HP Sygate Security Agent User Guide
Rule Summary field ...........................................................................................................
20
Hosts Tab.................................................................................................................................
All addresses .......................................................................................................................
21
MAC addresses...................................................................................................................
IP Address(es) ....................................................................................................................
Subnet..................................................................................................................................
Ports and Protocols Tab ........................................................................................................
Protocol...............................................................................................................................
22
All Protocols .................................................................................................................
TCP ...............................................................................................................................
UDP ...............................................................................................................................
ICMP..............................................................................................................................
23
IP Type ..........................................................................................................................
Traffic Direction ................................................................................................................
Scheduling Tab ........................................................................................................................
Enable Scheduling .............................................................................................................
24
During the period below .............................................................................................
Excluding the period below........................................................................................
Beginning At.......................................................................................................................
Duration..............................................................................................................................
Applications Tab .....................................................................................................................
25
Display selected applications only...................................................................................
Applications........................................................................................................................
Select All..............................................................................................................................
Clear All...............................................................................................................................
Browse.................................................................................................................................
26
Chapter 5. Monitoring and Logging.......................................................................
27
Types of Logs ..........................................................................................................................
Viewing Logs ...........................................................................................................................
28
Security Log .............................................................................................................................
Icons for the Security Log ..........................................................................................
Security Log Parameters and Description ................................................................
29
Description and Data Fields for the Security Log...................................................
30
Traffic Log ...............................................................................................................................
Icons for the Traffic Log ............................................................................................
31
Traffic Log Parameters and Description ..................................................................
Description and Data Fields for the Traffic Log.....................................................
32
Packet Log................................................................................................................................
33
Icons for the Packet Log.............................................................................................
Packet Log Parameters and Description...................................................................
Packet Decode and Packet Dump for the Packet Log...........................................
34
System Log...............................................................................................................................
Icons for the System Log............................................................................................
iv