Software Secure Firewall Threat Defense
Platform Secure Firewall Threat Defense Virtual
Activity Onboard

Advanced Network Analysis and Preprocessing Application Layer Preprocessors The POP Preprocessor Configuring the POP Preprocessor

Last updated: Jul 29, 2025

Configuring the POP Preprocessor


 

This section applies to Snort 2 preprocessors. For information on Snort 3 inspectors, see https://www.cisco.com/go/snort3-inspectors.

Procedure

1

Choose Policies > Access Control heading > Access Control, and then click Network Analysis Policy or Policies > Access Control heading > Intrusion, and then click Network Analysis Policies.


 

If your custom user role limits access to the first path listed here, use the second path to access the policy.

2

Click Snort 2 Version next to the policy you want to edit.

3

Click Edit (edit icon) next to the policy you want to edit.

If View (View button) appears instead, the configuration belongs to an ancestor domain, or you do not have permission to modify the configuration.

4

Click Settings in the navigation panel.

5

If POP Configuration under Application Layer Preprocessors is disabled, click Enabled.

6

Click Edit (edit icon) next to POP Configuration.

7

Modify the settings described in POP Preprocessor Options.

8

To save changes you made in this policy since the last policy commit, click Policy Information, then click Commit Changes.

If you leave the policy without committing changes, cached changes since the last commit are discarded if you edit a different policy.

What to do next

  • If you want to enable intrusion events, enable POP preprocessor rules (GID 142). For more information, see Setting Intrusion Rule States.

  • Deploy configuration changes.