Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01 Manual page 89

Configuring intrusion detection and prevention devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Table 41: Custom Attack – Attack Patterns
Setting
Pattern
Negate
Copyright © 2010, Juniper Networks, Inc.
Click Next.
On the Custom Attack – Attack Patterns page, configure the settings described in
3.
Table 41 on page 73.
Description
\0 <octal_number>
\X<hexadecimal-number>\X
\[<character-set>\]
.
*
+
?
()
|
[<start>-<end>]
[^<start>-<end>]
Select this option to negate the attack pattern.
Chapter 5: Working with Attack Objects
For a direct binary match.
For a direct binary match.
For case insensitive matches.
To match any symbol.
To match 0 or more symbols.
To match 1 or more symbols.
To match 0 or 1 symbols.
Grouping of expressions.
Alternation. Typically used with ().
Character range.
Negation of character range.
73

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01 and is the answer not in the manual?

Table of Contents