Fortinet black logo

Handbook

Comparison

6.0.0
Copy Link
Copy Doc ID 4afb0436-a998-11e9-81a4-00505692583a:592885
Download PDF

The tables in this section show how different security features map to different inspection types and present the strengths and weaknesses of proxy- vs. flow-based inspection.

Security profile features mapped to inspection mode

The table below lists FortiOS security profile features and shows whether they are available in flow-based or proxy-based inspection modes.

Security Profile Feature

Flow-based inspection

Proxy-based inspection

AntiVirus

x

x

Web Filter

x

x

DNS Filter

x

x

Application Control

x

x

Intrusion Protection

x

x

Anti-Spam

x

Data Leak Protection

x

VoIP

x

x

ICAP

x

Web Application Firewall

x

FortiClient Profiles

x

x

Proxy Options

x

x

SSL Inspection

x

x

SSH Inspection

x

Web Rating Overrides

x

x

Web Profile Overrides

x

The tables in this section show how different security features map to different inspection types and present the strengths and weaknesses of proxy- vs. flow-based inspection.

Security profile features mapped to inspection mode

The table below lists FortiOS security profile features and shows whether they are available in flow-based or proxy-based inspection modes.

Security Profile Feature

Flow-based inspection

Proxy-based inspection

AntiVirus

x

x

Web Filter

x

x

DNS Filter

x

x

Application Control

x

x

Intrusion Protection

x

x

Anti-Spam

x

Data Leak Protection

x

VoIP

x

x

ICAP

x

Web Application Firewall

x

FortiClient Profiles

x

x

Proxy Options

x

x

SSL Inspection

x

x

SSH Inspection

x

Web Rating Overrides

x

x

Web Profile Overrides

x