UTM Overview
Unified threat management (UTM) is a term used to describe
the consolidation of several security features to protect against
multiple threat types. The advantage of UTM is a streamlined installation
and management of multiple security capabilities.
The following security features are provided as part of the
UTM solution:
- Antispam—This feature examines transmitted messages
to identify e-mail spam. E-mail spam consists of unwanted messages
usually sent by commercial, malicious, or fraudulent entities. When
the device detects an e-mail message deemed to be spam, it either
drops the message or tags the message header or subject field with
a preprogrammed string. The antispam feature uses a constantly updated
Spamhaus Block List (SBL). Sophos updates and maintains the IP-based
SBL.
- Full file-based antivirus—A virus is an executable
code that infects or attaches itself to other executable code to reproduce
itself. Some malicious viruses erase files or lock up systems. Other
viruses merely infect files and overwhelm the target host or network
with bogus data. The full file-based antivirus feature provides file-based
scanning on specific application layer traffic, checking for viruses against a virus signature database.
The antivirus feature collects the received data packets until it
has reconstructed the original application content, such as an e-mail
file attachment, and then scans this content.
- Express antivirus—Express antivirus scanning is
offered as a less CPU-intensive alternative to the full file-based
antivirus feature. The express antivirus feature is similar to the
antivirus feature in that it scans specific application layer traffic
for viruses against a virus signature database. However, unlike full
antivirus, express antivirus does not reconstruct the original application
content. Rather, it just sends (streams) the received data packets,
as is, to the scan engine. With express antivirus, the virus scanning
is executed by a hardware pattern-matching engine. This improves performance
while scanning is occurring, but the level of security provided is
lessened. Juniper Networks provides the scan engine.
- Content filtering—Content filtering blocks or permits
certain types of traffic based on the MIME type, file extension, protocol
command, and embedded object type.
- Web filtering—Web filtering enables you to manage
Internet usage by preventing access to inappropriate Web content.
The following types of Web filtering solutions are available:
- Integrated Web filtering—Blocks or permits Web access
after the device identifies the category for a URL either from user-defined
categories or from a category server (Websense provides the SurfControl
Content Portal Authority (CPA) server).
- Redirect Web filtering—Intercepts HTTP requests
and forwards the server URL to an external URL filtering server to
determine whether to block or permit the requested Web access. Websense
provides the URL filtering server.
UTM Licensing
All UTM components require licenses with the exception of content
filtering with custom URLs only. This is because Juniper Networks
leverages third-party technology that is constantly updated to provide
the most up-to-date inspection capabilities.
UTM Components
UTM components include custom objects, feature profiles, and
UTM profiles that can be configured on SRX Series devices. From a
high level, feature profiles specify how a feature is configured and
then applied to UTM profiles, which in turn is applied to firewall
policies, as shown in Figure 2.
UTM profiles do not have their own seven-tuple rulebase; in
a sense they inherit the rules from the firewall rule. The strength
of the UTM feature comes from URL filtering, where you can have a
separate configuration for different users or user groups.
- Custom objects—Although SRX Series devices support
predefined feature profiles that can handle most typical use cases,
there are some cases where you might need to define your own objects,
specifically for URL filtering, antivirus filtering, and content filtering.
- Feature profiles—Feature profiles specify how components
of each profile should function. You can configure multiple feature
profiles that can be applied through different UTM profiles to firewall
rules.
- UTM profiles—UTM profiles function as a logical
container for individual feature profiles. UTM profiles are then applied
to specific traffic flows based on the classification of rules in
the firewall policy, thereby enabling you to define separate UTM profiles
per firewall rule to differentiate the enforcement per firewall rule.
Essentially, the firewall rulebase acts as the match criteria, and
the UTM profile is the action to be applied.
- Firewall policy—You can predefine feature profiles
for the UTM profile that are then applied to the firewall rules. This
gives you the advantage of using the predefined UTM profile for that
one UTM technology (for example, antivirus or URL filtering), not
both.
Related Documentation
Help us to improve. Rate this article.
Feedback Received. Thank You!