Fortinet white logo
Fortinet white logo

Handbook

6.0.0

Comparison

Comparison

The tables in this section show how different security features map to different inspection types and present the strengths and weaknesses of proxy- vs. flow-based inspection.

Security profile features mapped to inspection mode

The table below lists FortiOS security profile features and shows whether they are available in flow-based or proxy-based inspection modes.

Security Profile Feature

Flow-based inspection

Proxy-based inspection

AntiVirus

x

x

Web Filter

x

x

DNS Filter

x

x

Application Control

x

x

Intrusion Protection

x

x

Anti-Spam

x

Data Leak Protection

x

VoIP

x

x

ICAP

x

Web Application Firewall

x

FortiClient Profiles

x

x

Proxy Options

x

x

SSL Inspection

x

x

SSH Inspection

x

Web Rating Overrides

x

x

Web Profile Overrides

x

Comparison

Comparison

The tables in this section show how different security features map to different inspection types and present the strengths and weaknesses of proxy- vs. flow-based inspection.

Security profile features mapped to inspection mode

The table below lists FortiOS security profile features and shows whether they are available in flow-based or proxy-based inspection modes.

Security Profile Feature

Flow-based inspection

Proxy-based inspection

AntiVirus

x

x

Web Filter

x

x

DNS Filter

x

x

Application Control

x

x

Intrusion Protection

x

x

Anti-Spam

x

Data Leak Protection

x

VoIP

x

x

ICAP

x

Web Application Firewall

x

FortiClient Profiles

x

x

Proxy Options

x

x

SSL Inspection

x

x

SSH Inspection

x

Web Rating Overrides

x

x

Web Profile Overrides

x