NETGEAR UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included Reference Manual page 15

Prosecure unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
WAN Status ............................................................................................................. C-5
Traffic Metering Logs ............................................................................................... C-9
Unicast Logs ........................................................................................................... C-9
Invalid Packet Logging .......................................................................................... C-10
Content Filtering and Security Logs ............................................................................ C-12
Web Filtering and Content Filtering Logs .............................................................. C-12
Spam Logs ............................................................................................................ C-13
Traffic Logs ............................................................................................................ C-14
Virus Logs ............................................................................................................. C-14
E-mail Filter Logs .................................................................................................. C-14
IPS Logs ................................................................................................................ C-15
Port Scan Logs ...................................................................................................... C-15
Instant Messaging/Peer-to-Peer Logs ................................................................... C-15
Routing Logs ............................................................................................................... C-16
LAN to WAN Logs ................................................................................................. C-16
LAN to DMZ Logs .................................................................................................. C-16
DMZ to WAN Logs ................................................................................................ C-16
WAN to LAN Logs ................................................................................................. C-17
DMZ to LAN Logs .................................................................................................. C-17
WAN to DMZ Logs ................................................................................................ C-17
Appendix D
Why do I need Two-Factor Authentication? ................................................................... D-1
What are the benefits of Two-Factor Authentication? ............................................. D-1
What is Two-Factor Authentication ......................................................................... D-2
NETGEAR Two-Factor Authentication Solutions ........................................................... D-2
xv

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure utm10Prosecure utm25

Table of Contents