HP T5700 HP Sygate Security Agent User Guide - Page 4

Packet Decode and Packet Dump for the Packet Log, Description and Data Fields for the Traffic Log

Page 4 highlights

HP Sygate Security Agent User Guide Rule Summary field ...20 Hosts Tab ...20 All addresses ...21 MAC addresses...21 IP Address(es) ...21 Subnet...21 Rule Summary field ...21 Ports and Protocols Tab ...21 Protocol...22 All Protocols ...22 TCP ...22 UDP ...22 ICMP...23 IP Type ...23 Traffic Direction ...23 Rule Summary field ...23 Scheduling Tab ...23 Enable Scheduling ...24 During the period below 24 Excluding the period below 24 Beginning At...24 Duration ...24 Rule Summary field ...24 Applications Tab ...25 Display selected applications only 25 Applications...25 Select All...25 Clear All...25 Browse...26 Rule Summary field ...26 Chapter 5. Monitoring and Logging 27 Types of Logs ...27 Viewing Logs ...28 Security Log ...28 Icons for the Security Log 28 Security Log Parameters and Description 29 Description and Data Fields for the Security Log 30 Traffic Log ...30 Icons for the Traffic Log 31 Traffic Log Parameters and Description 31 Description and Data Fields for the Traffic Log 32 Packet Log...33 Icons for the Packet Log 33 Packet Log Parameters and Description 33 Packet Decode and Packet Dump for the Packet Log 34 System Log ...34 Icons for the System Log 34 iv

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

HP Sygate Security Agent User Guide
Rule Summary field
...........................................................................................................
20
Hosts Tab
.................................................................................................................................
20
All addresses
.......................................................................................................................
21
MAC addresses
...................................................................................................................
21
IP Address(es)
....................................................................................................................
21
Subnet
..................................................................................................................................
21
Rule Summary field
...........................................................................................................
21
Ports and Protocols Tab
........................................................................................................
21
Protocol
...............................................................................................................................
22
All Protocols
.................................................................................................................
22
TCP
...............................................................................................................................
22
UDP
...............................................................................................................................
22
ICMP
..............................................................................................................................
23
IP Type
..........................................................................................................................
23
Traffic Direction
................................................................................................................
23
Rule Summary field
...........................................................................................................
23
Scheduling Tab
........................................................................................................................
23
Enable Scheduling
.............................................................................................................
24
During the period below
.............................................................................................
24
Excluding the period below
........................................................................................
24
Beginning At
.......................................................................................................................
24
Duration
..............................................................................................................................
24
Rule Summary field
...........................................................................................................
24
Applications Tab
.....................................................................................................................
25
Display selected applications only
...................................................................................
25
Applications
........................................................................................................................
25
Select All
..............................................................................................................................
25
Clear All
...............................................................................................................................
25
Browse
.................................................................................................................................
26
Rule Summary field
...........................................................................................................
26
Chapter 5. Monitoring and Logging
.......................................................................
27
Types of Logs
..........................................................................................................................
27
Viewing Logs
...........................................................................................................................
28
Security Log
.............................................................................................................................
28
Icons for the Security Log
..........................................................................................
28
Security Log Parameters and Description
................................................................
29
Description and Data Fields for the Security Log
...................................................
30
Traffic Log
...............................................................................................................................
30
Icons for the Traffic Log
............................................................................................
31
Traffic Log Parameters and Description
..................................................................
31
Description and Data Fields for the Traffic Log
.....................................................
32
Packet Log
................................................................................................................................
33
Icons for the Packet Log
.............................................................................................
33
Packet Log Parameters and Description
...................................................................
33
Packet Decode and Packet Dump for the Packet Log
...........................................
34
System Log
...............................................................................................................................
34
Icons for the System Log
............................................................................................
34
iv