Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

notification

date_range 20-Nov-23

Syntax

content_copy zoom_out_map
notification {
    log-attacks {
        alert;
    }
    packet-log (Security IDP Policy) {
        post-attack number;
        post-attack-timeout seconds;
        pre-attack number;
    }
}

Hierarchy Level

content_copy zoom_out_map
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then]

Description

Configure the logging options against the action. When attacks are detected, you can choose to log an attack and create log records with attack information and send that information to the log server.

Options

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.2. Added packet capture support in Junos OS Release 10.2.

footer-navigation