Software Secure Firewall Threat Defense
Platform Secure Firewall Threat Defense Virtual
Activity Onboard

View Network Analysis Policy Mapping

Procedure

1

Go to Policies > Intrusion > Network Analysis Policies.

2

Click NAP Mapping.

3

Expand the arrow for View Mappings.

The Snort 3 network analysis policies that are automatically mapped to a Snort 2 equivalent policy are displayed.

4

Click OK.