Unified Threat Management (UTM) is an all-in-one security solution integrated into Juniper SRX devices. It complements traditional firewall functionality by providing advanced threat protection against malware, phishing, spam, and unauthorized content access.
UTM combines multiple security functions into a single system to offer comprehensive protection against modern threats. It works alongside firewalls to enhance network security by focusing on application-level threats, web content control, and malicious email detection.
Traditional firewalls primarily focus on packet filtering and network-level security. UTM extends these capabilities to:
Enable the Kaspersky antivirus engine:
set security utm feature-profile anti-virus kaspersky-engine
Create a default antivirus profile:
set security utm feature-profile anti-virus default-profile type kaspersky
Schedule automatic updates for the antivirus database:
set security utm feature-profile anti-virus default-profile kaspersky-engine update
Link the antivirus profile to a UTM policy (discussed later).
Enable Juniper Enhanced Web Filtering:
set security utm feature-profile web-filtering type juniper-enhanced
Create a default profile to block malware:
set security utm feature-profile web-filtering default-profile block-malware
Link the web filtering profile to a UTM policy.
Create a default anti-spam profile:
set security utm feature-profile anti-spam default-profile
Add a blacklist entry for known spam domains:
set security utm feature-profile anti-spam smtp-profile blacklist blacklisted-domain.com
Enable anti-spam filtering for email traffic via UTM policies.
Enable content filtering:
set security utm feature-profile content-filtering type web
Create a profile to block executable files:
set security utm feature-profile content-filtering profile block-executables block content-type application/x-exe
Link the content filtering profile to a UTM policy.
UTM features are applied using UTM policies, which are then attached to security policies for traffic enforcement.
You want to enforce the following:
Create a UTM policy for web filtering:
set security utm utm-policy default-policy web-filtering-profile default-profile
Create a security policy to allow web browsing:
set security policies from-zone trust to-zone untrust policy allow-web match application junos-http
set security policies from-zone trust to-zone untrust policy allow-web then permit utm-policy default-policy
Commit the configuration:
commit
Test web browsing by accessing a known malicious site.
Check UTM logs for blocked traffic:
show log messages | match "UTM"
UTM features can be combined within a single UTM policy to provide layered protection.
You want to:
Create an antivirus profile:
set security utm feature-profile anti-virus default-profile type kaspersky
set security utm feature-profile anti-virus default-profile kaspersky-engine update
Create a web filtering profile:
set security utm feature-profile web-filtering default-profile block-malware
Create a content filtering profile:
set security utm feature-profile content-filtering profile block-executables block content-type application/x-exe
Create a UTM policy that combines these features:
set security utm utm-policy combined-policy anti-virus-profile default-profile
set security utm utm-policy combined-policy web-filtering-profile default-profile
set security utm utm-policy combined-policy content-filtering-profile block-executables
Apply the UTM policy to a security policy:
set security policies from-zone trust to-zone untrust policy allow-web match application junos-http
set security policies from-zone trust to-zone untrust policy allow-web then permit utm-policy combined-policy
Commit the configuration:
commit
Block access to social media websites and allow all other categories.
Create a custom web filtering profile:
set security utm feature-profile web-filtering custom-profile block-social block-category social-networking
Apply the profile to a UTM policy:
set security utm utm-policy web-policy web-filtering-profile custom-profile
Attach the UTM policy to a security policy:
set security policies from-zone trust to-zone untrust policy restrict-social match application any
set security policies from-zone trust to-zone untrust policy restrict-social then permit utm-policy web-policy
Commit the configuration:
commit
Enable detailed logging for UTM to track blocked content and other UTM activities.
Enable logging in the security policy:
set security policies from-zone trust to-zone untrust policy allow-web then permit log
View UTM logs:
show log messages | match UTM
Symptom: Traffic is not being filtered or scanned by UTM features.
Possible Causes:
Troubleshooting Steps:
Verify the security policy:
show configuration security policies
utm-policy is specified.Check UTM policy configuration:
show configuration security utm
Symptom: No logs are generated for UTM activities.
Possible Causes:
Troubleshooting Steps:
Enable logging in the security policy:
set security policies from-zone trust to-zone untrust policy allow-web then permit log
Check log storage and configuration:
show system storage
show configuration system syslog
Symptom: Blocked categories or URLs are still accessible.
Possible Causes:
Troubleshooting Steps:
Verify the web filtering profile:
show configuration security utm feature-profile web-filtering
Clear the browser cache and test again.
| Command | Purpose |
|---|---|
show security utm feature-profile |
View UTM profile configurations. |
show security utm utm-policy |
Verify UTM policy details. |
| `show log messages | match UTM` |
show security policies hit-count |
Ensure security policies are being applied. |
monitor traffic interface ge-0/0/0 |
Inspect traffic for UTM application issues. |
Ensure antivirus and web filtering databases are updated frequently for optimal protection.
