Table 37: Attack Pattern Syntax Example Matches - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 36: Attack Pattern Syntax (continued)
Pattern
Character range
Negation of range
NOTE: Regular expression support is provided by the PCRE library package,
which is open source software, written by Philip Hazel, and copyright by the
University of Cambridge, England.
Table 37 on page 353 lists some example syntax matches.

Table 37: Attack Pattern Syntax Example Matches

This syntax
Matches
\X01 86 A5 00 00\X
the five specified bytes verbatim
(hello|world)
hello or world
(hello|world) +
hello or world one or more times
\[hello\]
hello in a case insensitive manner
[c-e]a(d|t)
Anything with the first letter of c, d, or e, the
middle letter a and ending in d or t
[^c-d]a(d|t)
Expressions that begin with a letter other
than c, d, or e, have the second letter a, and
end in d or t
Chapter 8: Configuring Objects
Syntax
[<start>-<end>]
[^<start>-<end>]
Example
01 86 A5 00 00
hello
world
helloworld
world hello
hellohello
hElLo
HEllO
heLLO
cad
cat
dad
dat
ead
eat
fad
zad
353

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents