to clients that make DNS requests for hosts that are
blocked.
Syntax
nxdomain-response (enable|disable)
ips{running-rep}profile
profile PROFILENAME
ips{running-rep}rename
ips{running-rep-1}delete
69
TPS Command Line Interface Reference
ips{running-rep-1}description
Syntax
description DESCRIPTION
ips{running-rep-1}domain
Syntax
domain NEWDOMAIN
ips{running-rep-1}ip
Syntax
ip IPADDRESS
ips{running-rep-abc}action-when-pending
Syntax
action-when-pending (permit|drop)
ips{running-rep-abc}check-destination-address
Syntax
check-destination-address (enable|disable)
ips{running-rep-abc}check-source-address
Syntax
check-source-address (enable|disable)
Valid entries:
enable Enable check source address
disable Disable check source address
70
TPS Command Line Interface Reference
ips{running-rep-abc}delete
ips{running-rep-abc}dns-except
dns-except DOMAINNAME
ips{running-rep-abc}filter
ips{running-rep-abc}ip-except
security-policy-reset
Resets the IPS security policy to the default values.
Syntax
security-policy-reset
ips{running-segments-segment0}description
71
TPS Command Line Interface Reference
description TEXT
ips{running-segments-segment0}display
display
ips{running-segments-segment0}high-availability
high-availability (block|permit)
block Enable block all
permit Enable permit all
ips{running-segments-segment0}link-down
ips{running-segments-segment0}restart
restart
ips{running-segments-segment0}sflow
ips{}edit
ips{running}services
Entering Immediate Commit Feature. Changes take effect immediately.
72
TPS Command Line Interface Reference
ips{running-services}
Valid entries at this position are:
display Display all services
help Display help information
service Edit a service
ips{running-services}help service
Edit a service
Syntax: service SERVICE
service Edit a service
SERVICE Service name
ips{running-services}service portmapper
ips{running-services-portmapper}
Valid entries at this position are:
delete Delete file or configuration item
display Display service configuration
help Display help information
port Add port(s) to service
ips{running-services-portmapper}display
# DEFAULT ENTRIES
port tcp 111
port tcp 32770 to 32779
port udp 111
port udp 32770 to 32779
exit
ips{running-services-portmapper}help port
Add port(s) to service
Syntax: port tcp PORT [to LAST-PORT]
port udp PORT [to LAST-PORT]
port Add port(s) to service
tcp TCP
PORT Port number
to Enter range of ports
LAST-PORT Last port of range
udp UDP
Notes
73
TPS Command Line Interface Reference
• TCP or UDP option is available depending on the service (some services are TCP only).
ips{running-services}display
Display service(s).
Syntax
ips{running-services}service
Edit a service.
Syntax
service SERVICENAME
ips{running-services-myservice1}delete
Syntax
ips{running-services-myservice1}port
Syntax
74
TPS Command Line Interface Reference
ips{running-snmp}authtrap
Syntax
authtrap (enable|disable)
ips{running-snmp}community
Syntax
ips{running-snmp}delete
Syntax
ips{running-snmp}engineID
Syntax
engineID ENGINE-ID
ENGINE-ID SNMPv3 Engine ID (1-32 hex octets, ex: 0x800012ef0302a11aab33f4)
ips{running-snmp}snmp
Syntax
snmp (enable|disable)
ips{running-snmp}trapdest
Syntax
75
TPS Command Line Interface Reference
Valid entries:
HOST IP address or DNS host name
port Configure SNMP port
PORT SNMP port (default 162)
ver Configure SNMP version (2c, or 3)
2c SNMPv2c
COMMUNITY Text to identify SNMP system community
inform Send information message instead of a trap
3 SNMPv3
USERNAME Text to identify USM user name (for authentication/privacy)
level Configure security level (noAuthNoPriv|authNoPriv/|authPriv)
noAuthNoPriv No authentication, no privacy
authNoPriv Authentication, no privacy
authtype Configure authentication type (MD5|SHA)
AUTHTYPE Authentication type
Possible values for AUTHTYPE are:
MD5 Message Digest 5
SHA Secure Hash Algorithm
AUTHPASS Authentication passphrase - must be at least 8 characters
authPriv Authentication and privacy
privproto Configure privacy protocol (DES|AES)
PRIVPROTO Privacy protocol
Possible values for PRIVPROTO are:
DES Data Encryption Security
AES Advanced Encryption Security
PRIVPASS Optional privacy passphrase - must be at least 8 characters
ips{running-snmp}username
username USERNAME
username USERNAME authtype AUTHTYPE AUTHPASS
username USERNAME authtype AUTHTYPE AUTHPASS privproto PRIVPROTO [PRIVPASS]
Valid entries:
USERNAME Text to identify USM user name (for authentication/privacy)
level Configure security level (noAuthNoPriv|authNoPriv/|authPriv)
noAuthNoPriv No authentication, no privacy
authNoPriv Authentication, no privacy
authtype Configure authentication type (MD5|SHA)
AUTHTYPE Authentication type
Possible values for AUTHTYPE are:
MD5 Message Digest 5
SHA Secure Hash Algorithm
AUTHPASS Authentication passphrase - must be at least 8 characters
authPriv Authentication and privacy
privproto Configure privacy protocol (DES|AES)
PRIVPROTO Privacy protocol
Possible values for PRIVPROTO are:
DES Data Encryption Security
76
TPS Command Line Interface Reference
Note
While SSL inspection is disabled, you can configure SSL inspection to specify the SSL sessions you want to inspect.
