Comparison
The tables in this section show how different security features map to different inspection types and present the strengths and weaknesses of proxy- vs. flow-based inspection.
Security profile features mapped to inspection mode
The table below lists FortiOS security profile features and shows whether they are available in flow-based or proxy-based inspection modes.
Security Profile Feature |
Flow-based inspection |
Proxy-based inspection |
---|---|---|
AntiVirus |
x |
x |
Web Filter |
x |
x |
DNS Filter |
x |
x |
Application Control |
x |
x |
Intrusion Protection |
x |
x |
Anti-Spam |
|
x |
Data Leak Protection |
|
x |
VoIP |
x |
x |
ICAP |
|
x |
Web Application Firewall |
|
x |
FortiClient Profiles |
x |
x |
Proxy Options |
x |
x |
SSL Inspection |
x |
x |
SSH Inspection |
|
x |
Web Rating Overrides |
x |
x |
Web Profile Overrides |
|
x |