Quick Reference Guide
ProSafe VPN Firewall 200 FVX538 Reference Manual
xii Contents
v1.0, January 2010
Appendix C
System Logs and Error Messages
System Log Messages .................................................................................................. C-1
System Startup ........................................................................................................ C-1
Reboot ..................................................................................................................... C-2
NTP ......................................................................................................................... C-2
Login/Logout ........................................................................................................... C-3
Firewall Restart ....................................................................................................... C-3
IPSec Restart .......................................................................................................... C-4
WAN Status ............................................................................................................. C-4
Web Filtering and Content Filtering Logs ................................................................ C-7
Traffic Metering Logs ............................................................................................... C-9
Unicast Logs ........................................................................................................... C-9
FTP Logging .......................................................................................................... C-10
Invalid Packet Logging .......................................................................................... C-10
Routing Logs ............................................................................................................... C-13
LAN to WAN Logs ................................................................................................. C-14
LAN to DMZ Logs .................................................................................................. C-14
DMZ to WAN Logs ................................................................................................ C-14
WAN to LAN Logs ................................................................................................. C-14
DMZ to LAN Logs .................................................................................................. C-15
WAN to DMZ Logs ................................................................................................ C-15
Appendix D
Two Factor Authentication
Why do I need Two-Factor Authentication? ................................................................... D-1
What are the benefits of Two-Factor Authentication? ............................................. D-1
What is Two-Factor Authentication ......................................................................... D-2
NETGEAR Two-Factor Authentication Solutions ........................................................... D-2
Appendix E
Related Documents
Index