- play_arrow Administration Portal
- play_arrow Introduction
- Unified Administration and Customer Portal Overview
- Administration Portal Overview
- Logging in to Administration Portal
- Switching the Tenant Scope
- Changing the Administration Portal Password
- Changing the Password on First Login
- Resetting the Password
- Setting Password Duration
- Extending the User Login Session
- Setting Up the Cloud CPE Centralized Deployment Model with Administration Portal
- Setting Up the Cloud CPE Distributed Deployment Model with Administration Portal
- play_arrow Managing Objects
- play_arrow Using the Dashboard
- play_arrow Monitoring Alerts, Alarms, and Device Events
- play_arrow Monitoring Tenants SLA Performance
- Multidepartment CPE Device Support
- About the SLA Performance of All Tenants Page
- About the SLA Performance of a Single Tenant Page
- Monitoring Application-Level SLA Performance for real time-optimized SD-WAN
- Viewing the SLA Performance of a Site
- Viewing the SLA Performance of an Application or Application Group
- Understanding SLA Performance Score for Applications, Links, Sites, and Tenants
- play_arrow Monitoring Jobs
- play_arrow Managing POPs
- About the POPs Page
- Creating a Single POP
- Importing Data for Multiple POPs
- Viewing the History of POP Data Imports
- Viewing the History of POP Data Deletions
- Managing a Single POP
- About the VIMs Page
- Creating a Cloud VIM
- About the EMS Page
- Creating an EMS
- Changing the Junos Space Virtual Appliance Password
- About the Routers Page
- Creating Devices
- Configuring Devices
- View the History of Device Data Deletions
- play_arrow Managing Devices
- About the Tenant Devices Page
- About the Cloud Hub Devices Page
- Managing a Tenant Device
- Managing a Cloud Hub Device
- Device Redundancy Support Overview
- Viewing the History of Tenant Device Activation Logs
- Viewing the History of Cloud Hub Device Activation Logs
- Secure OAM Network Overview
- Adding a Cloud Hub Device
- Upgrading a Cloud Hub Device
- Rebooting a CPE Device
- play_arrow Managing Device Templates
- play_arrow Managing Software Images
- play_arrow Configuring Network Services in a Centralized Deployment
- Network Services Overview
- About the Network Services Page
- About the Service Overview Page
- About the Service Instances Page
- Configuring VNF Properties
- Allocating a Service to Tenants
- Removing a Service from Tenants
- Viewing a Service Configuration
- vSRX VNF Configuration Settings
- LxCIPtable VNF Configuration Settings
- Cisco CSR-1000v VNF Configuration Settings
- Riverbed Steelhead VNF Configuration Settings
- Managing a Single Service
- play_arrow Configuring Application SLA Profiles
- Application Quality of Experience (AppQoE) Overview
- About the Application Traffic Type Profiles Page
- Creating Traffic Type Profiles
- Editing and Deleting Traffic Type Profiles
- SLA Profiles and SD-WAN Policies Overview
- Cost-Based Link Switching
- Local Breakout Overview
- About the Application SLA Profiles Page
- Creating SLA Profiles
- Editing and Deleting SLA Profiles
- play_arrow Configuring Application Signatures
- play_arrow Managing Tenants
- play_arrow Managing Operating Companies
- play_arrow Configuring SP Users
- play_arrow Managing Audit Logs
- play_arrow Managing Roles
- play_arrow Configuring Authentication
- play_arrow Configuring Licenses
- play_arrow Customizing the Unified Portal
- play_arrow Managing Signature Database
-
- play_arrow Designer Tools
- play_arrow Configuration Designer
- Configuration Designer Overview
- Accessing the Configuration Designer
- Using the Configuration Designer
- Changing Your Password
- About the Requests Page for the Configuration Designer
- Creating Requests for Configuration Templates
- Designing Templates with a YANG Configuration
- Designing Templates with a Configuration
- Publishing Configuration Templates
- About the Designs Page for the Configuration Designer
- Cloning Configuration Templates
- Deleting Configuration Template Designs
- play_arrow Resource Designer
- Resource Designer Overview
- Using the Resource Designer
- Accessing the Resource Designer
- About the Requests Page for the Resource Designer
- VNF Overview
- Creating Requests for VNF Packages
- Designing VNF Packages
- Adding VNF Managers
- Publishing VNF Packages
- About the Designs Page for the Resource Designer
- Cloning VNF Packages
- Importing VNF Packages
- Exporting VNF Packages
- Deleting VNF Packages
- play_arrow Network Service Designer introduction
- play_arrow Creating Requests for Network Services
- play_arrow Creating Network Services
- About the Build Page for the Network Service Designer
- Viewing Information About VNFs
- Designing Network Services
- Connecting VNFs in a Service Chain
- Defining Ingress and Egress Points for a Service Chain
- Monitoring Performance Goals
- Configuring Network Services
- vSRX Configuration Settings
- LxCIPtable VNF Configuration Settings
- Cisco CSR-1000v VNF Configuration Settings
- Riverbed Steelhead VNF Configuration Settings
- Fortinet VNF Configuration Settings
- Ubuntu VNF Configuration Settings
- play_arrow Managing Network Services
-
- play_arrow Downloads
Creating UTM Profiles
Use the Create UTM Profiles page to configure UTM profiles. Unified threat management (UTM) consolidates several security features to protect against multiple threat types. The Create UTM Profiles wizard provides step-by-step procedures to create a UTM profile. You can configure antispam, antivirus, Web filtering, and content filtering profiles by launching the respective wizards from the wizard.
