Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

rule (Security Exempt Rulebase)

date_range 20-Nov-23

Syntax

content_copy zoom_out_map
rule rule-name {
    description text;
    match (Security IDP Policy) {
        attacks (Security IPS Rulebase) {
            custom-attack-groups [attack-group-name];
            custom-attacks [attack-name];
            dynamic-attack-groups [attack-group-name];
            predefined-attack-groups [attack-group-name];
            predefined-attacks [attack-name];
        }
        destination-address (Security IDP Policy) ([address-name] | any | any-ipv4 | any-ipv6);
        destination-except [address-name];
        from-zone (zone-name | any );
        source-address ([address-name] | any | any-ipv4 | any-ipv6);
        source-except [address-name];
        to-zone (zone-name | any);
    }
}

Hierarchy Level

content_copy zoom_out_map
[edit security idp idp-policy policy-name rulebase-exempt]

Description

Specify exempt rule to create, modify, delete, and reorder the rules in a rulebase.

Options

rule-name—Name of the exempt rulebase rule.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.2.

footer-navigation