Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual page 87

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Table 41: Custom Attack – Attack Patterns
Setting
Pattern
Negate
Copyright © 2010, Juniper Networks, Inc.
Click Next.
On the Custom Attack – Attack Patterns page, configure the settings described in
3.
Table 41 on page 71.
Description
\0 <octal_number>
\X<hexadecimal-number>\X
\[<character-set>\]
.
*
+
?
()
|
[<start>-<end>]
[^<start>-<end>]
Select this option to negate the attack pattern.
Chapter 5: Working with Attack Objects
For a direct binary match.
For a direct binary match.
For case insensitive matches.
To match any symbol.
To match 0 or more symbols.
To match 1 or more symbols.
To match 0 or 1 symbols.
Grouping of expressions.
Alternation. Typically used with ().
Character range.
Negation of character range.
71

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents