[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

chain

Syntax

chain {
expression boolean-expression ;
member member-name {
attack-type {
(anomaly | signature);
}
}
order;
protocol-binding {
application application-name ;
icmp;
ip {
protocol-number transport-layer-protocol-number ;
}
rpc {
program-number rpc-program-number ;
}
tcp {
minimum-port port-number maximum-port port-number ;
}
udp {
minimum-port port-number maximum-port port-number ;
}
}
reset;
scope (session | transaction);
}

Hierarchy Level

[edit security idp custom-attack attack-name attack-type]

Release Information

Statement introduced in Release 9.3 of JUNOS software.

Description

Chain attack object combines multiple signatures and/or protocol anomalies into a single object. Traffic must match all of the combined signatures and/or protocol anomalies to match the chain attack object.

This statement is supported on SRX-series devices.

Options

The remaining statements are explained separately.

Usage Guidelines

For configuration instructions and examples, see the JUNOS Software Security Configuration Guide.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]