ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual

WAN Status

C-5

Traffic Metering Logs

C-9

Unicast Logs

C-9

Invalid Packet Logging

C-10

Content Filtering and Security Logs

C-12

Web Filtering and Content Filtering Logs

C-12

Spam Logs

C-13

Traffic Logs

C-14

Virus Logs

C-14

E-mail Filter Logs

C-14

IPS Logs

C-15

Port Scan Logs

C-15

Instant Messaging/Peer-to-Peer Logs

C-15

Routing Logs

C-16

LAN to WAN Logs

C-16

LAN to DMZ Logs

C-16

DMZ to WAN Logs

C-16

WAN to LAN Logs

C-17

DMZ to LAN Logs

C-17

WAN to DMZ Logs

C-17

Appendix D

 

Two Factor Authentication

 

Why do I need Two-Factor Authentication?

D-1

What are the benefits of Two-Factor Authentication?

D-1

What is Two-Factor Authentication

D-2

NETGEAR Two-Factor Authentication Solutions

D-2

Appendix E

 

Related Documents

 

Index

xv

v1.0, September 2009

Page 15
Image 15
NETGEAR UTM25-100NAS, UTM10EW-100NAS, UTM25EW-100NAS manual Appendix D Two Factor Authentication