HP T5700 HP Sygate Security Agent User Guide - Page 42

Name of, Parameter, Description, Block All, Normal, Source MAC

Page 42 highlights

HP Sygate Security Agent User Guide Table 8. Traffic Log Parameters and Description Name of Parameter Local Port/ICMP Code Description Port and ICMP code used on the Agent device (only appears in Local View - this is the default) Source Host Name of the source computer (only appears in Source View) Source MAC MAC address of the source computer (only appears in Source View) Source Port/ICMP Type Port and ICMP type on the source computer (only appears in Source View) Destination Host IP address of the destination computer (only appears in Source View) Destination MAC MAC address of the destination computer (only appears in Source View) Destination Port/ICMP Code Port and ICMP code used on the destination computer (only appears in Source View) Application Name Name of the application associated with the attack User Login name of the user Domain Domain of the user Security Security level for the Agent, set to either Block All or Normal. Location The Location (Office, Home, VPN, etc.) that was in effect at the time of the attack Occurrences Number of packets each piece of traffic sends between the beginning and ending time Begin Time Time traffic starts matching the rule End Time Time traffic stops matching the rule Rule Name The rule that determined the passing or blockage of this traffic Description and Data Fields for the Traffic Log Below the rows of logged events are the Description and Data fields. When you click an event row, the entire row is highlighted. A description of the event is displayed in the Description field. 32

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

HP Sygate Security Agent User Guide
Table 8.
Traffic Log Parameters and Description
Name of
Parameter
Description
Local
Port/ICMP
Code
Port and ICMP code used on the Agent device
(only appears in Local View
- this is the default)
Source Host
Name of the source computer
(only appears in Source View)
Source MAC
MAC address of the source computer
(only appears in Source View)
Source
Port/ICMP
Type
Port and ICMP type on the source computer
(only appears in Source View)
Destination
Host
IP address of the destination computer
(only appears in Source View)
Destination
MAC
MAC address of the destination computer
(only appears in Source View)
Destination
Port/ICMP
Code
Port and ICMP code used on the destination computer
(only appears in
Source View)
Application
Name
Name of the application associated with the attack
User
Login name of the user
Domain
Domain of the user
Security
Security level for the Agent, set to either
Block All
or
Normal
.
Location
The Location (Office, Home, VPN, etc.) that was in effect at the time of
the attack
Occurrences
Number of packets each piece of traffic sends between the beginning
and ending time
Begin Time
Time traffic starts matching the rule
End Time
Time traffic stops matching the rule
Rule Name
The rule that determined the passing or blockage of this traffic
Description and Data Fields for the Traffic Log
Below the rows of logged events are the
Description
and
Data
fields. When you click an
event row, the entire row is highlighted. A description of the event is displayed in the
Description
field.
32