Inspection Mode Per Policy
In this version, in NGFW Mode, the Inspection Mode is moved to per-policy, enabling more flexible setup for different policies.
In System > VDOM, the NGFW Mode option has been removed.
When you configure a policy, you can select a Flow-based or Proxy-based Inspection Mode. Default is Flow-based.
If you change to Proxy-based, the Proxy HTTP(S) traffic option displays.
In the Security Profiles section, if no security profiles are enabled, the default SSL Inspection is no-inspection.
In the Security Profiles section, if you enable any security profile, the SSL Inspection changes to certificate-inspection.
To see the inspection mode changes in the CLI:
FortiGate-101E (root) # config firewall policy FortiGate-101E (policy) # edit 1 FortiGate-101E (1) # set utm-status disable FortiGate-101E (1) # set inspection-mode proxy Proxy based inspection. flow Flow based inspection. FortiGate-101E (1) # set inspection-mode proxy FortiGate-101E (1) # end FortiGate-101E (root) # sh firewall policy config firewall policy edit 1 set uuid 05d88354-4817-51e9-7494-06cb70accbf0 set srcintf "wan2" set dstintf "wan1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set inspection-mode proxy set nat enable next end
To see http-policy-redirect/ssh-policy-redirect setting when inspection mode is set to proxy:
FortiGate-101E (root) # config firewall policy FortiGate-101E (policy) # end FortiGate-101E (root) # config firewall policy FortiGate-101E (policy) # edit 1 FortiGate-101E (1) # set inspection-mode proxy FortiGate-101E (1) # set http-policy-redirect enable Enable HTTP(S) policy redirect. disable Disable HTTP(S) policy redirect. FortiGate-101E (1) # set ssh-policy-redirect enable Enable SSH policy redirect. disable Disable SSH policy redirect. FortiGate-101E (1) # set http-policy-redirect enable FortiGate-101E (1) # set ssh-policy-redirect enable FortiGate-101E (1) # end FortiGate-101E (root) # sh firewall policy 1 config firewall policy edit 1 set uuid 05d88354-4817-51e9-7494-06cb70accbf0 set srcintf "wan2" set dstintf "wan1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set inspection-mode proxy set http-policy-redirect enable set ssh-policy-redirect enable set nat enable next end
To see the default ssl-ssh-policy set to no inspection:
FortiGate-101E (root) # config firewall policy FortiGate-101E (policy) # edit 1 FortiGate-101E (1) # sh config firewall policy edit 1 set uuid 05d88354-4817-51e9-7494-06cb70accbf0 set srcintf "wan2" set dstintf "wan1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set inspection-mode proxy set http-policy-redirect enable set ssh-policy-redirect enable set nat enable next end FortiGate-101E (1) # sh fu | grep ssl-ssh-profile set ssl-ssh-profile "no-inspection" FortiGate-101E (1) # end