HP Sygate Security Agent User Guide
Rule Summary field
...........................................................................................................
20
Hosts Tab
.................................................................................................................................
20
All addresses
.......................................................................................................................
21
MAC addresses
...................................................................................................................
21
IP Address(es)
....................................................................................................................
21
Subnet
..................................................................................................................................
21
Rule Summary field
...........................................................................................................
21
Ports and Protocols Tab
........................................................................................................
21
Protocol
...............................................................................................................................
22
All Protocols
.................................................................................................................
22
TCP
...............................................................................................................................
22
UDP
...............................................................................................................................
22
ICMP
..............................................................................................................................
23
IP Type
..........................................................................................................................
23
Traffic Direction
................................................................................................................
23
Rule Summary field
...........................................................................................................
23
Scheduling Tab
........................................................................................................................
23
Enable Scheduling
.............................................................................................................
24
During the period below
.............................................................................................
24
Excluding the period below
........................................................................................
24
Beginning At
.......................................................................................................................
24
Duration
..............................................................................................................................
24
Rule Summary field
...........................................................................................................
24
Applications Tab
.....................................................................................................................
25
Display selected applications only
...................................................................................
25
Applications
........................................................................................................................
25
Select All
..............................................................................................................................
25
Clear All
...............................................................................................................................
25
Browse
.................................................................................................................................
26
Rule Summary field
...........................................................................................................
26
Chapter 5. Monitoring and Logging
.......................................................................
27
Types of Logs
..........................................................................................................................
27
Viewing Logs
...........................................................................................................................
28
Security Log
.............................................................................................................................
28
Icons for the Security Log
..........................................................................................
28
Security Log Parameters and Description
................................................................
29
Description and Data Fields for the Security Log
...................................................
30
Traffic Log
...............................................................................................................................
30
Icons for the Traffic Log
............................................................................................
31
Traffic Log Parameters and Description
..................................................................
31
Description and Data Fields for the Traffic Log
.....................................................
32
Packet Log
................................................................................................................................
33
Icons for the Packet Log
.............................................................................................
33
Packet Log Parameters and Description
...................................................................
33
Packet Decode and Packet Dump for the Packet Log
...........................................
34
System Log
...............................................................................................................................
34
Icons for the System Log
............................................................................................
34
iv