Netgear UTM9S – ProSECURE Unified Threat Management (UTM) Appliance with DSL and Wireless modules 参照マニュアル
![Netgear](https://files.manualsbrain.com/attachments/cf1ad5de25a3f8d6c88ef0ab489c1b137eebe11f/common/fit/150/50/17742d1e0cdacf24edeb88c30757620088415c5f7699f69b4517262e21e0/brand_logo.jpeg)
System Logs and Error Messages
598
ProSecure Unified Threat Management (UTM) Appliance
WAN-to-LAN Logs
This section describes logs that are generated when the UTM processes WAN-to-LAN traffic.
DMZ-to-LAN Logs
This section describes logs that are generated when the UTM processes DMZ-to-LAN traffic.
WAN-to-DMZ Logs
This section describes logs that are generated when the UTM processes WAN-to-DMZ
traffic.
traffic.
Table 178. Routing logs: WAN to LAN
Message
Nov 29 10:05:15 [UTM] [kernel] WAN2LAN[ACCEPT] IN=WAN OUT=LAN SRC=
192.168.1.214 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0
192.168.1.214 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0
Explanation
• This packet from the LAN to the WAN has been allowed by the firewall.
• For other settings, see
Recommended Action
None.
Table 179. Routing logs: DMZ to WAN
Message
Nov 29 09:44:06 [UTM] [kernel] DMZ2LAN[DROP] IN=DMZ OUT=LAN SRC=
192.168.20.10 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0
192.168.20.10 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0
Explanation
• This packet from the DMZ to the LAN has been dropped by the firewall.
• For other settings, see
Recommended Action
None.
Table 180. Routing logs: WAN to DMZ
Message
Nov 29 09:19:43 [UTM] [kernel] WAN2DMZ[ACCEPT] IN=WAN OUT=DMZ SRC=
192.168.1.214 DST=192.168.20.10 PROTO=ICMP TYPE=8 CODE=0
192.168.1.214 DST=192.168.20.10 PROTO=ICMP TYPE=8 CODE=0
Explanation
• This packet from the WAN to the DMZ has been allowed by the firewall.
• For other settings, see
Recommended Action
None.