chain

Syntax

chain {expression boolean-expression ;member member-name {attack-type {(anomaly | signature);}}order;protocol-binding {application application-name ;icmp;ip {protocol-number transport-layer-protocol-number ; }rpc {program-number rpc-program-number ;}tcp {minimum-port port-number maximum-port port-number ;}udp {minimum-port port-number maximum-port port-number ;}}reset;scope (session | transaction);}

Hierarchy Level

[edit security idp custom-attack attack-name attack-type]

Release Information

Statement introduced in Release 9.3 of Junos OS.

Description

Chain attack object combines multiple signatures and/or protocol anomalies into a single object. Traffic must match all of the combined signatures and/or protocol anomalies to match the chain attack object.

Options

The remaining statements are explained separately.

Usage Guidelines

For configuration instructions and examples, see the Junos OS Security Configuration Guide.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.