HP VPN Firewall Appliances Attack Protection Configuration Guide

178
Figure 160 Applying the protocol audit policy