Creating UTM Policies
Use the Unified Threat Management (UTM) policy page to configure UTM policies. UTM consolidates several security features into one device to protect against multiple threat types. The UTM policy wizard provides step-by-step procedures to create a UTM policy. You can configure multiple profiles by launching the respective wizards from the UTM policy wizard.
Before You Begin
Read the UTM Overview topic.
Review the UTM Policy main page for an understanding of your current data set. See UTM Policies Main Page Fields for field descriptions.
Decide the filtering profile you want for the UTM policy: Web Filtering, Antispam, Antivirus, or Content Filtering.
Configuring UTM Policy Settings
To configure UTM policies:
- Select Configure > UTM Policy.
- Click the + icon to create a new UTM policy.
- Complete the configuration according to the guidelines provided in Table 1.
- Configure a filtering profile for your UTM policy:
Antispam— Examine transmitted e-mail messages to identify e-mail spam over SMTP. For more information, see Creating Antispam Profiles.
Antivirus—Inspect files transmitted over several protocols (HTTP, FTP upload and download, IMAP, SMTP, and POP3) to determine if the files exchanged are known malicious files, similar to how desktop antivirus software scans files for the same purpose. For more information, see Creating Antivirus Profiles.
Content filtering—Block or permit certain types of traffic over several protocols (HTTP, FTP upload and download, IMAP, SMTP, and POP3) based on the MIME type, file extension, protocol command, and embedded object type. For more information, see Creating Content Filtering Profiles.
Web Filtering-Manage Internet usage by preventing access to inappropriate Web content over HTTP. For more information, see Creating Web Filtering Profiles.
Device—Configure UTM global options for a device. The device profile refers to the antispam, antivirus, and Web filtering profiles. For more information, see Creating Device Profiles.
- Click Finish. A new UTM policy is created.
Table 1: UTM Policy Settings
Enter a unique name for the UTM policy that is a string of alphanumeric characters, colons, periods, dashes, and underscores. No spaces are allowed and the maximum length is 29 characters.
Enter a description for the UTM policy; maximum length is 255 characters.
Specify traffic options for the UTM policy.
In an attempt to consume all available resources, a malicious user might generate a large amount of traffic all at once. To prevent such activity from succeeding, you can impose traffic options: