Creating UTM Policies
Use the Unified Threat Management (UTM) policy page to configure
UTM policies. UTM consolidates several security features into one
device to protect against multiple threat types. The UTM policy wizard
provides step-by-step procedures to create a UTM policy. You can configure
multiple profiles by launching the respective wizards from the UTM
policy wizard.
Before You Begin
- Read the UTM Overview topic.
- Review the UTM Policy main page for an understanding of
your current data set. See UTM Policies Main Page Fields for field descriptions.
- Decide the filtering profile you want for the UTM policy:
Web Filtering, Antispam, Antivirus, or Content Filtering.
Configuring UTM Policy Settings
Procedure
To configure UTM policies:
- Select Configure > UTM Policy.
- Click the + icon to create a new UTM policy.
- Complete the configuration according to the guidelines
provided in Table 154.
- Configure a filtering profile for your UTM policy:
- Antispam— Examine transmitted e-mail messages to
identify e-mail spam over SMTP. For more information, see Creating Antispam Profiles.
- Antivirus—Inspect files transmitted over several
protocols (HTTP, FTP upload and download, IMAP, SMTP, and POP3) to
determine if the files exchanged are known malicious files, similar
to how desktop antivirus software scans files for the same purpose.
For more information, see Creating Antivirus Profiles.
- Content filtering—Block or permit certain types
of traffic over several protocols (HTTP, FTP upload and download,
IMAP, SMTP, and POP3) based on the MIME type, file extension, protocol
command, and embedded object type. For more information, see Creating Content Filtering Profiles.
- Web Filtering-Manage Internet usage by preventing access
to inappropriate Web content over HTTP. For more information, see Creating Web Filtering Profiles.
- Device—Configure UTM global options for a device.
The device profile refers to the antispam, antivirus, and Web filtering
profiles. For more information, see Creating Device Profiles.
- Click Finish. A new UTM policy is created.
Table 154: UTM Policy Settings
Setting | Guideline |
---|
Name | Enter a unique name for the UTM policy that is a string
of alphanumeric characters, colons, periods, dashes, and underscores.
No spaces are allowed and the maximum length is 29 characters. |
Description | Enter a description for the UTM policy; maximum length
is 255 characters. |
Traffic Options | Specify traffic options for the UTM policy. In an attempt to consume all available resources, a malicious
user might generate a large amount of traffic all at once. To prevent
such activity from succeeding, you can impose traffic options: - Connection limit per client—Specify the connection
limit per client; default is 2000.
- Action when connection limit is reached—Specify
the action that must be taken once the connection limit is reached.
The available actions are None, Log and Permit, and Block.
|
Related Documentation
Help us to improve. Rate this article.
Feedback Received. Thank You!