attacks (Security Exempt Rulebase)
Syntax
attacks { custom-attack-group [attack-group-name]; custom-attack [attack-name]; dynamic-attack-group [attack-group-name]; predefined-attack-groups [attack-group-name]; predefined-attacks [attack-name]; }
Hierarchy Level
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match]
Description
Specify the attacks that you do not want the device to match in the monitored network traffic. Each attack is defined as an attack object, which represents a known pattern of attack.
Options
The remaining statements are explained separately. See CLI Explorer.
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Release Information
Statement introduced in Junos OS Release 9.2.