HP Sygate Security Agent User Guide
Table 8. Traffic Log Parameters and Description
Name of | Description |
Parameter |
|
Local | Port and ICMP code used on the Agent device (only appears in Local View |
Port/ICMP | - this is the default) |
Code |
|
|
|
Source Host | Name of the source computer (only appears in Source View) |
|
|
Source MAC | MAC address of the source computer (only appears in Source View) |
|
|
Source | Port and ICMP type on the source computer (only appears in Source View) |
Port/ICMP |
|
Type |
|
|
|
Destination | IP address of the destination computer (only appears in Source View) |
Host |
|
|
|
Destination | MAC address of the destination computer (only appears in Source View) |
MAC |
|
|
|
Destination | Port and ICMP code used on the destination computer (only appears in |
Port/ICMP | Source View) |
Code |
|
|
|
Application | Name of the application associated with the attack |
Name |
|
|
|
User | Login name of the user |
|
|
Domain | Domain of the user |
|
|
Security | Security level for the Agent, set to either Block All or Normal. |
|
|
Location | The Location (Office, Home, VPN, etc.) that was in effect at the time of |
| the attack |
|
|
Occurrences | Number of packets each piece of traffic sends between the beginning |
| and ending time |
|
|
Begin Time | Time traffic starts matching the rule |
|
|
End Time | Time traffic stops matching the rule |
|
|
Rule Name | The rule that determined the passing or blockage of this traffic |
|
|
Description and Data Fields for the Traffic Log
Below the rows of logged events are the Description and Data fields. When you click an event row, the entire row is highlighted. A description of the event is displayed in the Description field.
32