Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

idp-policy (Security)

date_range 20-Nov-23

Syntax

content_copy zoom_out_map
idp-policy policy-name {
    rulebase-exempt {
        rule rule-name {
            description text;
            match {
                attacks {
                    custom-attack-groups [attack-group-name];
                    custom-attacks [attack-name];
                    dynamic-attack-groups [attack-group-name];
                    predefined-attack-groups [attack-group-name];
                    predefined-attacks [attack-name];
                }
                destination-address ([address-name] | any | any-ipv4 | any-ipv6);
                destination-except [address-name];
                from-zone (zone-name | any );
                source-address ([address-name] | any | any-ipv4 | any-ipv6);
                source-except [address-name];
                to-zone (zone-name | any);
            }
        }
    }
        rulebase-ips {
            rule rule-name {
            description text;
            match {
                application (application-name | any | default);
                attacks {
                    custom-attack-groups [attack-group-name];
                    custom-attacks [attack-name];
                    dynamic-attack-groups [attack-group-name];
                    predefined-attack-groups [attack-group-name];
                    predefined-attacks [attack-name];
                }
                destination-address ([address-name] | any | any-ipv4 | any-ipv6);
                destination-except [address-name];
                from-zone (zone-name | any );
                source-address ([address-name] | any | any-ipv4 | any-ipv6);
                source-except [address-name];
                to-zone (zone-name | any);
            }
            terminal;
            then {
                action {
                    class-of-service {
                        dscp-code-point number;
                         forwarding-class forwarding-class;
                    }
                    (close-client | close-client-and-server | close-server |drop-connection | drop-packet | ignore-connection | mark-diffserv value | no-action | recommended);
                }
                ip-action {
                    (ip-block | ip-close | ip-notify);
                    log;
                    log-create;
                    refresh-timeout;
                    target (destination-address | service | source-address | source-zone | source-zone-address | zone-service);
                    timeout seconds;
                }
                notification {
                    log-attacks {
                        alert;
                    }
                    packet-log {
                        post-attack number;
                        post-attack-timeout seconds;
                        pre-attack number;
                    }
                }
                severity (critical | info | major | minor | warning);
            }
        }
    }
}

Hierarchy Level

content_copy zoom_out_map
[edit security idp]
[edit tenants tenant-name security idp]

Description

Configure a security IDP policy.

Options

policy-name—Name of the IDP policy.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.2.

Starting with Junos OS Release 18.2R1, IDP policy is directly assigned in the security policy rule. This is to simplify IDP policy usage and to provide flexibility to have multiple policies active at the same time. As a part of the session interest check, IDP is enabled if an IDP policy is present in any of the matched rules. An IDP policy is activated in security policies by permitting the IDP policy within the application services using the set security policies from-zone zone-name to-zone zone-name policy policy-name then permit application-services idp-policy idp-policy-name command. Because the IDP policy name is directly used in the security policy rule, the [edit security idp active-policy policy-name] statement is deprecated.

Additional tags under filters of dynamic attack groups (CVSS score, age-of-attack, file-type, vulnerability-type) are added in Junos OS Release 18.2R1 for dynamic attacks grouping of IDP signatures. The Product and Vendor tags are already supported under existing filter products. The CLI interface for configuring these tags is now more user friendly, with more options available for configuration in Junos OS Release 18.2R1.

Starting in Junos OS Release 18.3R1, with unified policies configured on an SRX Series Firewall, you can configure multiple IDP policies and set one of those policies as the default IDP policy.

Note:

If you have configured two or more IDP policies in a unified security policy, then you must configure the default IDP policy.

footer-navigation