See the following sections:
- attacks {
- custom-attacks [attack-name];
- predefined-attack-groups
[attack-name];
- predefined-attacks [attack-name];
- }
- [edit security idp idp-policy policy-name rulebase-exempt rule rule-name match]
Statement introduced in Release 9.2 of JUNOS software.
Specify the attacks that you do not want the device to match in the monitored network traffic. Each attack is defined as an attack object, which represents a known pattern of attack.
This statement is supported on SRX-series devices.
The remaining statements are explained separately.
For configuration instructions and examples, see the JUNOS Software Security Configuration Guide.
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
- attacks {
- custom-attacks [attack-name];
- predefined-attack-groups
[attack-name];
- predefined-attacks [attack-name];
- }
- [edit security idp idp-policy policy-name rulebase-ips rule rule-name match]
Statement introduced in Release 9.2 of JUNOS software.
Specify the attacks you want the device to match in the monitored network traffic. Each attack is defined as an attack object, which represents a known pattern of attack.
This statement is supported on SRX-series devices.
The remaining statements are explained separately.
For configuration instructions and examples, see the JUNOS Software Security Configuration Guide.
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.