Creating UTM Policies

Use the Unified Threat Management (UTM) policy page to configure UTM policies. UTM consolidates several security features into one device to protect against multiple threat types. The UTM policy wizard provides step-by-step procedures to create a UTM policy. You can configure multiple profiles by launching the respective wizards from the UTM policy wizard.

Before You Begin

Procedure

To configure UTM policies:

  1. Select Configure > UTM Policy.
  2. Click the + icon to create a new UTM policy.
  3. Complete the configuration according to the guidelines provided in Table 227.
  4. Configure a filtering profile for your UTM policy:
  5. Click Finish. A new UTM policy is created.

Table 227: UTM Policy Settings

 

Setting

Guideline

Name

Enter a unique name for the UTM policy that is a string of alphanumeric characters, colons, periods, dashes, and underscores. No spaces are allowed and the maximum length is 29 characters.

Description

Enter a description for the UTM policy; maximum length is 255 characters.

Traffic Options

Specify traffic options for the UTM policy.

In an attempt to consume all available resources, a malicious user might generate a large amount of traffic all at once. To prevent such activity from succeeding, you can impose traffic options:

  • Connection limit per client—Specify the connection limit per client; default is 2000.

  • Action when connection limit is reached—Specify the action that must be taken once the connection limit is reached. The available actions are None, Log and Permit, and Block.