To access this page, select Configuration > Unified Threat Mgmt > UTM Profiles in Customer Portal.
Use this page to view and manage unified threat management (UTM) profiles. UTM profiles enable you to consolidate several security features into one system to protect against multiple threat types.
You can perform the following tasks from this page:
Table 83 describes the fields on the UTM Profiles page.
Table 83: UTM Profiles Page Fields
Field | Description |
|---|---|
Name | Name of the UTM profile. |
Antispam | Information about the antispam profile associated with the UTM profile. |
Antivirus | Information about the antivirus profiles associated with the UTM profile. |
Content Filtering | Information about the content filtering profiles associated with the UTM profile. |
Web Filtering | Information about the Web filtering profile associated with the UTM profile. |
Description | Description of the UTM profile. |
Table 84: UTM Profile Details Page Fields
Field | Description |
|---|---|
General Information | |
Name | Name of the UTM profile. |
Description | Description of the UTM profile. |
Traffic Options- | |
Action When Connection Limit Is Reached | Action to be taken when the configured connection limit per client is reached. |
Web Filtering Profile | |
HTTP | Web filtering profile to be used for HTTP traffic. |
Antivirus Profile | |
HTTP | Antivirus profile to be used for HTTP traffic. |
FTP Upload | Antivirus profile to be used for FTP upload traffic. |
FTP Download | Antivirus profile to be used for FTP download traffic. |
IMAP | Antivirus profile to be used for IMAP traffic. |
SMTP | Antivirus profile to be used for SMTP traffic. |
POP3 | Antivirus profile to be used for POP3 traffic. |
Antispam Profile | |
SMTP | Antispam profile to be used for SMTP traffic. |
© 2018 Juniper Networks, Inc. All rights reserved