Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

attacks (Security Exempt Rulebase)

date_range 20-Nov-23

Syntax

content_copy zoom_out_map
attacks {
    custom-attack-group [attack-group-name];
    custom-attack [attack-name];
    dynamic-attack-group [attack-group-name];
    predefined-attack-groups [attack-group-name];
    predefined-attacks [attack-name];
}

Hierarchy Level

content_copy zoom_out_map
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match]

Description

Specify the attacks that you do not want the device to match in the monitored network traffic. Each attack is defined as an attack object, which represents a known pattern of attack.

Options

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.2.

footer-navigation