What is a UTM System?
Generally, a system is called a UTM (Unified Threat Management) system respectively only qualifies for a UTM system if it features a combination of the following: • Internet-Gateway • Firewall e.g. OSI (Open Systems Interconnection) Layer 2-7 • VPN (Virtual Private Network) Gateway • Virus Protection • IPS (Intrusion Prevention System) • IDS (Intrusion Detection System) • Content filtering for Email, HTTP, etc. • Spam Protection • Surf Protection e.g. protect minors from porn • Authentication • QoS (Quality of Service) e.g. traffic shaping or preferring VoIP (Voice over IP) traffic over ftp • Reporting i.e. providing logged information Next to the above things which are considered core functionality of any UTM system, a UTM system might contain other useful functionality like • Mail System • Instant messaging as well as MUC (Multi User Chat) services e.g. Jabberd or ejabberd • VPN Gateway e.g. OpenVPN • Domain Name Service e.g. BIND (Berkeley Internet Name Domain) service • File Server