Syntax
ips{running-sslinsp}
Valid commands are:
client-decryption-policy CLIENT_DECRYPTION_POLICY_NAME
client-inspection disable
client-inspection enable
client-proxy CLIENT_PROXY_NAME
delete client-decryption-policy (all|CLIENT_DECRYPTION_POLICY_NAME)
delete client-proxy (all|CLIENT_PROXY_NAME)
delete log sslInspection CONTACT-NAME
delete profile (all|PROFILE_NAME)
delete server (all|SERVER_NAME)
help [full|COMMAND]
log sslInspection CONTACT-NAME [ALL|none]
profile PROFILE_NAME
rename client-decryption-policy CLIENT_DECRYPTION_POLICY_NAME NEW_CLIENT_DECRYPTION_POLICY_NAME
rename client-proxy CLIENT_PROXY_NAME NEW_CLIENT_PROXY_NAME
rename profile PROFILE_NAME NEW_PROFILE_NAME
rename server SERVER_NAME NEW_SERVER_NAME
server SERVER_NAME
server-inspection disable
server-inspection enable
ips{running-sslinsp}client-decryption-policy
ips{running-sslinsp}client-inspection enable
Use the client-inspection enable command to begin inspecting SSL sessions based on the configuration
you specify. While SSL inspection is disabled, you can configure SSL client inspection, but no sessions are
inspected.
77
TPS Command Line Interface Reference
To enable SSL client inspection, the TPS device must be licensed for SSL inspection. Use the LSM to verify the
SSL inspection license.
Syntax
ips{running-sslinsp}client-proxy
ips{running-sslinsp}log sslInspection
Use the log sslInspection command to save SSL inspection logging information to a particular notification
contact. By default, the TPS device saves SSL inspection log information to the "Management Console"
notification contact which is available for display from the LSM and is found in the sslInspection.log on the
device.
Important
To generate SSL inspection log entries, enable logging on the SSL server proxy or client proxy for troubleshooting
purposes only. By default, these proxies do not generate logging information except for failed connections. See
ips{running-sslinsp}server.
Syntax
ips{running-sslinsp}profile
Add, edit, or delete an SSL inspection profile. An SSL inspection profile describes the encrypted traffic that
you want to protect using one or more server or client policies. A server policy consists of an SSL server, and
any source IP address exceptions. A client policy consists of an SSL client proxy that performs SSL encryption
78
TPS Command Line Interface Reference
and decryption between your client and the SSL server, an SSL trust store that establishes which certificate
authorities you trust, and, optionally, a decryption policy. When you add or edit an SSL inspection profile, the
CLI context changes to that profile. From the profile subcontext, view and change the default settings for that
profile, for example, to add a server policy.
Note
To exit the edit configuration mode from any context, type the ! command and press Enter.
At least one server policy or client policy is required. When you create a new profile, you must add your
policy to the profile and assign a name for your server or client proxy to the policy. The SSL server specifies
the range of server IP addresses you want to protect along with your SSL server configuration details.
You can also update the policy to specify any source IP addresses that you do not want to inspect. Secure
sessions between the server and the specified source IP addresses are not inspected.
Syntax
Related commands
Command Description
ips{running-certificates}certificate Import the certificate from your web server or client proxy into
the local keystore on the device.
ips{running-certificates}private-key Import the private key from your web server or client proxy into
the local keystore on the TPS device.
ips{running-vsegs-VSEG_NAME}ssl-profile Update the virtual segment to assign the SSL inspection profile.
ips{running-sslinsp}server Add an SSL server with its assigned security certificate and
private key.
ips{running-sslinsp}client-proxy Add an SSL client proxy to the device with your specified
security settings and assign a signing certificate.
ips{running-sslinsp}rename
ips{running-sslinsp}server
Add or edit an SSL server to specify the SSL server configuration you want the TippingPoint security device to
proxy, including the SSL service.
