To configure IDS actions, include the then statement at the [edit services ids rule rule-name term term-name] hierarchy level:
-
then {
-
-
aggregation {
-
destination-prefix prefix-value | destination-prefix-ipv6 prefix-value;
-
source-prefix prefix-value | source-prefix-ipv6 prefix-value;
- }
- (force-entry | ignore-entry);
-
-
logging {
-
syslog;
-
threshold rate;
- }
-
-
session-limit {
-
-
by-destination {
- hold-time seconds;
- maximum number;
- packets number;
- rate number;
- }
-
-
by-pair {
- hold-time seconds;
- maximum number;
- packets number;
- rate number;
- }
-
-
by-source {
- hold-time seconds;
- maximum number;
- packets number;
- rate number;
- }
- }
-
-
syn-cookie {
-
mss value;
-
threshold rate;
- }
- }
You can configure the following possible actions:
To configure aggregation prefixes, include the aggregation statement at the [edit services ids rule rule-name term term-name then] hierarchy level and specify values for source-prefix, destination-prefix source-prefix-ipv6, or destination-prefix-ipv6:
-
aggregation {
-
destination-prefix prefix-value | destination-prefix-ipv6 prefix-value;
-
source-prefix prefix-value | source-prefix-ipv6 prefix-value;
- }
The value of source-prefix and destination-prefix must be an integer between 1 and 32. The value of source-prefix-ipv6 and destination-prefix-ipv6 must be an integer between 1 and 128.
ignore-entry ensures that all IDS events are ignored. You can use this statement to disregard all traffic from a host you trust, including any temporary anomalies that IDS would otherwise count as events.
To configure an entry behavior different from the default, include the force-entry or ignore-entry statement at the [edit services ids rule rule-name term term-name then] hierarchy level:
- (force-entry | ignore-entry);
To configure logging, include the logging statement at the [edit services ids rule rule-name term term-name then] hierarchy level:
You can optionally include a threshold rate to trigger the generation of system log messages. The threshold rate is specified in events per second. IDS logs are generated once every 60 seconds for each anomaly that is reported. The logs are generated as long as the events continue.
To configure a threshold, include the session-limit statement at the [edit services ids rule rule-name term term-name then] hierarchy level:
-
session-limit {
-
-
by-destination {
- hold-time seconds;
- maximum number;
- packets number;
- rate number;
- }
-
-
by-pair {
- hold-time seconds;
- maximum number;
- packets number;
- rate number;
- }
-
-
by-source {
- hold-time seconds;
- maximum number;
- packets number;
- rate number;
- }
- }
You configure the thresholds for flow limitation based on traffic direction:
You can configure the following threshold values:
If you configure more than one source address at the [edit services ids rule rule-name term term-name from] hierarchy level, limits are applied for each source address independently. For example, the following configuration allows 20 connections from each source address, not 20 connections total. The same logic applies to destination-address and applications settings.
- [edit services ids rule rule-name term term-name]
- from {
-
- source-address 10.1.1.1;
- source-address 10.1.1.2;
- }
- then {
-
- session-limit by-source {
-
- maximum 20;
- }
- }
![]() |
Note: IDS limits are applied to packets that are accepted by stateful firewall rules. They are not applied to packets discarded or rejected by stateful firewall rules. For example, if the stateful firewall accepts 75 percent of the incoming traffic and the remaining 25 percent is rejected or discarded, the IDS limit applies only to 75 percent of the traffic. |
To configure SYN-cookie values, include the syn-cookie statement at the [edit services ids rule rule-name term term-name then] hierarchy level:
-
syn-cookie {
-
mss value;
-
threshold rate;
- }
If you enable SYN-cookie defenses, you must include both a threshold rate to trigger SYN-cookie activity and a Transmission Control Protocol (TCP) maximum segment size (MSS) value for TCP delayed binding. The threshold rate is specified in SYN attacks per second. By default, the TCP MSS value is 1500; the range is from 128 through 8192.