To create a UTM profile:
- Select Configuration > Unified Threat Mgmt > UTM
Profiles in Customer Portal.
The UTM Profiles page appears.
- Click the add icon (+) to create a new UTM
profile.
The Create UTM Profiles wizard appears, displaying brief instructions about creating a UTM profile.
- Click Next to navigate to the next page.
- Complete the configuration according to the guidelines
provided in Table 1.Note
Fields marked with * are mandatory.
- Click Finish.
A UTM profile is created. You are returned to the UTM Profiles page where a confirmation message is displayed. After you create a UTM profile, you can assign it to a firewall policy intent on the Firewall Policy page.
Table 1: UTM Profile Settings
Setting | Guideline |
---|---|
General | |
Name | Enter a unique name for the UTM profile. The maximum length is 29 characters. |
Description | Enter a description for the UTM profile. The maximum length is 255 characters. |
Traffic Options Note: In an attempt to consume all available resources, a malicious user might generate a large amount of traffic all at once. To prevent such activity from succeeding, you can impose traffic options. | |
Connection Limit per Client | Specify the connection limit per client for client connections on the device. The default is 2000 and a value of 0 means that there is no connection limit. |
Action when connection limit is reached | Specify the action that must be taken when the connection limit is reached. The available actions are No action (default), Log and permit, and Block. Click Next to continue. |
Web Filtering | |
HTTP | Select the Web filtering profile to be applied for HTTP traffic. Alternatively, click Create Another Profile to create a Web filtering profile. The Create Web Filtering Profiles wizard appears. See Creating Web Filtering Profiles for an explanation of the fields on this wizard. Click Back to go the preceding step or click Next to go to the next step. |
Antivirus | |
Apply to all protocols | Select this check box to apply a single antivirus profile to all traffic protocols. and then specify the profile in the Default Profile field. Clear the check box if you want to apply traffic-specific profiles. |
Default Profile | Select the antivirus profile to be applied to all traffic protocols. Click Back to go the preceding step or click Next to go to the next step. |
Note: Click Create Another Profile to create an antivirus profile that you can then assign. The Create Antivirus Profiles wizard appears. See Creating Antivirus Profiles for an explanation of the fields on this wizard. | |
HTTP | Select the antivirus profile to be applied to HTTP traffic. |
FTP Upload | Select the antivirus profile to be applied to FTP upload traffic. |
FTP Download | Select the antivirus profile to be applied to FTP download traffic. |
IMAP | Select the antivirus profile to be applied to IMAP traffic. |
SMTP | Select the antivirus profile to be applied to SMTP traffic. |
POP3 | Select the antivirus profile to be applied to POP3 traffic. Click Back to go the preceding step or click Next to go to the next step. |
Antispam | |
SMTP | Select the antispam profile to be applied for SMTP traffic. Alternatively, click Create Another Profile to create an antispam profile. The Create Antispam Profiles wizard appears. See Creating Antispam Profiles for an explanation of the fields on this wizard. Click Back to go the preceding step or click Next to go to the next step. |
Content Filtering | |
Apply to all protocols | Select this check box to apply a single content filtering profile to all traffic protocols. and then specify the profile in the Default Profile field. Clear the check box if you want to apply traffic-specific profiles. |
Default Profile | Select the content filtering profile to be applied to all traffic protocols. Click Back to go the preceding step or click Next to go to the next step. |
Note: Click Create Another Profile to create a content filtering profile that you can then assign. The Create Content Filtering Profiles wizard appears. See Creating Content Filtering Profiles for an explanation of the fields on this wizard. | |
HTTP | Select the content filtering profile to be applied to HTTP traffic. |
FTP Upload | Select the content filtering profile to be applied to FTP upload traffic. |
FTP Download | Select the content filtering profile to be applied to FTP download traffic. |
IMAP | Select the content filtering profile to be applied to IMAP traffic. |
SMTP | Select the content filtering profile to be applied to SMTP traffic. |
POP3 | Select the content filtering profile to be applied to POP3 traffic. Click Back to go the preceding step. |