Copyright © 2010, Juniper Networks, Inc.
Table 36: Attack Pattern Syntax (continued)
Pattern
Character range
Negation of range
NOTE: Regular expression support is provided by the PCRE library package,
which is open source software, written by Philip Hazel, and copyright by the
University of Cambridge, England.
Table 37 on page 353 lists some example syntax matches.
Table 37: Attack Pattern Syntax Example Matches
This syntax
Matches
\X01 86 A5 00 00\X
the five specified bytes verbatim
(hello|world)
hello or world
(hello|world) +
hello or world one or more times
\[hello\]
hello in a case insensitive manner
[c-e]a(d|t)
Anything with the first letter of c, d, or e, the
middle letter a and ending in d or t
[^c-d]a(d|t)
Expressions that begin with a letter other
than c, d, or e, have the second letter a, and
end in d or t
Chapter 8: Configuring Objects
Syntax
[<start>-<end>]
[^<start>-<end>]
Example
01 86 A5 00 00
hello
world
helloworld
world hello
hellohello
hElLo
HEllO
heLLO
cad
cat
dad
dat
ead
eat
fad
zad
353
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers