- chain {
- expression boolean-expression ;
-
- member
member-name
{
-
- attack-type {
- (anomaly | signature);
- }
- }
- order;
-
- protocol-binding {
- application application-name ;
- icmp;
-
- ip {
- protocol-number transport-layer-protocol-number
;
- }
-
- rpc {
- program-number rpc-program-number
;
- }
-
- tcp {
- minimum-port port-number maximum-port port-number ;
- }
-
- udp {
- minimum-port port-number maximum-port port-number ;
- }
- }
- reset;
- scope (session | transaction);
- }
- [edit security idp custom-attack attack-name attack-type]
Statement introduced in Release 9.3 of JUNOS software.
Chain attack object combines multiple signatures and/or protocol anomalies into a single object. Traffic must match all of the combined signatures and/or protocol anomalies to match the chain attack object.
This statement is supported on SRX-series devices.
The remaining statements are explained separately.
For configuration instructions and examples, see the JUNOS Software Security Configuration Guide.
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.