Help Center User GuideGetting StartedFAQsRelease Notes
User Guide
Getting Started
Release Notes

Creating UTM Policies

Use the Unified Threat Management (UTM) policy page to configure UTM policies. UTM consolidates several security features into one device to protect against multiple threat types. The UTM policy wizard provides step-by-step procedures to create a UTM policy. You can configure multiple profiles by launching the respective wizards from the UTM policy wizard.

Before You Begin

Configuring UTM Policy Settings


To configure UTM policies:

  1. Select Configure > UTM Policy.
  2. Click the + icon to create a new UTM policy.
  3. Complete the configuration according to the guidelines provided in Table 150.
  4. Configure a filtering profile for your UTM policy:
    • Antispam— Examine transmitted e-mail messages to identify e-mail spam over SMTP. For more information, see Creating Antispam Profiles.
    • Antivirus—Inspect files transmitted over several protocols (HTTP, FTP upload and download, IMAP, SMTP, and POP3) to determine if the files exchanged are known malicious files, similar to how desktop antivirus software scans files for the same purpose. For more information, see Creating Antivirus Profiles.
    • Content filtering—Block or permit certain types of traffic over several protocols (HTTP, FTP upload and download, IMAP, SMTP, and POP3) based on the MIME type, file extension, protocol command, and embedded object type. For more information, see Creating Content Filtering Profiles.
    • Web Filtering-Manage Internet usage by preventing access to inappropriate Web content over HTTP. For more information, see Creating Web Filtering Profiles.
    • Device—Configure UTM global options for a device. The device profile refers to the antispam, antivirus, and Web filtering profiles. For more information, see Creating Device Profiles.
  5. Click Finish. A new UTM policy is created.

Table 150: UTM Policy Settings




Enter a unique name for the UTM policy that is a string of alphanumeric characters, colons, periods, dashes, and underscores. No spaces are allowed and the maximum length is 29 characters.


Enter a description for the UTM policy; maximum length is 255 characters.

Traffic Options

Specify traffic options for the UTM policy.

In an attempt to consume all available resources, a malicious user might generate a large amount of traffic all at once. To prevent such activity from succeeding, you can impose traffic options:

  • Connection limit per client—Specify the connection limit per client; default is 2000.
  • Action when connection limit is reached—Specify the action that must be taken once the connection limit is reached. The available actions are None, Log and Permit, and Block.

Related Documentation

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      

Additional Comments

800 characters remaining

May we contact you if necessary?


Need product assistance? Contact Juniper Support