Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
hexe
New Contributor

Flow Mode versus Proxy Mode

When Anti-maleware is deployed in the Flow Mode (versus Proxy Mode), what happens to the detection rate? - It dramatically decreases - it decreases slightly - stays the same - increases
1 Solution
AndreaSoliva
Contributor III

Hi all

 

it is of sure a document which does not give all answers but some will be answered.

 

My favour mode is still proxy mode which means as long as I do not have any performance issue I would use proxy mode. If you have problems with performance I would change to flow.

 

Search in google for following file:

 

Fortios-scanning-of-archive-compressed-files

 

You will find a Fortinet Document Fortios-scanning-of-archive-compressed-files.pdf. As mentioned it gives some answeres in some discussed stuff here.

 

have fun....

 

Andrea

View solution in original post

21 REPLIES 21
hklb
Contributor II

Hello, flowbase : faster, but less secure proxy : slower, but more secure (as the name suggest, the flow is proxied, like this the client isn' t directly connected to the server, and the fortigate has the entire file to do the security scan) For best performance, use the same mode for all your scan (AS, IPS, AV, ...).
Baptiste
Contributor II

Hmm, this is a question for NSE1 quiz, not sure this is the good place for this post (and for your first post)....

2 FGT 100D  + FTK200

3 FGT 60E  FAZ VM  some FAP 210B/221C/223C/321C/421E

2 FGT 100D + FTK200 3 FGT 60E FAZ VM some FAP 210B/221C/223C/321C/421E
Baptiste
Contributor II

And Hello, .... Thanks ... You' re Welcome

2 FGT 100D  + FTK200

3 FGT 60E  FAZ VM  some FAP 210B/221C/223C/321C/421E

2 FGT 100D + FTK200 3 FGT 60E FAZ VM some FAP 210B/221C/223C/321C/421E
vanc
New Contributor II

With FOS 5.2.1, flow based AV now uses the same AV engine for virus scanning. Security wise, it' s comparable with proxy. In general flow based solution is faster, but provides a smaller feature set than proxy.
Holy

can someone explain how it should work for 5.2.0 /1. Fortinet says you have now the speed of flow based and security of proxy based. if That' s functioning properly, then it is a huge performance boost, because as you know from the data sheet, there is (depending on Model) huge difference between proxy and flow based AV Throughput. I don´t really get, how did they do it.

NSE 8 

NSE 1 - 7

 

NSE 8 NSE 1 - 7
Christopher_McMullan

Haha, if we told you that...

Regards, Chris McMullan Fortinet Ottawa

Adrian_Buckley_FTNT

What makes proxymode slow is not the act of AV scanning the file. It' s the act of being a proxy and all that middle man work, handshaking, buffering, making sure the TCP session for both sides were in the proper state ... i could go on. Flow based AV in 5.0 used a separate AV engine linked to IPS. The idea being that the speed came from how IPS scanning itself works. 5.2 uses the proxy scan engine (HEY memory resources are saved because there is no longer a totally separate AV database to download). It does this by buffering the file in memory (not on the wire) and sending it to the AV engine when it detects end of file. So speed wise the only delay is holding onto that last packet. AV is clean, the last packet gets sent memory is flushed. Unless the file is something messy like multiple nested archives or an unknown compression format the act of scanning the file itself takes very little time.
storaid

hi, I have question.. now for v5.2.1, the flow mode has provided the same accuracy for security with proxy mode??

FWF60D x2 FWF60C x3 FGT80C rev.2 FGT200B-POE FAP220B x3 FAP221B x2

FSW224B x1

FWF60D x2 FWF60C x3 FGT80C rev.2 FGT200B-POE FAP220B x3 FAP221B x2 FSW224B x1
Adrian_Buckley_FTNT

That really depends on the nature of the inaccuracy in the first place. Flow mode still looks at the data as a stream. So if it can' t properly identify the beginning and end of a file transfer then the new format for the AV scanning won' t make any difference. Improved accuracy will come from looking at a file as a whole, rather then chunks. Proxy based inspection doesn' t suffer from that because it' s in the middle doing the exchange both sides, so it knows exactly where the beginning and end is.
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors