Hi there,
I had gone through the documents (https://docs.fortinet.com/document/fortigate/7.4.2/administration-guide/721410/inspection-modes) but couldn't understand more clear about Inspection mode proxy and flow based.
Below are the my quires that I want to make it clear as follows:
1. Difference between proxy and flow based mode
2. In which case should we use proxy or flow mode
3. Packet follow of proxy and flow mode.
Your response will be highly appreciated
Thank you in advanced.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi Umesh,
In default mode, flow mode traffic flowing through the policy will not be buffered by the FortiGate.
On proxy inspection mode, traffic flowing through the policy will be buffered by the FortiGate for inspection. This means that the packets for a file, email message, or web page will be held by the FortiGate until the entire payload is inspected for violations (virus, spam, or malicious web links). After FortiOS finishes the inspection, the payload is either released to the destination (if the traffic is clean) or dropped and replaced with a replacement message (if the traffic contains violations).
You also have some use cases explained into the guide you shared.
-BR-
Hi Umesh
In addition to @ndumaj 's explanation, i'd add that I personally use proxy mode only if it is a policy with WAF profile or with Antispam profile. For all others I use flow mode for its better performance and low resource consumption.
Hi @Umesh,
Please refer to the following links:
https://docs.fortinet.com/document/fortigate/7.4.2/administration-guide/721410/inspection-modes
Regards,
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1631 | |
1063 | |
749 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.