To access this page, select Configuration > Unified Threat Mgmt > UTM Profiles in Customer Portal.
Use this page to view and manage unified threat management (UTM) profiles. UTM profiles enable you to consolidate several security features into one system to protect against multiple threat types.
You can perform the following tasks from this page:
Create a UTM profile—See Creating UTM Profiles.
Edit, clone, or delete a UTM profile—See Editing, Cloning, and Deleting UTM Profiles.
Clear the selected UTM profiles—Click Clear All Selections to clear any UTM profiles that you might have selected.
View the details of a UTM profile—Select the UTM profile for which you want to view the details and from the More or right-click menu, select Detailed View. The UTM Profile Details page appears. Table 95 describes the fields on this page.
Search for UTM profiles using keywords—Click the search icon and enter the search term in the text box and press Enter. The search results are displayed on the same page.
Table 94 describes the fields on the UTM Profiles page.
Table 94: UTM Profiles Page Fields
Field | Description |
---|---|
Name | Name of the UTM profile. |
Antispam | Information about the antispam profile associated with the UTM profile. |
Antivirus | Information about the antivirus profiles associated with the UTM profile. |
Content Filtering | Information about the content filtering profiles associated with the UTM profile. |
Web Filtering | Information about the Web filtering profile associated with the UTM profile. |
Description | Description of the UTM profile. |
Table 95: UTM Profile Details Page Fields
Field | Description |
---|---|
General Information | |
Name | Name of the UTM profile. |
Description | Description of the UTM profile. |
Traffic Options- | |
Action When Connection Limit Is Reached | Action to be taken when the configured connection limit per client is reached. |
Web Filtering Profile | |
HTTP | Web filtering profile to be used for HTTP traffic. |
Antivirus Profile | |
HTTP | Antivirus profile to be used for HTTP traffic. |
FTP Upload | Antivirus profile to be used for FTP upload traffic. |
FTP Download | Antivirus profile to be used for FTP download traffic. |
IMAP | Antivirus profile to be used for IMAP traffic. |
SMTP | Antivirus profile to be used for SMTP traffic. |
POP3 | Antivirus profile to be used for POP3 traffic. |
Antispam Profile | |
SMTP | Antispam profile to be used for SMTP traffic. |
© 2020 Juniper Networks, Inc. All rights reserved