[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

attacks

See the following sections:

attacks (Exempt Rulebase)

Syntax

attacks {
custom-attacks [attack-name];
predefined-attack-groups [attack-name];
predefined-attacks [attack-name];
}

Hierarchy Level

[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match]

Release Information

Statement introduced in Release 9.2 of JUNOS software.

Description

Specify the attacks that you do not want the device to match in the monitored network traffic. Each attack is defined as an attack object, which represents a known pattern of attack.

This statement is supported on SRX-series devices.

Options

The remaining statements are explained separately.

Usage Guidelines

For configuration instructions and examples, see the JUNOS Software Security Configuration Guide.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

attacks (IPS Rulebase)

Syntax

attacks {
custom-attacks [attack-name];
predefined-attack-groups [attack-name];
predefined-attacks [attack-name];
}

Hierarchy Level

[edit security idp idp-policy policy-name rulebase-ips rule rule-name match]

Release Information

Statement introduced in Release 9.2 of JUNOS software.

Description

Specify the attacks you want the device to match in the monitored network traffic. Each attack is defined as an attack object, which represents a known pattern of attack.

This statement is supported on SRX-series devices.

Options

The remaining statements are explained separately.

Usage Guidelines

For configuration instructions and examples, see the JUNOS Software Security Configuration Guide.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]