Inspection mode feature comparison
The following table shows which UTM profile can be configured on a flow mode or proxy mode inspection policy. Some UTM profiles are hidden in the GUI, but can be configured using the CLI.
|
Flow Mode Inspection Policy |
Proxy Mode Inspection Policy |
||
---|---|---|---|---|
UTM Profile |
GUI |
CLI |
GUI |
CLI |
Antivirus | Yes (2) | Yes (2) | Yes | Yes |
Application Control | Yes | Yes | Yes | Yes |
CIFS Inspection | No | No | No (1) | Yes |
Data Leak Prevention | No | Yes (3) | Yes | Yes |
DNS Filter | Yes | Yes | Yes | Yes |
Email Filter | No | Yes (4) | Yes | Yes |
ICAP | No | No | Yes | Yes |
Intrusion Prevention System | Yes | Yes | Yes | Yes |
SSL/SSH Inspection |
Yes |
Yes |
Yes |
Yes |
VoIP |
Yes |
Yes |
Yes |
Yes |
Web Filter |
Yes (5) |
Yes (5) |
Yes |
Yes |
Web Application Firewall |
No |
No |
Yes |
Yes |
- CIFS inspection cannot be configured via GUI.
- Some Antivirus features are not supported in flow mode inspection. See Inspection mode differences for antivirus.
- Some Data Leak Prevention features are not supported in Flow mode inspection. See Inspection mode differences for data leak prevention.
- Some Email filter features are not supported in Flow mode inspection. See Inspection mode differences for email filter.
- Some Web Filter features are not supported in Flow mode inspection. See Inspection mode differences for web filter.