10
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308
DMZ to LAN Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .436
WAN to DMZ Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Other Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Session Limit Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Source MAC Filter Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Bandwidth Limit Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
DHCP Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Appendix D Two-Factor Authentication
Why Do I Need Two-Factor Authentication? . . . . . . . . . . . . . . . . . . . . . . 439
What Are the Benefits of Two-Factor Authentication? . . . . . . . . . . . . .439
What Is Two-Factor Authentication? . . . . . . . . . . . . . . . . . . . . . . . . . . 440
NETGEAR Two-Factor Authentication Solutions. . . . . . . . . . . . . . . . . . .440
Appendix E Notification of Compliance (Wired)
Index