Example: Configuring IDP Log Suppression Attributes (CLI)

Before you begin, do the following:

  1. Configure network interfaces. See the JUNOS Software Interfaces Configuration Guide for Security Devices.
  2. Download the signature database. See Updating the IDP Signature Database Manually Overview.

In the configuration instructions for this example, you configure log suppression to begin after the second occurrence of an event. You also specify that logs are reported after 20 seconds.

To configure log suppression attributes:

  1. Specify the log number after which you want to start log suppression. In the following statement you specify that log suppression starts after the second instance of an event:
    user@host# set security idp sensor-configuration log suppression start-log 2
  2. Specify the maximum time after which suppressed logs are reported. In the following statement you specify that IDP reports suppressed logs after 20 seconds:
    user@host# set security idp sensor-configuration log suppression max-time-report 20
  3. If you are finished configuring the device, commit the configuration.
  4. From configuration mode in the CLI, enter the show security idp command to verify the configuration. For more information, see the JUNOS Software CLI Reference.

Related Topics