attacks (Exempt Rulebase)

Syntax

attacks {custom-attacks [attack-name];predefined-attack-groups [attack-name];predefined-attacks [attack-name];}

Hierarchy Level

[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match]

Release Information

Statement introduced in Release 9.2 of Junos OS.

Description

Specify the attacks that you do not want the device to match in the monitored network traffic. Each attack is defined as an attack object, which represents a known pattern of attack.

Options

The remaining statements are explained separately.

Usage Guidelines

For configuration instructions and examples, see the Junos OS Security Configuration Guide.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.