UTM (Unified Threat Management)

Brief introduction

Unified threat management (Unified Threat Management), referred to UTM.

In September 2004, IDC first proposed the concept of "unified threat management", is about anti-virus, intrusion detection and firewall security devices placed under the unified threat management (Unified Threat Management) new category.

UTM is based on the development of the firewall up, with firewall, IPS, anti-virus, anti-spam and other integrated functions, the simultaneous turn feature will greatly reduce the number of processing performance UTM, and therefore mainly used for low performance requirements in end of the field. In the high-end applications, such as telecommunications, finance and other industries, still dedicated high-performance firewall, IPS mainstream.


Two deployment modes

At the network boundary, in addition to the firewall functionality can also be played IDS, IPS, VPN, traffic control, authentication, and application-layer protection. When deployed UTM, you can not deploy a firewall.

Routing mode

Logical isolation

Transparent mode

It acts as a security gateway or security products.



UTM set a variety of security functions in one, a simple one-click configuration management and ongoing security services, constitute a standard unified security platform. Integrated stateful inspection firewall, VPN, gateway antivirus, intrusion prevention (IPS), green line, anti-spam and other security functions, but also full support for policy management, IM / P2P management, quality of service (QoS), load balancing, high availability (HA) and bandwidth management functions. You can block unauthorized access, network intrusion, viruses, worms, Trojans, spyware, phishing, spam, and other types of security threats.

Guess you like

Origin www.cnblogs.com/CDZX/p/12559088.html