Fortinet 339 FortiWeb 5.0 Patch 6 Administration Guide
See also
•Limiting the total HTTP request rate from an IP
•Limiting TCP connections per IP address by session cookie
•Preventing an HTTP request flood
•Preventing automated requests
•Configuring browser enforcement exceptions
Limiting the total HTTP request rate from an IPYou can limit the number of HTTP requests per second, per source IP address.
This feature is similar to DoS Protection > Application > HTTP Flood Prevention. However, this
feature can prevent HTTP request floods that involve many different URLs. It also can detect
source IP addresses that are shared by multiple clients, and intelligently enforce a separate
request rate limit for those IPs, even if those clients do not support cookies.
FortiWeb appliances track the rate of requests from each source IP address, regardless of their
HTTP method. If the rate of requests exceeds the limit, FortiWeb performs the Action.
To configure an HTTP request rate limit
1. Before you configure the rate limit, enable detection of when source IP addresses are shared
by multiple clients. For details, see “Advanced settings” on page 521.
2. Go to DoS Protection > Application > HTTP Access Limit.
To access this part of the web UI, your administrator’s account access profile must have
Read and Write permission to items in the Web Protection Configuration category. For
details, see “Permissions” on page 47.
3. Click Create New.
A dialog appears.
This scan is bypassed if the client’s source IP is a known search engine and you have enabled
Allow Known Search Engines.
If you do not enable detection of shared IP addresses (Shared IP) , the second threshold,
HTTP Request Limit/sec (Shared IP) will be ignored.