ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Using Online Support .................................................................................................12-10
Appendix A
Appendix B
Inbound Traffic ............................................................................................................... B-7
VPN Gateway-to-Gateway .................................................................................... B-13
Appendix C
System Log Messages .................................................................................................. C-2
System Startup ........................................................................................................ C-2
Reboot ..................................................................................................................... C-2
Service Logs ........................................................................................................... C-3
NTP ......................................................................................................................... C-3
Login/Logout ........................................................................................................... C-4
Firewall Restart ....................................................................................................... C-4
IPsec Restart ........................................................................................................... C-4
xiv
v1.0, September 2009