Fortinet black logo

New Features

Inspection Mode Per Policy

Inspection Mode Per Policy

In this version, in NGFW Mode, the Inspection Mode is moved to per-policy, enabling more flexible setup for different policies.

In System > VDOM, the NGFW Mode option has been removed.

When you configure a policy, you can select a Flow-based or Proxy-based Inspection Mode. Default is Flow-based.

If you change to Proxy-based, the Proxy HTTP(S) traffic option displays.

In the Security Profiles section, if no security profiles are enabled, the default SSL Inspection is no-inspection.

In the Security Profiles section, if you enable any security profile, the SSL Inspection changes to certificate-inspection.

To see the inspection mode changes in the CLI:
FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # edit 1

FortiGate-101E (1) # set utm-status disable

FortiGate-101E (1) # set inspection-mode
proxy    Proxy based inspection.
flow     Flow based inspection.

FortiGate-101E (1) # set inspection-mode proxy

FortiGate-101E (1) # end

FortiGate-101E (root) # sh firewall policy
config firewall policy
    edit 1
        set uuid 05d88354-4817-51e9-7494-06cb70accbf0
        set srcintf "wan2"
        set dstintf "wan1"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set inspection-mode proxy
        set nat enable
    next
end
To see http-policy-redirect/ssh-policy-redirect setting when inspection mode is set to proxy:
FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # end

FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # edit 1

FortiGate-101E (1) # set inspection-mode proxy

FortiGate-101E (1) # set http-policy-redirect
enable     Enable HTTP(S) policy redirect.
disable    Disable HTTP(S) policy redirect.

FortiGate-101E (1) # set ssh-policy-redirect
enable     Enable SSH policy redirect.
disable    Disable SSH policy redirect.

FortiGate-101E (1) # set http-policy-redirect enable

FortiGate-101E (1) # set ssh-policy-redirect enable

FortiGate-101E (1) # end

FortiGate-101E (root) # sh firewall policy 1
config firewall policy
    edit 1
        set uuid 05d88354-4817-51e9-7494-06cb70accbf0
        set srcintf "wan2"
        set dstintf "wan1"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set inspection-mode proxy
        set http-policy-redirect enable
        set ssh-policy-redirect enable
        set nat enable
    next
end
To see the default ssl-ssh-policy set to no inspection:
FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # edit 1

FortiGate-101E (1) # sh
config firewall policy
    edit 1
        set uuid 05d88354-4817-51e9-7494-06cb70accbf0
        set srcintf "wan2"
        set dstintf "wan1"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set inspection-mode proxy
        set http-policy-redirect enable
        set ssh-policy-redirect enable
        set nat enable
    next
end

FortiGate-101E (1) # sh fu | grep ssl-ssh-profile
        set ssl-ssh-profile "no-inspection"

FortiGate-101E (1) # end

Inspection Mode Per Policy

In this version, in NGFW Mode, the Inspection Mode is moved to per-policy, enabling more flexible setup for different policies.

In System > VDOM, the NGFW Mode option has been removed.

When you configure a policy, you can select a Flow-based or Proxy-based Inspection Mode. Default is Flow-based.

If you change to Proxy-based, the Proxy HTTP(S) traffic option displays.

In the Security Profiles section, if no security profiles are enabled, the default SSL Inspection is no-inspection.

In the Security Profiles section, if you enable any security profile, the SSL Inspection changes to certificate-inspection.

To see the inspection mode changes in the CLI:
FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # edit 1

FortiGate-101E (1) # set utm-status disable

FortiGate-101E (1) # set inspection-mode
proxy    Proxy based inspection.
flow     Flow based inspection.

FortiGate-101E (1) # set inspection-mode proxy

FortiGate-101E (1) # end

FortiGate-101E (root) # sh firewall policy
config firewall policy
    edit 1
        set uuid 05d88354-4817-51e9-7494-06cb70accbf0
        set srcintf "wan2"
        set dstintf "wan1"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set inspection-mode proxy
        set nat enable
    next
end
To see http-policy-redirect/ssh-policy-redirect setting when inspection mode is set to proxy:
FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # end

FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # edit 1

FortiGate-101E (1) # set inspection-mode proxy

FortiGate-101E (1) # set http-policy-redirect
enable     Enable HTTP(S) policy redirect.
disable    Disable HTTP(S) policy redirect.

FortiGate-101E (1) # set ssh-policy-redirect
enable     Enable SSH policy redirect.
disable    Disable SSH policy redirect.

FortiGate-101E (1) # set http-policy-redirect enable

FortiGate-101E (1) # set ssh-policy-redirect enable

FortiGate-101E (1) # end

FortiGate-101E (root) # sh firewall policy 1
config firewall policy
    edit 1
        set uuid 05d88354-4817-51e9-7494-06cb70accbf0
        set srcintf "wan2"
        set dstintf "wan1"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set inspection-mode proxy
        set http-policy-redirect enable
        set ssh-policy-redirect enable
        set nat enable
    next
end
To see the default ssl-ssh-policy set to no inspection:
FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # edit 1

FortiGate-101E (1) # sh
config firewall policy
    edit 1
        set uuid 05d88354-4817-51e9-7494-06cb70accbf0
        set srcintf "wan2"
        set dstintf "wan1"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set inspection-mode proxy
        set http-policy-redirect enable
        set ssh-policy-redirect enable
        set nat enable
    next
end

FortiGate-101E (1) # sh fu | grep ssl-ssh-profile
        set ssl-ssh-profile "no-inspection"

FortiGate-101E (1) # end