Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

severity (Security IDP Custom Attack)

Syntax

Hierarchy Level

Description

Select the severity that matches the lethality of the attack object on your network.

Options

You can set the severity level to the following levels:

  • critical—Contains attack objects matching exploits that attempt to evade detection, cause a network device to crash, or gain system-level privileges.

  • warning—Contains attack objects matching exploits that attempt to obtain noncritical information or scan a network with a scanning tool.

  • major—Contains attack objects matching exploits that attempt to disrupt a service, gain user-level access to a network device, or activate a Trojan horse previously loaded on a device.

  • minor—Contains attack objects matching exploits that detect reconnaissance efforts attempting to access vital information through directory traversal or information leaks.

  • info—Contains attack objects matching normal, harmless traffic containing URLs, DNS lookup failures, SNMP public community strings, and Peer-to-Peer (P2P) parameters. You can use informational attack objects to obtain information about your network.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.3.