Fortinet white logo
Fortinet white logo

Handbook

Configuring Application profiles

Configuring Application profiles

An Application Profile is a configuration object that defines how you want the FortiADC virtual server to handle traffic for specific protocols. Each Application Profile Type is compatible with specific virtual server types, load-balancing methods, and content routing types. To help you get started, FortiADC offers predefined profile configurations you can apply directly in the virtual server configuration, or use as a template to create a user-defined profile.

Before you begin:
  • You must have already created configuration objects for certificates, caching, and compression if you want the profile to use them.
  • You must have Read-Write permission for Load Balance settings.

Configuration Overview

The Application Profile configuration workflow is entirely dependent on the specific protocol. Each protocol, or Profile Type, requires its own set of parameters to be configured. The steps below outlines the basic workflow to configure a custom Application Profile.

  1. Go to Server Load Balance > Application Resources.
    The configuration page displays the Application Profile tab.
  2. Click Create New to display the configuration editor.
  3. In the Name field, specify a unique name for the custom Application Profile configuration object. Valid characters are A-Z, a-z, 0-9, _, and -. No space is allowed.
    Once saved, the name of a Application Profile configuration cannot be changed.
  4. From the Type field, select a protocol from the drop-down menu. This selection determines the parameters to configure.
    To view the configuration parameters for each protocol type, see Application Profile Types where you can navigate to the desired Profile Type.
  5. Click Save to save the configuration.

All values in the predefined profiles are view-only, and cannot be modified. However, You can clone a predefined configuration object to help you get started with a user-defined configuration.

To clone a configuration object, click the clone icon that appears in the tools column on the configuration summary page.

Application Profile Types

Each Application Profile Type requires specific parameters to be configured. FortiADC supports the following table lists of Application Profile Types and their usage and compatibilities. Use the links under the Profile Type column to navigate to the configuration parameters applicable to each Application Profile Type and view its available predefined Profile configuration.

Profile Type Usage VS Type LB Methods Persistence

TCP

Use for other TCP protocols.

Layer 4

Round Robin, Least Connection, Fastest Response, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash

Layer 2

Round Robin, Least Connection, Fastest Response, Destination IP Hash, Dynamic Load

UDP

Use with UDP servers.

Layer 4

Round Robin, Least Connection, Fastest Response, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash

Layer 2

Round Robin, Least Connection, Fastest Response, Dynamic Load, Destination IP Hash

HTTP

Use for standard, unsecured web server traffic.

Layer 7

Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash, HTTP Header Hash, HTTP Request Hash, Cookie Hash, Persistent Cookie, Insert Cookie, Embedded Cookie, Rewrite Cookie, Passive Cookie

Layer 2

Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load, Destination IP Hash

FTP

Use with FTP servers.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

Layer 4

Round Robin, Least Connection, Fastest Response, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash

RADIUS

Use with RADIUS servers.

Layer 7

Round Robin

RADIUS attribute

TCPS

Use for secured TCP when offloading TLS/SSL from the backend servers.
You must import the backend server certificates into FortiADC and select them in the TCPS profile.

Layer 7

Round Robin, Least Connection, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash, SSL Session ID

Layer 2

Round Robin, Least Connection, Destination IP Hash, Dynamic Load

HTTPS

Use for secured web server traffic when offloading TLS/SSL from the backend servers. You must import the backend server certificates into FortiADC and select them in the HTTPS profile.

Layer 7

Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash, HTTP Header Hash, HTTP Request Hash, Cookie Hash, Persistent Cookie, Insert Cookie, Embedded Cookie, Rewrite Cookie, Passive Cookie, SSL Session ID

Layer 2

Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load, Destination IP Hash

HTTP Turbo

Use for unsecured HTTP traffic that does not require advanced features like caching, compression, content rewriting, rate limiting, Geo IP blocking, or source NAT. The profile can be used with content routes and destination NAT, but the HTTP request must be in the first data packet.

This profile enables packet-based forwarding that reduces network latency and system CPU usage. However, packet-based forwarding for HTTP is advisable only when you do not anticipate dropped packets or out-of-order packets.

Layer 7

Round Robin, Least Connection, Fastest Response

Source Address

SIP

Use with applications that use Session Initiation Protocol (SIP), such as VoIP, instant messaging, and video.

