Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

rule (Security IPS Rulebase)

date_range 20-Nov-23

Syntax

content_copy zoom_out_map
rule rule-name {
    description text;
    match (Security IDP Policy) {
        application (application-name | any | default);
        attacks (Security IPS Rulebase) {
            custom-attack-groups [attack-group-name];
            custom-attacks [attack-name];
            dynamic-attack-groups [attack-group-name];
            predefined-attack-groups [attack-group-name];
            predefined-attacks [attack-name];
        }
        destination-address (Security IDP Policy) ([address-name] | any | any-ipv4 | any-ipv6);
        destination-except [address-name];
        from-zone (zone-name | any );
        source-address ([address-name] | any | any-ipv4 | any-ipv6);
        source-except [address-name];
        to-zone (zone-name | any);
    }
    terminal;
    then {
        action {
            class-of-service {
                dscp-code-point number;
                 forwarding-class forwarding-class;
            }
            (close-client | close-client-and-server | close-server |drop-connection | drop-packet | ignore-connection | mark-diffserv value | no-action | recommended);
        }
        ip-action (Security IDP Rulebase IPS) {
            (ip-block | ip-close | ip-notify);
            log;
            log-create;
            refresh-timeout;
            target (destination-address | service | source-address | source-zone | source-zone-address | zone-service);
            timeout seconds;
        }
        notification {
            log-attacks {
                alert;
            }
            packet-log (Security IDP Policy) {
                post-attack number;
                post-attack-timeout seconds;
                pre-attack number;
            }
        }
        severity (critical | info | major | minor | warning);
    }
}

Hierarchy Level

content_copy zoom_out_map
[edit security idp idp-policy policy-name rulebase-ips]

Description

Specify IPS rule to create, modify, delete, and reorder the rules in a rulebase.

Options

rule-name—Name of the IPS rulebase rule.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.2.

Starting in Junos OS Release 18.2R1, IDP policy is available within unified security policy. When IDP policy is available within the unified security policy then the IDP polciy configurations are simplified. Configuring source or destination address, source and destination-except, from and to zone, or application is not required with unified policy, as the match happens in the security policy itself.

Additional tags under filters of dynamic attack groups are added in Junos OS Release 18.2R1 for dynamic attacks grouping of IDP signatures.

footer-navigation