Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Announcement: Try the Ask AI chatbot for answers to your technical questions about Juniper products and solutions.

close
header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents

attacks (Security Exempt Rulebase)

date_range 20-Nov-23

Syntax

content_copy zoom_out_map
attacks {
    custom-attack-group [attack-group-name];
    custom-attack [attack-name];
    dynamic-attack-group [attack-group-name];
    predefined-attack-groups [attack-group-name];
    predefined-attacks [attack-name];
}

Hierarchy Level

content_copy zoom_out_map
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match]

Description

Specify the attacks that you do not want the device to match in the monitored network traffic. Each attack is defined as an attack object, which represents a known pattern of attack.

Options

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.2.

footer-navigation