Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

packet-log (Security IDP Policy)

date_range 20-Nov-23

Syntax

content_copy zoom_out_map
packet-log {
    post-attack number;
    post-attack-timeout seconds;
    pre-attack number;
}

Hierarchy Level

content_copy zoom_out_map
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then notification]

Description

In response to a rule match, capture the packets received before and after the attack for further offline analysis of attacker behavior. You can configure the number of pre-attack and post-attack packets to be captured for this attack, and limit the duration of post-attack packet capture by specifying a timeout value.

In case of multiple attacks that are hit for the same session, packets capture occurs for the first attack that was hit on that specific session ID.

Options

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 10.2.

footer-navigation