Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Creating UTM Policies

 

Use the Unified Threat Management (UTM) policy page to configure UTM policies. UTM consolidates several security features into one device to protect against multiple threat types. The UTM policy wizard provides step-by-step procedures to create a UTM policy. You can configure multiple profiles by launching the respective wizards from the UTM policy wizard.

Before You Begin

  • Read the UTM Overview topic.

  • Review the UTM Policy main page for an understanding of your current data set. See UTM Policies Main Page Fields for field descriptions.

  • Decide the filtering profile you want for the UTM policy: Web Filtering, Antispam, Antivirus, or Content Filtering.

To configure UTM policies:

  1. Select Configure > UTM Policy.
  2. Click the + icon to create a new UTM policy.
  3. Complete the configuration according to the guidelines provided in Table 1.
  4. Configure a filtering profile for your UTM policy:
    • Antispam— Examine transmitted e-mail messages to identify e-mail spam over SMTP. For more information, see Creating Antispam Profiles.

    • Antivirus—Inspect files transmitted over several protocols (HTTP, FTP upload and download, IMAP, SMTP, and POP3) to determine if the files exchanged are known malicious files, similar to how desktop antivirus software scans files for the same purpose. For more information, see Creating Antivirus Profiles.

    • Content filtering—Block or permit certain types of traffic over several protocols (HTTP, FTP upload and download, IMAP, SMTP, and POP3) based on the MIME type, file extension, protocol command, and embedded object type. For more information, see Creating Content Filtering Profiles.

    • Web Filtering-Manage Internet usage by preventing access to inappropriate Web content over HTTP. For more information, see Creating Web Filtering Profiles.

    • Device—Configure UTM global options for a device. The device profile refers to the antispam, antivirus, and Web filtering profiles. For more information, see Creating Device Profiles.

  5. Click Finish. A new UTM policy is created.

Table 1: UTM Policy Settings

Setting

Guideline

Name

Enter a unique name for the UTM policy that is a string of alphanumeric characters, colons, periods, dashes, and underscores. No spaces are allowed and the maximum length is 29 characters.

Description

Enter a description for the UTM policy; maximum length is 255 characters.

Traffic Options

Specify traffic options for the UTM policy.

In an attempt to consume all available resources, a malicious user might generate a large amount of traffic all at once. To prevent such activity from succeeding, you can impose traffic options:

  • Connection limit per client—Specify the connection limit per client; default is 2000.

  • Action when connection limit is reached—Specify the action that must be taken once the connection limit is reached. The available actions are None, Log and Permit, and Block.

Related Documentation