[Contents] [Prev] [Next] [Index] [Report an Error]

CLI Configuration

To create a signature-based attack object:

  1. Specify a name for the attack. The following statement specifies sig1 as the name of the attack.
    user@host# set security idp custom-attack sig1
  2. Specify common properties for the attack. The following statements specify a recommended action to drop packets and define time binding with scope as source scope and count as 10.
    user@host# set security idp custom-attack sig1 recommended-action drop-packet
    user@host#set security idp custom-attack sig1 time-binding scope source count 10
  3. Specify the attack type and context. The following statement specifies the attack type signature and context packet.
    user@host# set security idp custom-attack sig1 attack-type signature context packet
  4. Specify the attack direction and the shellcode flag. The following statement specifies the attack direction any and sets the shellcode flag to intel.
    user@host# set security idp custom-attack sig1 attack-type signature shellcode intel
  5. Set the protocol and its fields. The following statement specifies the IP protocol and the TTL value 128.
    user@host# set security idp custom-attack sig1 attack-type signature protocol ip ttl value 128 match equal
  6. Specify the protocol binding and ports. The following statement specifies the TCP protocol and the port range from 50 through 100.
    user@host# set security idp custom-attack sig1 attack-type signature protocol-binding tcp minimum-port 50 maximum-port 100
  7. If you are finished configuring the router, commit the configuration.
  8. From configuration mode in the CLI, enter the show security idp command to verify the configuration. For more information, see the JUNOS Software CLI Reference.

[Contents] [Prev] [Next] [Index] [Report an Error]