Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

attacks (Security Exempt Rulebase)

Syntax

Hierarchy Level

Description

Specify the attacks that you do not want the device to match in the monitored network traffic. Each attack is defined as an attack object, which represents a known pattern of attack.

Options

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.2.