Inspection mode feature comparison
The following table shows which UTM profile can be configured on a flow mode or proxy mode inspection policy. Some UTM profiles are hidden in the GUI, but can be configured using the CLI.
|
Flow Mode Inspection Policy |
Proxy Mode Inspection Policy |
||
---|---|---|---|---|
UTM Profile |
GUI |
CLI |
GUI |
CLI |
Antivirus |
Yes (2) |
Yes (2) |
Yes |
Yes |
Application Control |
Yes |
Yes |
Yes |
Yes |
CIFS Inspection |
No |
No |
No (1) |
Yes |
Data Leak Prevention |
No |
Yes (3) |
No |
Yes |
DNS Filter |
Yes |
Yes |
Yes |
Yes |
Email Filter |
No |
Yes (4) |
Yes |
Yes |
ICAP |
No |
No |
Yes |
Yes |
Intrusion Prevention System |
Yes |
Yes |
Yes |
Yes |
SSL/SSH Inspection |
Yes |
Yes |
Yes |
Yes |
VoIP |
Yes |
Yes |
Yes |
Yes |
Web Filter |
Yes (5) |
Yes (5) |
Yes |
Yes |
Web Application Firewall |
No |
No |
Yes |
Yes |
- CIFS inspection cannot be configured via GUI.
- Some Antivirus features are not supported in flow mode inspection. See Inspection mode differences for antivirus.
- Some Data Leak Prevention features are not supported in Flow mode inspection. See Inspection mode differences for data leak prevention.
- Some Email filter features are not supported in Flow mode inspection. See Inspection mode differences for email filter.
- Some Web Filter features are not supported in Flow mode inspection. See Inspection mode differences for web filter.