HP VPN Firewall Appliances Attack Protection Configuration Guide
159
Figure 136 Protocol audit policies
Protocol audit policies that have been referenced cannot be deleted. The delete icon ( ) is not
provided for such protocol audit policies.
2. At the top of the page, set whether to send protocol audit logs to the specified remote log hosts.
If you select the Send logs to remote log hosts option, you need to navigate to page Log Report >
Syslog to specify the remote log host addresses.
3. Click Apply.
Creating a protocol audit policy
1. Select Advanced Security Prevention > Protocol Audit from the navigation tree.
The Protocol Audit Policies tab is displayed, as shown in Figure 136.
2. Click Add to enter the protocol au
dit policy configuration page.
Figure 137 Adding a protocol audit policy
3. Configure the protocol audit policy as described in Table 40.
4. Click Apply.
Table 40 Configuration items
Item Descri
p
tion
Name Enter a name for the protocol audit policy.
Protocol Type Select the protocols to be audited, including HTTP, FTP, SMTP, and POP3.
Applying a protocol audit policy
1. Select Advanced Security Prevention > Protocol Audit from the navigation tree.