Configuring the DNP3 Preprocessor
Note | This section applies to Snort 2 preprocessors. For information on Snort 3 inspectors, see https://www.cisco.com/go/snort3-inspectors. |
You should not enable this preprocessor in a network analysis policy that you apply to traffic if your network does not contain any DNP3-enabled devices.
Procedure
Step 1 | Choose Network Analysis Policy or , then click Network Analysis Policies. , then click
| ||
Step 2 | Click Snort 2 Version next to the policy you want to edit. | ||
Step 3 | Click Edit () next to the policy you want to edit. If View () appears instead, the configuration belongs to an ancestor domain, or you do not have permission to modify the configuration. | ||
Step 4 | Click Settings in the navigation panel. | ||
Step 5 | If DNP3 Configuration under SCADA Preprocessors is disabled, click Enabled. | ||
Step 6 | Click Edit () next to DNP3 Configuration. | ||
Step 7 | Enter a value for Ports. Separate multiple values with commas. | ||
Step 8 | Check or clear the Log bad CRCs check box. | ||
Step 9 | To save changes you made in this policy since the last policy commit, click Policy Information, then click Commit Changes. If you leave the policy without committing changes, cached changes since the last commit are discarded if you edit a different policy. |
What to do next
-
If you want to generate events and, in an inline deployment, drop offending packets, enable DNP3 preprocessor rules (GID 145). For more information, see Setting Intrusion Rule States, DNP3 Preprocessor Options, and DNP3 Preprocessor Rules.
-
Deploy configuration changes.