Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

log-attacks (rulebase-exempt)

Syntax

Hierarchy Level

Description

Enable exempt rule logging in the IDP system, which can be used to monitor and analyze traffic patterns, detect potential security threats, and troubleshoot network issues.

Options

alert

Set alert flag in attack log

Required Privilege Level

security:

To view this statement in the configuration.

security-control:

To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 24.4R1.