ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
xv
v1.0, September 2009
WAN Status ............................................................................................................. C-5
Traffic Metering Logs ............................................................................................... C-9
Unicast Logs ............ .... ... ... ... ..................................................................................C-9
Invalid Packet Logging ..................................................................... ... ... ... ... .... ... .. C-10
Content Filtering and Security Logs ............................................................................C-12
Web Filtering and Content Filtering Logs .............................................................. C-12
Spam Logs ...................................................................... ......................................C-13
Traffic Logs ............................................................................................................ C-14
Virus Logs .......................................... ...................................................................C-14
E-mail Filter Logs ................................... ...............................................................C-14
IPS Logs ................................................................................................................ C-15
Port Scan Logs ...................................................................................................... C-15
Instant Messaging/Peer-to-Peer Logs ................................................................... C-15
Routing Logs ...............................................................................................................C-16
LAN to WAN Logs ........................................................... ......................................C-16
LAN to DMZ Logs .................................................................................................. C-16
DMZ to WAN Logs ................................. ...............................................................C-16
WAN to LAN Logs ........................................................... ......................................C-17
DMZ to LAN Logs .................................................................................................. C-17
WAN to DMZ Logs .................................... ............................................................C-17
Appendix D
Two Factor Authentication
Why do I need Two-Factor Authentication? ................................................................... D-1
What are the benefits of Two-Factor Authentication? .............................................D-1
What is Two-Factor Authentication ......................................................................... D-2
NETGEAR Two-Factor Authentication Solutions ........................................................... D-2
Appendix E
Related Documents
Index