Enable automatic updates:
set system services utm auto-update
UTM features operate at Layer 7 (Application Layer), but they are not universally applicable to all traffic types. Understanding which protocols are supported by each UTM function is essential for both configuration and passing the exam.
| UTM Feature | Typical Protocols Supported | Notes |
|---|---|---|
| Web Filtering | HTTP, HTTPS (with SSL Proxy) | Requires clear-text visibility; HTTPS needs SSL decryption |
| Antivirus | HTTP, FTP, SMTP | HTTPS requires SSL Proxy for inspection |
| Anti-Spam | SMTP, POP3, IMAP | Focused on email protocols |
| Content Filtering | HTTP, FTP | Based on MIME types, file extensions |
By default, HTTPS traffic is not inspected by UTM unless SSL Proxy (HTTPS Inspection) is enabled.
→ If Web Filtering is applied to encrypted HTTPS traffic without SSL Proxy, the content will not be analyzed — the connection is simply passed.
SSL Proxy is an essential part of UTM when dealing with encrypted HTTPS traffic. It's often tested in the exam under topics like "How does Web Filtering inspect HTTPS?" or "What enables AV to scan encrypted content?"
Acts as a "man-in-the-middle" to decrypt HTTPS sessions.
Enables UTM features (Web Filtering, Antivirus, Content Filtering) to analyze HTTPS content.
Requires importing a trusted CA certificate to client devices, as SRX will present its own certificate for decrypted sessions.
SSL Proxy Profile
Configuration of how SRX decrypts and inspects traffic.
Application of SSL Proxy in Security Policy Example configuration:
set security ssl proxy profile ssl-inspect-profile action intercept
set security ssl proxy profile ssl-inspect-profile trusted-ca trusted-ca-profile
set security policies from-zone trust to-zone untrust policy web-https-inspect match application junos-https
set security policies from-zone trust to-zone untrust policy web-https-inspect then permit application-services ssl-proxy ssl-inspect-profile
Users must install the SRX-generated CA certificate in their browser or system to avoid SSL warnings.
SSL Proxy introduces latency and processing overhead.
Not supported on all platforms without license or resource capacity.
“Which UTM feature requires SSL Proxy to inspect HTTPS content?”
→ Correct answer: Web Filtering or Antivirus
UTM features are CPU and memory intensive, especially when combined (e.g., AV + SSL Proxy + Web Filtering). Improper deployment can lead to:
High latency
Packet drops
Device resource exhaustion
Use UTM features on high-performance SRX platforms (e.g., SRX1500, SRX4100, SRX4600).
Always test resource usage before enabling full UTM in production.
Consider offloading inspection to dedicated hardware or cloud services (e.g., Sky ATP for web filtering/AV).
Features like Kaspersky antivirus, Enhanced Web Filtering, and Anti-Spam may:
Require advanced licenses.
Be unsupported on smaller branch models (e.g., SRX300 with limited memory).
SSL Proxy is not available on some low-end SRX models or may be restricted in performance.
“A user enables UTM on an SRX300 and experiences latency. What is the most likely cause?”
→ Correct answer: “Insufficient hardware resources for UTM processing”
| Topic | Key Takeaways |
|---|---|
| UTM protocol support | UTM features work with HTTP, SMTP, etc.; HTTPS needs SSL Proxy |
| SSL Proxy (HTTPS Inspection) | Required for inspecting encrypted traffic; acts as a middlebox |
| Performance considerations | UTM impacts CPU/memory; not all SRX models are ideal for full UTM load |
| Licensing/platform limits | Some UTM features are license-restricted or unavailable on smaller devices |
What is the purpose of Unified Threat Management (UTM) on an SRX firewall?
UTM provides additional security services such as antivirus, web filtering, and content filtering.
Unified Threat Management enhances the firewall’s ability to inspect traffic beyond basic security policies. UTM services analyze application content and detect threats such as malware or malicious websites. Instead of simply allowing or blocking traffic based on ports or protocols, UTM inspects the data within the traffic stream. For example, antivirus scanning can detect malicious files, while web filtering can block access to harmful websites. These services are integrated with security policies and provide deeper protection against network threats.
Demand Score: 84
Exam Relevance Score: 89
Why must UTM profiles be referenced in a security policy?
Because UTM inspection is applied through security policies controlling traffic between zones.
UTM services do not operate independently. Instead, they are attached to security policies that allow traffic between zones. When traffic matches a policy containing a UTM profile, the firewall performs additional inspection such as antivirus scanning or web filtering before forwarding the packet. If the policy does not include a UTM profile, the firewall will not apply UTM inspection to that traffic.
Demand Score: 82
Exam Relevance Score: 90
Why might web filtering fail to block websites even though UTM is configured?
Because the UTM profile may not be correctly applied to the security policy.
Even if web filtering is configured on the firewall, it will not affect traffic unless the correct UTM profile is attached to the active security policy. Another common issue occurs when administrators apply the profile to the wrong policy or incorrect zone pair. Troubleshooting should involve checking which security policy the traffic matches and verifying that the UTM profile is attached to that policy.
Demand Score: 80
Exam Relevance Score: 88
Why do many UTM features require a license on SRX devices?
Because UTM services rely on continuously updated threat databases.
Security services such as antivirus scanning and web filtering depend on updated threat intelligence databases. These databases are maintained by security vendors and require ongoing updates to remain effective against new threats. Licensing ensures that the SRX firewall receives updated signatures and threat intelligence from Juniper security services. Without an active license, the firewall cannot access these updates, and the UTM features may not function properly.
Demand Score: 79
Exam Relevance Score: 86