snackray gave you the answer. There will be one of several recommended action by Juniper.
Snackray gave you answer. The out put shows the recommended action
https://www.juniper.net/documentation/en_US/junos12.1x44/topics/reference/configuration-statement/security-edit-recommended-action.html
Syntax
recommended-action (close | close-client | close-server | drop | drop-packet | ignore | none);
Hierarchy Level
[edit security idp custom-attack attack-name]
Description
When the security device detects an attack, it performs the specified action.
Options
The seven actions are as follows, from most to least severe:
close—Reset the client and the server.
close-client—Reset the client.
close-server—Reset the server.
drop—Drop the particular packet and all subsequent packets of the flow.
drop-packet—Drop the particular packet of the flow.
ignore—Do not inspect any further packets.
none—Do not perform any action.
root@srx> show security idp attack detail HTTP:LINUX:REDHAT-ACCEPT-LANG
Display Name: HTTP: Red Hat Directory Server Accept-Language HTTP Header Parsing Buffer Overflow
Severity: Major
Category: HTTP
Recommended: true
Recommended Action: Drop
Type: chain
False Positives: unknown
Service: HTTP