HP Compaq t5720 Thin Client User Manual
Page 4

HP Sygate Security Agent User Guide
All Protocols .................................................................................................................22
TCP ...............................................................................................................................22
UDP ...............................................................................................................................22
ICMP..............................................................................................................................23
IP Type ..........................................................................................................................23
Display selected applications only...................................................................................25
Applications........................................................................................................................25
Select All..............................................................................................................................25
Clear All...............................................................................................................................25
Browse.................................................................................................................................26
Rule Summary field ...........................................................................................................26
Types of Logs ..........................................................................................................................27
Viewing Logs ...........................................................................................................................28
Security Log .............................................................................................................................28
Icons for the Security Log ..........................................................................................28
Security Log Parameters and Description ................................................................29
Description and Data Fields for the Security Log...................................................30
Icons for the Traffic Log ............................................................................................31
Traffic Log Parameters and Description ..................................................................31
Description and Data Fields for the Traffic Log.....................................................32
Icons for the Packet Log.............................................................................................33
Packet Log Parameters and Description...................................................................33
Packet Decode and Packet Dump for the Packet Log...........................................34
iv