![](http://pdfasset.owneriq.net/b/19/b19c7ccf-155c-4b11-af15-1dc246433e4f/b19c7ccf-155c-4b11-af15-1dc246433e4f-bga.png)
10
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308
DMZ to LAN Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
WAN to DMZ Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Other Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Session Limit Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Source MAC Filter Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Bandwidth Limit Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
DHCP Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Appendix D Two-Factor Authentication
Why Do I Need Two-Factor Authentication? . . . . . . . . . . . . . . . . . . . . . . 439
What Are the Benefits of Two-Factor Authentication?
. . . . . . . . . . . . . 439
What Is Two-Factor Authentic
ation? . . . . . . . . . . . . . . . . . . . . . . . . . . 440
NETGEAR Two-Factor Authentication Solutions . . . . . . . . . . . . . . . . . . . 440
Appendix E Notification of Compliance (Wired)
Index