attacks (Exempt Rulebase)
Syntax
attacks {custom-attacks [attack-name];predefined-attack-groups
[attack-name];predefined-attacks [attack-name];}
Hierarchy Level
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match]
Release Information
Statement introduced in Release 9.2 of Junos OS.
Description
Specify the attacks that you do not want the device to match in the monitored network traffic. Each attack is defined as an attack object, which represents a known pattern of attack.
Options
The remaining statements are explained separately.
Usage Guidelines
For configuration instructions and examples, see the Junos OS Security Configuration Guide.
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Hide Navigation Pane
Show Navigation Pane
Download
SHA1