Comparison
The tables in this section show how different security features map to different inspection types and present the strengths and weaknesses of proxy- vs. flow-based inspection.
Security profile features mapped to inspection mode
The table below lists FortiOS security profile features and shows whether they are available in flow-based or proxy-based inspection modes.
|
Security Profile Feature |
Flow-based inspection |
Proxy-based inspection |
|---|---|---|
|
AntiVirus |
x |
x |
|
Web Filter |
x |
x |
|
DNS Filter |
x |
x |
|
Application Control |
x |
x |
|
Intrusion Protection |
x |
x |
|
Anti-Spam |
|
x |
|
Data Leak Protection |
|
x |
|
VoIP |
x |
x |
|
ICAP |
|
x |
|
Web Application Firewall |
|
x |
|
FortiClient Profiles |
x |
x |
|
Proxy Options |
x |
x |
|
SSL Inspection |
x |
x |
|
SSH Inspection |
|
x |
|
Web Rating Overrides |
x |
x |
|
Web Profile Overrides |
|
x |