log-attacks
Syntax
log-attacks { alert; }
Hierarchy Level
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then notification]
Description
Enable the log attacks to create a log record that appears in the log viewer.
In addition to the regular system log messages, IDP generates event logs for attacks. IDP generates event logs when an event matches an IDP policy rule in which logging is enabled. When you configure a rule for logging, the device creates a log entry for each event that matches that rule.
Specify an alert option for a rule in the IDP policy. When the rule is matched, the corresponding log record displays an alert in the alert column of the Log Viewer. Security administrators use alerts to become aware of and react to important security events.
Options
alert | Set an alert flag in the Alert column of the Log Viewer for the matching log record. |
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Release Information
Statement introduced in Junos OS Release 9.2.