ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
xv
v1.0, September 2009
WAN Status
.............................................................................................................
C-5
Traffic Metering Logs
...............................................................................................
C-9
Unicast Logs
...........................................................................................................
C-9
Invalid Packet Logging
..........................................................................................
C-10
Content Filtering and Security Logs
............................................................................
C-12
Web Filtering and Content Filtering Logs
..............................................................
C-12
Spam Logs
............................................................................................................
C-13
Traffic Logs
............................................................................................................
C-14
Virus Logs
.............................................................................................................
C-14
E-mail Filter Logs
..................................................................................................
C-14
IPS Logs
................................................................................................................
C-15
Port Scan Logs
......................................................................................................
C-15
Instant Messaging/Peer-to-Peer Logs
...................................................................
C-15
Routing Logs
...............................................................................................................
C-16
LAN to WAN Logs
.................................................................................................
C-16
LAN to DMZ Logs
..................................................................................................
C-16
DMZ to WAN Logs
................................................................................................
C-16
WAN to LAN Logs
.................................................................................................
C-17
DMZ to LAN Logs
..................................................................................................
C-17
WAN to DMZ Logs
................................................................................................
C-17
Appendix D
Two Factor Authentication
Why do I need Two-Factor Authentication?
...................................................................
D-1
What are the benefits of Two-Factor Authentication?
.............................................
D-1
What is Two-Factor Authentication
.........................................................................
D-2
NETGEAR Two-Factor Authentication Solutions
...........................................................
D-2
Appendix E
Related Documents
Index