Chapter 18 Troubleshooting : Life of a Packet : Comparison of inspection layers
  
Comparison of inspection layers
The three inspection methods each have their own strengths and weaknesses. The following table looks at all three methods side-by-side.
Table 104: Inspection methods comparison
Feature
Stateful
Flow
Proxy
Inspection unit per session
first packet
selected packets
complete content
Memory, CPU required
low
medium
high
Level of threat protection
good
better
best
Authentication
yes
 
 
IPsec and SSL VPN
yes
 
 
Antivirus protection
 
yes
yes
Web Filtering
 
yes
yes
Data Leak Protection (DLP)
 
yes
yes
Application control
 
yes
 
IPS
 
yes
 
Delay in traffic
 
no
small
Reconstruct entire content
 
no
yes