chain
Syntax
chain {expression boolean-expression ;member
member-name
{attack-type {(anomaly | signature);}}order;protocol-binding {application application-name ;icmp;ip {protocol-number transport-layer-protocol-number
; }rpc {program-number rpc-program-number
;}tcp {minimum-port port-number maximum-port port-number ;}udp {minimum-port port-number maximum-port port-number ;}}reset;scope (session | transaction);}
Hierarchy Level
[edit security idp custom-attack attack-name attack-type]
Release Information
Statement introduced in Release 9.3 of Junos OS.
Description
Chain attack object combines multiple signatures and/or protocol anomalies into a single object. Traffic must match all of the combined signatures and/or protocol anomalies to match the chain attack object.
Options
The remaining statements are explained separately.
Usage Guidelines
For configuration instructions and examples, see the Junos OS Security Configuration Guide.
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Hide Navigation Pane
Show Navigation Pane
Download
SHA1