HP Sygate Security Agent User Guide
Rule Summary field ........................................................................................................... 20
Hosts Tab ................................................................................................................................. 20
All addresses ....................................................................................................................... 21
MAC addresses................................................................................................................... 21
IP Address(es) .................................................................................................................... 21
Subnet.................................................................................................................................. 21
Rule Summary field ........................................................................................................... 21
Ports and Protocols Tab ........................................................................................................ 21
Protocol...............................................................................................................................22
All Protocols ................................................................................................................. 22
TCP ............................................................................................................................... 22
UDP ...............................................................................................................................22
ICMP.............................................................................................................................. 23
IP Type .......................................................................................................................... 23
Traffic Direction ................................................................................................................ 23
Rule Summary field ........................................................................................................... 23
Scheduling Tab ........................................................................................................................ 23
Enable Scheduling ............................................................................................................. 24
During the period below ............................................................................................. 24
Beginning At....................................................................................................................... 24
Duration .............................................................................................................................. 24
Rule Summary field ........................................................................................................... 24
Applications Tab ..................................................................................................................... 25
Applications........................................................................................................................ 25
Select All.............................................................................................................................. 25
Clear All...............................................................................................................................25
Browse................................................................................................................................. 26
Rule Summary field ........................................................................................................... 26
Types of Logs .......................................................................................................................... 27
Viewing Logs ........................................................................................................................... 28
Security Log ............................................................................................................................. 28
Traffic Log ...............................................................................................................................30
Packet Log................................................................................................................................ 33
Icons for the Packet Log............................................................................................. 33
System Log ...............................................................................................................................34
Icons for the System Log ............................................................................................ 34
iv