Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Announcement: Try the Ask AI chatbot for answers to your technical questions about Juniper products and solutions.

close
header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents

severity (Security IDP Custom Attack)

date_range 20-Nov-23

Syntax

content_copy zoom_out_map
severity (critical | info | major | minor | warning);

Hierarchy Level

content_copy zoom_out_map
[edit security idp custom-attack attack-name]

Description

Select the severity that matches the lethality of the attack object on your network.

Options

You can set the severity level to the following levels:

  • critical—Contains attack objects matching exploits that attempt to evade detection, cause a network device to crash, or gain system-level privileges.

  • warning—Contains attack objects matching exploits that attempt to obtain noncritical information or scan a network with a scanning tool.

  • major—Contains attack objects matching exploits that attempt to disrupt a service, gain user-level access to a network device, or activate a Trojan horse previously loaded on a device.

  • minor—Contains attack objects matching exploits that detect reconnaissance efforts attempting to access vital information through directory traversal or information leaks.

  • info—Contains attack objects matching normal, harmless traffic containing URLs, DNS lookup failures, SNMP public community strings, and Peer-to-Peer (P2P) parameters. You can use informational attack objects to obtain information about your network.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.3.

footer-navigation