post-attack
Syntax
post-attack number;
Hierarchy Level
[edit security idp idp-policy
rulebase-ips rule rule-name then notification packet-log]
Release Information
Statement introduced in Release 10.2 of Junos OS.
Description
Specify the number of packets received after an attack that should be captured for further analysis of attacker behavior. If post-attack packets are not significant to your analysis or the configured attack response ends packet transfer, you can set the post-attack option to 0.
Options
number—Number of post-attack packets to be captured.
- Range: 0 through 255
- Default: 5
Usage Guidelines
For configuration instructions and examples, see the Junos OS Security Configuration Guide.
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Hide Navigation Pane
Show Navigation Pane
Download
SHA1