packet-log (Security IDP Policy)
Syntax
packet-log { post-attack number; post-attack-timeout seconds; pre-attack number; }
Hierarchy Level
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then notification]
Description
In response to a rule match, capture the packets received before and after the attack for further offline analysis of attacker behavior. You can configure the number of pre-attack and post-attack packets to be captured for this attack, and limit the duration of post-attack packet capture by specifying a timeout value.
In case of multiple attacks that are hit for the same session, packets capture occurs for the first attack that was hit on that specific session ID.
Options
The remaining statements are explained separately. See CLI Explorer.
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Release Information
Statement introduced in Junos OS Release 10.2.