Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Announcement: Try the Ask AI chatbot for answers to your technical questions about Juniper products and solutions.

close
header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents

policy (Security Alarms)

date_range 20-Nov-23

Syntax

content_copy zoom_out_map
policy {
    application {
        duration interval;
        size count;
        threshold value;
    }
    destination-ip {
        duration interval;
        size count;
        threshold value;
    }
    policy match {
        duration interval;
        size count;
        threshold value;
    }
    source-ip {
        duration interval;
        size count;
        threshold value;
    }
}

Hierarchy Level

content_copy zoom_out_map
[edit security alarms potential-violation]

Description

Configure alarms for policy violation, based on source IP, destination IP, application, and policy rule.

Options

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.2.

footer-navigation