Disclaimer: This information is posted as-is and the content should be referenced at your own risk
When UTM is added to a network with an existing firewall, it can be configured in several ways. Each option has an impact on the available defenses and on the complexity of implementation.
Changing from any one of these configurations to an alternative is likely to be difficult. Given that the goal should be to enable all protection features, it is recommended to start with one of the last two options.