Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

packet-log (Security IDP Policy)

Syntax

Hierarchy Level

Description

In response to a rule match, capture the packets received before and after the attack for further offline analysis of attacker behavior. You can configure the number of pre-attack and post-attack packets to be captured for this attack, and limit the duration of post-attack packet capture by specifying a timeout value.

In case of multiple attacks that are hit for the same session, packets capture occurs for the first attack that was hit on that specific session ID.

Options

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 10.2.