Inspection mode differences for Data Leak Prevention This section identifies the behavioral differences between Data Leak Prevention (DLP) operating in flow and proxy inspection. Feature comparison between DLP inspection modes The following table indicates which DLP filters are supported by their designated inspection modes. Credit Card Filter SSN Filter […]
Inspection mode differences for Antivirus This section identifies the behavioral differences between Antivirus operating in flow and proxy inspection. Feature comparison between Antivirus inspection modes The following table indicates which Antivirus features are supported by their designated scan modes. Part1 Replacement Message Content Disarm Mobile Malware Virus Outbreak Sandbox Inspection […]
Inspection mode feature comparison The following table shows which UTM profile can be configured on a flow mode or proxy mode inspection policy. Remember that some UTM profiles are hidden in the GUI, but can be configured by using the FortiOS CLI. Flow Mode Inspection Policy Proxy Mode Inspection […]
Proxy mode inspection When a firewall policy’s inspection mode is set to proxy, traffic flowing through the policy will be buffered by the FortiGate for inspection. This means that the packets for a file, email message, or web page will be held by the FortiGate until the entire payload is […]
Flow mode inspection (default mode) When a firewall policy’s inspection mode is set to flow, traffic flowing through the policy will not be buffered by the FortiGate. Unlike proxy mode, the content payload passing through the policy will be inspected on a packet by packet basis with the very last […]
I had someone ask me how to tag a VOIP phone to the VOICE VLAN of a FortiSwitch that is managed by a FortiGate. The following Video shows you how!
DLP watermarking Watermarking marks files with a digital pattern to designate them as proprietary to a specific company. A small pattern is added to the file that is recognized by the DLP watermark filter, but is invisible to the end user (except for text files). FortiExplorer client, or a Linux-based […]
DLP fingerprinting DLP fingerprinting can be used to detect sensitive data. The file that the DLP sensor will filter for is uploaded and the FortiGate generates and stores a checksum fingerprint. The FortiGate unit generates a fingerprint for all of the files that are detected in network traffic, and compares […]