You must specify the type of secure traffic that is accepted on the SSL detection port. For example, if the
server accepts POP3S traffic on port 2000, add an SSL server with a Detection Port of 2000 and a Decrypted
79
TPS Command Line Interface Reference
Service of POP3. From the server subcontext, you can view and change the default settings for that server.
When you finish, assign the SSL server proxy to an SSL server policy within an SSL inspection profile. Enable
logging on the SSL server proxy for troubleshooting purposes only.
Note
To exit the edit configuration mode from any context, type the ! command and press Enter.
The protocol SSL-PROTOCOL and cipher-suite SSL-PROTOCOL options have "auto-" commands to allow
selection of cipher suites by protocol or protocols by cipher suite, respectively. Use the "auto-" command to
add or delete ciphers based on what protocol is selected and what it supports.
By default, the IP address and device certificate for the server are not defined, and must be specified
separately. Specify the IP address of your web server by entering up to 8 IPv4 addresses (separated by
commas), or by specifying a CIDR range, such as 192.169.0.0/24. Specify or delete the device certificates that
the TPS device uses to decrypt and encrypt TLS traffic across the specified range of server IP addresses. Make
sure that the corresponding private keys are assigned to the device certificates.
Syntax
server SERVERNAME
Valid entries at this position are:
certificate Apply SSL server certificate
cipher-suite Select SSL cipher suites
decrypted-service Apply IPS service filter after SSL decryption
delete Delete file or configuration item
description Apply server description
detection-port Apply port
display Display SSL server configuration
help Display help information
ip Apply IP addresses
logging Enable SSL session logging
protocol Select SSL protocols
tcp-reset Send TCP reset to SSL server on blocked connection
Related commands
Command Description
ips{running-certificates}certificate Import the certificate from your web server or client proxy into
the local keystore on the device.
ips{running-certificates}private-key Import the private key from your web server or client proxy
into the local keystore on the TPS device.
ips{running-sslinsp}client-proxy Add an SSL client proxy to the device with your specified
security settings and assign a signing certificate.
ips{running-sslinsp}server-inspection enable
Use the server-inspection enable command to begin inspecting SSL sessions based on the configuration
you specify. While SSL inspection is disabled, you can configure SSL server inspection, but no sessions are
inspected.
80
TPS Command Line Interface Reference
To enable SSL server inspection, the TPS device must be licensed for SSL inspection. Use the LSM to verify
the SSL inspection license.
Syntax
ips{running-trafmgmt}delete
delete PROFILE
ips{running-trafmgmt}profile
Create or enter traffic-management profile context. When traffic filters are added to a profile, more options
become available.
Syntax
profile NEWTRAFPROFNAME
profile TRAFPROFNAME
ips{running-trafmgmt}rename
ips{running}virtual-segments
ips{running-vsegs}?
Valid entries at this position are:
delete Delete file or configuration item
help Display help information
rename Rename virtual-segment
virtual-segment Create or enter virtual-segment context
display Display file or configuration item
Notes
• A maximum of 64 virtual segments can be configured.
81
TPS Command Line Interface Reference
ips{running-vsegs}delete virtual-segment
Delete a virtual-segment context. The position value for any higher virtual segments will be renumbered.
Only user-created virtual segments can be deleted.
Syntax
delete virtual-segment VSEGNAME
ips{running-vsegs}display
ips{running-vsegs}rename virtual-segment
Rename the virtual segment. Each virtual segment name must be unique.
Syntax
rename virtual-segment VSEGNAME NEWVSEGNAME
ips{running-vsegs}virtual-segment
ips{running-vsegs}virtual-segment segmentname
ips{running-vsegs-segmentname}?
Valid entries at this position are:
bind Bind physical ports to virtual segment
delete Delete file or configuration item
description Update virtual segment description
display Display file or configuration item
dst-address Add destination address to a virtual segment
help Display help information
ips-profile Virtual segment ips profile
move Move virtual segment priority position
reputation-profile Virtual segment reputation profile
src-address Add source address to a virtual segment
ssl-profile Virtual segment SSL profile
traffic-profile Virtual segment traffic-management profile
vlan-id Add vlan id or range to virtual segment
82
TPS Command Line Interface Reference
Notes
• A maximum of 64 virtual segments can be configured.
• Each virtual segment name must be unique.
• You can configure up to 4094 VLAN IDs per virtual segment.
• Each VLAN ID in a range counts individually. For example, vlan-id range 1 5 counts as five IDs.
• A CIDR counts as a single address. For example, 192.168.1.0/24 counts as one address.
