ProSecure Unified Threat Management (UTM) Appliance

LAN-to-DMZ Logs

This section describes logs that are generated when the UTM processes LAN-to-DMZ traffic.

Table 188. Routing logs: LAN to DMZ

Message

Nov 29 09:44:06 [UTM] [kernel] LAN2DMZ[ACCEPT] IN=LAN OUT=DMZ SRC=

 

192.168.10.10 DST=192.168.20.10 PROTO=ICMP TYPE=8 CODE=0

 

 

 

Explanation

This packet from the LAN to the DMZ has been allowed by the firewall.

 

For other settings, see Table 161 on page 648.

 

 

Recommended Action

None.

 

 

 

DMZ-to-WAN Logs

This section describes logs that are generated when the UTM processes DMZ-to-WAN traffic.

Table 189. Routing logs: DMZ to WAN

Message

Nov 29 09:19:43 [UTM] [kernel] DMZ2WAN[DROP] IN=DMZ OUT=WAN SRC=

 

192.168.20.10 DST=72.14.207.99 PROTO=ICMP TYPE=8 CODE=0

 

 

 

Explanation

This packet from the DMZ to the WAN has been dropped by the firewall.

 

For other settings, see Table 161 on page 648.

 

 

Recommended Action

None.

 

 

 

WAN-to-LAN Logs

This section describes logs that are generated when the UTM processes WAN-to-LAN traffic.

Table 190. Routing logs: WAN to LAN

Message

Nov 29 10:05:15 [UTM] [kernel] WAN2LAN[ACCEPT] IN=WAN OUT=LAN SRC=

 

192.168.1.214 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0

 

 

 

Explanation

This packet from the LAN to the WAN has been allowed by the firewall.

 

For other settings, see Table 161 on page 648.

 

 

Recommended Action

None.

 

 

 

System Logs and Error Messages

664

Page 664
Image 664
NETGEAR UTM5EW-100NAS, STM150EW-100NAS manual LAN-to-DMZ Logs, DMZ-to-WAN Logs, WAN-to-LAN Logs, 664