HP Sygate Security Agent User Guide
Rule Summary field ...........................................................................................................20
Hosts Tab.................................................................................................................................20
All addresses .......................................................................................................................21
MAC addresses...................................................................................................................21
IP Address(es) ....................................................................................................................21
Subnet..................................................................................................................................21
Rule Summary field ...........................................................................................................21
Ports and Protocols Tab ........................................................................................................21
Protocol...............................................................................................................................22
All Protocols .................................................................................................................22
TCP ...............................................................................................................................22
UDP ...............................................................................................................................22
ICMP..............................................................................................................................23
IP Type ..........................................................................................................................23
Traffic Direction................................................................................................................23
Rule Summary field ...........................................................................................................23
Scheduling Tab ........................................................................................................................23
Enable Scheduling .............................................................................................................24
During the period below .............................................................................................24
Excluding the period below........................................................................................24
Beginning At.......................................................................................................................24
Duration..............................................................................................................................24
Rule Summary field ...........................................................................................................24
Applications Tab .....................................................................................................................25
Display selected applications only...................................................................................25
Applications........................................................................................................................25
Select All..............................................................................................................................25
Clear All...............................................................................................................................25
Browse.................................................................................................................................26
Rule Summary field ...........................................................................................................26
Chapter 5. Monitoring and Logging....................................................................... 27
Types of Logs ..........................................................................................................................27
Viewing Logs ...........................................................................................................................28
Security Log .............................................................................................................................28
Icons for the Security Log ..........................................................................................28
Security Log Parameters and Description ................................................................29
Description and Data Fields for the Security Log...................................................30
Traffic Log ...............................................................................................................................30
Icons for the Traffic Log ............................................................................................31
Traffic Log Parameters and Description ..................................................................31
Description and Data Fields for the Traffic Log.....................................................32
Packet Log................................................................................................................................33
Icons for the Packet Log.............................................................................................33
Packet Log Parameters and Description...................................................................33
Packet Decode and Packet Dump for the Packet Log...........................................34
System Log...............................................................................................................................34
Icons for the System Log............................................................................................34
iv