post-attack

Syntax

post-attack number;

Hierarchy Level

[edit security idp idp-policy rulebase-ips rule rule-name then notification packet-log]

Release Information

Statement introduced in Release 10.2 of Junos OS.

Description

Specify the number of packets received after an attack that should be captured for further analysis of attacker behavior. If post-attack packets are not significant to your analysis or the configured attack response ends packet transfer, you can set the post-attack option to 0.

Options

number—Number of post-attack packets to be captured.

Range: 0 through 255
Default: 5

Usage Guidelines

For configuration instructions and examples, see the Junos OS Security Configuration Guide.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.