Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

About the Device

The TippingPoint Intrusion Prevention System (IPS) device protects your network by scanning, detecting, and responding to network traffic according to the filters, action sets, and global settings maintained on each device by a client. Each device provides intrusion prevention for your network according to the amount of network connections and hardware capabilities

Device Information

 Entity

Particulars

Vendor Name

Trend Micro (Formerly HP)

Product Name

Tipping Point Security Management System

Type of Device

Hosted

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log collection method

Trend Micro

TIPPING_POINT

Syslog-Unstructured

CyberHub

Port Requirements

Source

Destination

Port

Trend Micro Tipping Point Security Management System

CyberHub

514 (UDP)

To facilitate secure communication and align with our best practice, we strongly encourage the use of Transport Layer Security (TLS) between your security devices and our Adaptive MxDR platform for event forwarding.

While we understand that TLS support may not be available on all devices, if your devices do support TLS communication, we recommend utilizing port 6514 for seamless integration.

In some cases, the upgraded version of the device might incorporate TLS support without prior notice. If you come across such a scenario or for further assistance in configuring TLS, we kindly ask you to reach out to your dedicated Adaptive MxDR Service Delivery Lead.

Device Configuration

To configure IPS to send events to remote syslog server

  1. From the LSM menu, click IPS > Notification Contacts.

  2. In Notification Contacts, Contacts List > click Remote System Log link.

  3. In Edit Notification Contact, type the IP address of <CYBERHUB> and port as 514 that receives the offloaded log messages and for the host that receives the remote system log messages.

  4. Select an Alert Facility and a Block Facility. You can either select none or select from a range of 0 to 31. These syslog numbers are used to identify the message source.

  5. Select a delimiter for the generated logs as TAB.

Tab, comma (,), semicolon (;), and bar (|) are the valid delimiters for the logs. Adaptive MxDR recommends using only TAB

  1. Click Add to add the remote syslog server.

  2. Enter the remote system log aggregation period in minutes. Recommended is 1 minute.

  3. Click Save.

To configure IPS to send system and audit events to remote syslog server

  1. From the LSM menu, click System > Syslog Servers.

  2. Select Enable syslog offload for Audit and System log.

  3. Type the IP address for the <CYBERHUB>.

  4. Enable RFC format and for the remote syslog messages and select RFC 3164.

  5. Enable additional event information, which includes the true Client IP address, for the remote syslog message.

  6. Enable additional event information for SNMP traps as required.

  7. Click Apply.

Integration Parameters

Parameters required from customer for Integration.

Property

Default Value

Description

IP Address

Trend Micro Tipping Point Security Management System interface IP address

Hostname or IP address of the device which forwards logs to the CyberHub

 

  • No labels