chain
Syntax
chain { expression boolean-expression; member (Security IDP) member-name { attack-type (Security Anomaly) { (anomaly ...same statements as in [edit security idp custom-attack attack-name attack-type anomaly] hierarchy level | signature ...same statements as in [edit security idp custom-attack attack-name attack-type signature] hierarchy level); } } order; protocol-binding { application (Security Custom Attack) application-name; icmp; icmpv6; ip (Security IDP Custom Attack) { protocol-number transport-layer-protocol-number; } ipv6 { protocol-number transport-layer-protocol-number; } rpc { program-number rpc-program-number; } tcp (Security IDP Protocol Binding) { minimum-port port-number <maximum-port port-number>; } udp (Security IDP Protocol Binding) { minimum-port port-number <maximum-port port-number>; } } reset; scope (session | transaction); }
Hierarchy Level
[edit security idp custom-attack attack-name attack-type]
Description
Chain attack object combines multiple signatures and/or protocol anomalies into a single object. Traffic must match all of the combined signatures and/or protocol anomalies to match the chain attack object.
Options
The remaining statements are explained separately. See CLI Explorer.
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Release Information
Statement introduced in Junos OS Release 9.3.