Fortinet 366 FortiWeb 5.0 Patch 6 Administration Guide
8. Click OK.
9. Repeat the previous steps for each individual login page that you want to add to the brute
force login attack profile.
10.To apply the brute force login attack profile, select it in an inline protection profile (see
“Configuring a protection profile for inline topologies” on page 468).
Attack log messages contain Brute Force Login Violation when this feature detects
a brute force login attack.
Standalone IP
Access Limit
Type the rate threshold for source IP addresses that are single clients.
Request rates exceeding the threshold will cause the FortiWeb appliance
to block additional requests for the length of the time in the Block Period
field.
To disable the rate limit, type 0.
Share IP
Access Limit
Type the rate threshold for source IP addresses that are shared by
multiple clients behind a network address translation (NAT) device such
as a firewall or router. Request rates exceeding the threshold will cause
the FortiWeb appliance to block additional requests for the length of the
time in the Block Period field.
To disable the rate limit, type 0.
Note: Blocking a shared source IP address could block innocent clients
that share the same source IP address with an offending client. In
addition, the rate is a total rate for all clients that use the same source IP
address. For these reasons, you should usually enter a greater value for
this field than for Standalone IP Access Limit.
Note: This option will be ignored if you have not enabled detection of
shared IP addresses. See “Advanced settings” on page 521.
Setting name Description