![NETGEAR ProSecure Скачать руководство пользователя страница 15](http://html1.mh-extra.com/html/netgear/prosecure/prosecure_appliance-reference-manual_1672217015.webp)
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
xv
v1.0, January 2010
Firewall Restart ....................................................................................................... C-4
IPsec Restart ........................................................................................................... C-4
WAN Status ............................................................................................................. C-5
Traffic Metering Logs ............................................................................................... C-9
Unicast Logs ........................................................................................................... C-9
Invalid Packet Logging .......................................................................................... C-10
Content Filtering and Security Logs ............................................................................ C-12
Web Filtering and Content Filtering Logs .............................................................. C-12
Spam Logs ............................................................................................................ C-13
Traffic Logs ............................................................................................................ C-14
Virus Logs ............................................................................................................. C-14
E-mail Filter Logs .................................................................................................. C-14
IPS Logs ................................................................................................................ C-15
Port Scan Logs ...................................................................................................... C-15
Instant Messaging/Peer-to-Peer Logs ................................................................... C-15
Routing Logs ............................................................................................................... C-16
LAN to WAN Logs ................................................................................................. C-16
LAN to DMZ Logs .................................................................................................. C-16
DMZ to WAN Logs ................................................................................................ C-16
WAN to LAN Logs ................................................................................................. C-17
DMZ to LAN Logs .................................................................................................. C-17
WAN to DMZ Logs ................................................................................................ C-17
Appendix D
Two Factor Authentication
Why do I need Two-Factor Authentication? ................................................................... D-1
What are the benefits of Two-Factor Authentication? ............................................. D-1
What is Two-Factor Authentication ......................................................................... D-2
NETGEAR Two-Factor Authentication Solutions ........................................................... D-2
Appendix E
Related Documents
Index
Содержание ProSecure
Страница 6: ...v1 0 January 2010 vi ...
Страница 16: ...ProSecure Unified Threat Management UTM Appliance Reference Manual xvi v1 0 January 2010 ...
Страница 34: ...ProSecure Unified Threat Management UTM Appliance Reference Manual 1 16 Introduction v1 0 January 2010 ...
Страница 114: ...ProSecure Unified Threat Management UTM Appliance Reference Manual 4 28 LAN Configuration v1 0 January 2010 ...
Страница 468: ...ProSecure Unified Threat Management UTM Appliance Reference Manual E 2 Related Documents v1 0 January 2010 ...