attacks (Security Exempt Rulebase)
Syntax
attacks {
custom-attack-group [attack-group-name];
custom-attack [attack-name];
dynamic-attack-group [attack-group-name];
predefined-attack-groups [attack-group-name];
predefined-attacks [attack-name];
}
Hierarchy Level
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match]
Description
Specify the attacks that you do not want the device to match in the monitored network traffic. Each attack is defined as an attack object, which represents a known pattern of attack.
Options
The remaining statements are explained separately. See CLI Explorer.
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Release Information
Statement introduced in Junos OS Release 9.2.