Inspection mode feature comparison

The following table shows which UTM profile can be configured on a flow mode or proxy mode inspection policy.

Some UTM profiles are hidden in the GUI and can only be configured using the CLI. To configure profiles in a firewall policy in CLI, enable the utm-status setting.

Some profiles might have feature differences between flow-based and proxy-based Inspection. From the GUI and CLI, you can set the Feature set option to be Flow-based or Proxy-based to display only the settings for that mode.

 

Flow Mode Inspection Policy

Proxy Mode Inspection Policy

Feature set option

UTM Profile

GUI

CLI

GUI

CLI

AntiVirus

Yes

Yes

Yes

Yes

GUI/CLI

Web Filter

Yes

Yes

Yes

Yes

GUI/CLI

DNS Filter

Yes

Yes

Yes

Yes

N/A

Application Control

Yes

Yes

Yes

Yes

N/A

Intrusion Prevention System

Yes

Yes

Yes

Yes

N/A

File Filter

Yes

Yes

Yes

Yes

GUI/CLI

Email Filter

Yes

Yes

Yes

Yes

GUI/CLI

Data Leak Prevention

No

Yes

No

Yes

CLI

VoIP

Yes

Yes

Yes

Yes

N/A

ICAP

No

No

Yes

Yes

N/A

Web Application Firewall

No

No

Yes