• At least one traffic criteria must be defined for each virtual segment. Traffic criteria can be VLAN IDs,
src-addresses, and dst-addresses.
• If no physical ports are defined on a virtual segment, the virtual segment will apply to all physical ports.
• If no VLAN IDs are defined on a virtual segment, all VLAN IDs are included.
• If no source addresses are defined, all source addresses are included. If no destination addresses are
defined, all destination addresses are included.
• Position values must remain contiguous across all defined virtual segments, so there should never be a
gap in the sequence.
• Position values start with 1 and increment by one for each new virtual segment added. The highest
possible position value that can be configured is 64.
ips{running-vsegs}bind
ips{running-vsegs}delete bind
ips{running-vsegs}description
ips{running-vsegs}display
ips{running-vsegs}dst-address
Associate an IPv4 or IPv6 destination address or subnet, in CIDR format, with this virtual segment.
83
TPS Command Line Interface Reference
Syntax
dst-address ABCD|ABCDM|XXXX|XXXXM
Host IP addresses will include the submasks. For example, entering 192.168.1.1 will display as
192.168.1.1/32. You can associate a maximum of 250 destination addresses.
ips{running-vsegs}delete dst-address
Delete an IPv4 or IPv6 destination address or subnet associated with this virtual segment.
Syntax
If the all keyword is specified, all destination addresses are deleted from this virtual segment. Otherwise,
specify an address.
Note
Host addresses are stored with a netmask of /32 or /128 for IPv4 or IPv6, respectively. Any address deletion
requires that the netmask be supplied. For example, delete dst-address 192.168.1.1/32.
ips{running-vsegs-VSEG_NAME}ips-profile
ips-profile PROFILENAME
ips{running-vsegs-VSEG_NAME}delete ips-profile
Delete an existing IPS security profile associated with this virtual segment.
Syntax
ips{running-vsegs-VSEG_NAME}reputation-profile
reputation-profile PROFILENAME
ips{running-vsegs-VSEG_NAME}delete reputation-profile
ips{running-vsegs-VSEG_NAME}ssl-profile
84
TPS Command Line Interface Reference
ssl-profile PROFILENAME
Related commands
Command Description
ips{running-vsegs-VSEG_NAME}delete ssl-profile
Delete an existing SSL inspection profile associated with this virtual segment.
Syntax
ips{running-vsegs}move
Syntax
Position values must remain contiguous across all defined virtual segments, so there should never be a gap in
the sequence. Virtual segments in between the segment you are moving and the target may be renumbered.
A virtual segment cannot be moved to a lower priority than a system-defined virtual segment.
If VSEGNAME is the name of this virtual segment, the position value remains unchanged.
ips{running-vsegs}src-address
Associate an IPv4 or IPv6 source address or subnet, in CIDR format, with this virtual segment.
Syntax
src-address ABCD|ABCDM|XXXX|XXXXM
Host IP addresses will include the submasks. For example, entering 192.168.1.1 will display as
192.168.1.1/32. You can associate a maximum of 250 source addresses.
ips{running-vsegs}delete src-address
Delete an IPv4 or IPv6 source address or subnet associated with this virtual segment.
Syntax
If the all keyword is specified, all source addresses are deleted from this virtual segment. Otherwise, specify
an address.
85
TPS Command Line Interface Reference
Note
Host addresses are stored with a netmask of /32 or /128 for IPv4 or IPv6, respectively. Any address deletion
requires that the netmask be supplied. For example, delete src-address 192.168.1.1/32.
ips{running-vsegs-vsegname}vlan-id
Associate a single VLAN ID or a range of consecutive VLAN IDs with this virtual-segment.
Syntax
vlan-id VLANID_NUMBER
vlan-id range MINADDR MAXADDR
This command can only be used after an individual virtual segment is defined.
Valid IDs can range from 1–4094. All 4094 VLAN IDs can be used.
ips{running-vsegs}delete vlan-id
Delete a single VLAN ID or a range of consecutive VLAN IDs associated with this virtual-segment.
Syntax
If the all keyword is specified, all VLAN IDs get deleted, including any VLAN ranges. Otherwise, specify the
VLAN ID to be deleted.
Syntax
ips{running-vlan-translations}help
Valid commands are:
add-translation PORT VLANIN VLANOUT [auto-reverse]
delete-translation PORT VLANIN
help [full|COMMAND]
ips{running-vlan-translations}
Adds or removes a VLAN translation setting. The IPS creates a separate VLAN translation rule for each port
you want to translate. A maximum of 8000 VLAN translation rules can be defined on a 440T or 2200T TPS. If
the number of VLAN translation rules you want to commit exceed the specified limit, the device does not
commit your changes.
Syntax
86