CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
Loading...
Loading...

HOWTO: RMA Replacement Checklist - WF/WFR/SR

Expand / Collapse


This article applies to:

  • WF - All Versions
  • WFR - All Versions
  • SR- All Versions

Question:

  • What do I need to know when I receive my RMA replacement?
  • What do I need to do to set up a RMA replacement device?

Procedure:

When you receive your replacement device, you will need to take a few additional steps in order for your device to be fully functional. These steps are briefly covered in this article. For more details see the Appliance Install Guide for your product version.

General Procedure:

  1. Connect to your Appliance with an external monitor and keyboard, or connect via a console cable. You should be able to see output on your screen that shows a login prompt.
  2. At the login prompt, enter menu
  3. At the password prompt, type the password associated with the menu user. This will be included with the replacement documentation (you can also contact TAC).
  4. Press 2 to select the Quick start setup process. This will prompt for credentials. You can use the same password as above.
  5. From the quick start menu, configure the following information.
    • Filtering mode (see Notes below)
    • Configure Network Interface LAN 1
    • Configure Network Interface LAN 2
    • Configure Default Gateway
    • Configure DNS Servers
    • Configure Host name
    • Set Time Zone and Regional settings
    • (For WFR or SR only) Configure the setup wizard user

Complete the wizard and follow any additional prompts to finalize your configuration.

WFR and SR Setup Wizard User:

The setup wizard user is used exclusively for the SR component. This user must be defined to update to the latest releases. On a WFR, the SR must be configured, as without the SR configuration the WFR will create a backlog of real time logs that cannot be processed.

The wizard user is a temporary account this is used strictly for creating the SR Global admin. The wizard username and password will be changed after you log in and create the SR user.

After you have defined the setup wizard user, log in to the SR or WFR with https://[ip address of appliance]:8443/ (The port may be different on older appliances, so refer to the Appliance Install Guide or User Guide for your appliance version.)

Notes:

  • To keep things simple, Trustwave recommends that you replicate your pre-RMA configuration as closely as possible to ensure that you recover to the same state before your RMA request.
  • The most common modes of filtering are ‘invisible’ and ‘Bridge Mode’. If you intend to filter via a port mirror, select invisible mode.
  • If you are registering a new replacement unit and wish to use the same hostname, contact Trustwave TAC to ensure that there are no duplicates in the registration database. Trustwave can remove the older appliance record from the database to allow you to pick the same hostname.

To contact Trustwave about this article or to request support:


Rate this Article:
     

Add Your Comments


Comment submission is disabled for anonymous users.
Please send feedback to Trustwave Technical Support or the Webmaster
.