[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
CLI Configuration
To create a signature-based attack object:
- Specify a name for the attack. The following statement
specifies sig1 as the name of the attack.
- user@host# set security idp custom-attack
sig1
- Specify common properties for the attack.
The following statements specify a recommended action to drop packets
and define time binding with scope as source scope and count
as 10.
- user@host# set security idp custom-attack
sig1 recommended-action drop-packet
- user@host#set security idp custom-attack sig1
time-binding scope source count 10
- Specify the attack type and context.
The following statement specifies the attack type signature and context packet.
- user@host# set security idp custom-attack
sig1 attack-type signature context packet
- Specify the attack direction and the
shellcode flag. The following statement specifies the attack direction any and sets the shellcode flag to intel.
- user@host# set security idp custom-attack
sig1 attack-type signature shellcode intel
- Set the protocol and its fields. The
following statement specifies the IP protocol and the TTL value 128.
- user@host# set security idp custom-attack
sig1 attack-type signature protocol ip ttl value 128 match equal
- Specify the protocol binding and ports.
The following statement specifies the TCP protocol and the port range
from 50 through 100.
- user@host# set security idp custom-attack
sig1 attack-type signature protocol-binding tcp minimum-port 50 maximum-port
100
- If you are finished configuring the router,
commit the configuration.
- From configuration mode in the CLI, enter the show security idp command to verify the configuration. For more
information, see the JUNOS Software CLI Reference.
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]