Tag Elements Beginning with A > <attack-type> (configuration/security/idp/custom-attack) Usage <configuration> <security> <idp> <custom-attack> <attack-type> <signature>...</signature> <anomaly>...</anomaly> <chain>...</chain> </attack-type> </custom-attack> </idp> </security></configuration> Description Type of attack. Contents <anomaly>—Protocol anomaly. <chain>—Chain attack. <signature>—Signature based attack.
Tag Elements Beginning with A > <attack-type> (configuration/security/idp/custom-attack)
<configuration> <security> <idp> <custom-attack> <attack-type> <signature>...</signature> <anomaly>...</anomaly> <chain>...</chain> </attack-type> </custom-attack> </idp> </security></configuration>
<configuration>
<security>
<idp>
<custom-attack>
<attack-type>
<signature>
...
</signature>
<anomaly>
</anomaly>
<chain>
</chain>
</attack-type>
</custom-attack>
</idp>
</security></configuration>
Type of attack.
<anomaly>—Protocol anomaly.
<chain>—Chain attack.
<signature>—Signature based attack.