HP Sygate Security Agent User Guide

Table 8. Traffic Log Parameters and Description

Name of

Description

Parameter

 

Local

Port and ICMP code used on the Agent device (only appears in Local View

Port/ICMP

- this is the default)

Code

 

 

 

Source Host

Name of the source computer (only appears in Source View)

 

 

Source MAC

MAC address of the source computer (only appears in Source View)

 

 

Source

Port and ICMP type on the source computer (only appears in Source View)

Port/ICMP

 

Type

 

 

 

Destination

IP address of the destination computer (only appears in Source View)

Host

 

 

 

Destination

MAC address of the destination computer (only appears in Source View)

MAC

 

 

 

Destination

Port and ICMP code used on the destination computer (only appears in

Port/ICMP

Source View)

Code

 

 

 

Application

Name of the application associated with the attack

Name

 

 

 

User

Login name of the user

 

 

Domain

Domain of the user

 

 

Security

Security level for the Agent, set to either Block All or Normal.

 

 

Location

The Location (Office, Home, VPN, etc.) that was in effect at the time of

 

the attack

 

 

Occurrences

Number of packets each piece of traffic sends between the beginning

 

and ending time

 

 

Begin Time

Time traffic starts matching the rule

 

 

End Time

Time traffic stops matching the rule

 

 

Rule Name

The rule that determined the passing or blockage of this traffic

 

 

Description and Data Fields for the Traffic Log

Below the rows of logged events are the Description and Data fields. When you click an event row, the entire row is highlighted. A description of the event is displayed in the Description field.

32