Skip to content

Unsure whether to enable DPI / threat protection on the firewall for an SMB.

Deep Packet Inspection and IDS/IPS on an SMB firewall (Fortinet, Sophos, UniFi UDM, Meraki) sound good but only help if configured carefully. On with everything blocked can halve your internet or kill legitimate traffic. Off and you pay for an idle feature. Make the call deliberately.

Try this first

  1. 1Gauge your actual uplink throughput need, DPI typically cuts max throughput by 30 to 50 percent depending on the model, read the spec sheet honestly.
  2. 2Start in 'detect only' / 'monitor' mode, do not block from day one. A week of logs tells you which false positives are coming.
  3. 3Only enable HTTPS inspection if your MDM can push the inspection cert to every laptop, otherwise you break apps that use cert pinning.
  4. 4Keep paying for the threat feed licence, otherwise your IPS is outdated within a year.
  5. 5Whitelist your SaaS suite (Microsoft 365 endpoints, Adobe, banks) so heavy DPI does not slow them down.

When to bring us in

You have regulatory requirements around traffic inspection (NIS2, PCI-DSS): turning things on ad hoc will not pass, it belongs in a real policy with a security partner who also handles incident response.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.