Layer 7

Round Robin, URI Hash, Full URI Hash

Source Address, Source Address Hash, Source Address-Port Hash, SIP Call ID

RDP

Use with Windows Terminal Service (Remote Desktop Protocol).

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash, Source Address-Port Hash, RDP Cookie

DNS

Use with DNS servers.

Layer 7

Round Robin, Least Connection

Not supported yet.

IP

Combines with Layer 2 TCP/UDP/HTTP virtual server to balance the rest of the IP packets passed through FortiADC. When running the IP protocol 0 VS, the traffic always tries to match none protocol 0 VS first.

Layer 2

Round Robin, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash

SMTP

Use with SMTP servers.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

MySQL

MySQL network protocol stack (such as MySQL-Proxy) which parses and builds MySQL protocol packets.

Layer 7

Round Robin, Least Connection

N/A

RTSP

A network control protocol used for establishing and controlling media sessions between end points.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

RTMP

A TCP-based protocol used for streaming audio, video, and data over the Internet.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

Diameter

A successor to RADIUS, Diameter is the next-generation Authentication, Authorization and Accounting (AAA) protocol widely used in IMS and LTE. Layer 7

Round Robin

Source Address

Diameter Session ID (default)

ISO8583

Use with ISO8583 servers.

Layer 7

Round Robin

N/A

MSSQL

MSSQL network protocol stack, which parses and builds MSSQL protocol packets.

Layer 7

Least Connection

N/A

EXPLICIT_HTTP

A simple explicit/forward HTTP proxy mode.

In this mode, you do not need to add backend real server pools. The destination IP address of the downstream is specified by the URL or Host field of the client request.

Layer 7

N/A

N/A

L7 TCP

Use for other TCP protocols.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

L7 UDP

Use with UDP servers.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

TCP


Parameter

Description

Timeout TCP Session

Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400.

Timeout TCP Session after FIN

Client-side connection timeout. The default is 100 seconds. The valid range is 1 to 86,400.

Timeout Send RST

Enable to send TCP RST to the client and real server when the TCP session expires. This is disabled by default.

Note: This function is supported for both IPv4 and IPv6 in L4 and L2 virtual servers. For L4 virtual servers, Timeout Sent RST is supported for DNAT/FullNAT/NAT46/NAT64 packet forwarding methods.

Client IP Insertion in TCP Option

Enable to insert the Client IP in the TCP option. This is disabled by default.

This function is applicable in Layer 4 TCP virtual servers using DNAT or Full NAT as the packet forwarding method. By inserting the Client IP in the TCP option it allows the real server to easily retrieve the client address even after the Client IP has been modified during packet forwarding.

Note:

FortiADC cannot insert the Client IP in the TCP option under the following conditions:

  • If the TCP option number already exists.

  • If the length of the TCP header will exceed 60 bytes once the client address is inserted.

Client IP Insertion in TCP Option Number

The Client IP Insertion in TCP Option Number option is available if Client IP Insertion in TCP Option is enabled.

Specify the TCP Option Number which indicates the TCP option kind to be collected. The default is 28. The valid range is 2 to 255.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined TCP Profile: LB_PROF_TCP

Parameter

Default value

Timeout TCP Session 100
Timeout TCP Session after FIN 100

Timeout Send RST

Disabled

Client IP Insertion in TCP Option

Disabled

IP Reputation Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

UDP

Parameter

Description

Stateless

Enable to apply UDP stateless function.

Timeout UDP Session

Client-side session timeout. The default is 100 seconds. The valid range is 1 to 86,400.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined UDP Profile: LB_PROF_UDP

Parameter

Default value

Timeout UDP Session 100
IP Reputation Disabled
Stateless Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

HTTP

Parameter

Description

Client Timeout

This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

Server Timeout

This timeout is counted as the amount of time when the server did not send a complete response HTTP header to the FortiADC after the FortiADC sent a request to server. If this timeout expires, FortiADC will close the server side connection and send a 503 message to the client and close the connection to the client.

Connect Timeout

This timeout is counted as the amount of time during which FortiADC tried to connect to the server with TCP SYN. After this timeout, if TCP connection is not established, FortiADC will drop this current connection to server and respond with a 503 message to client side and close the connection to the client.

Queue Timeout

This timeout is counted as the amount of time during which the request is queued in the dispatched queue. When the request cannot be dispatched to a server by a load balance method (for example, the server's connection limited is reached), it will be put into a queue. If this timeout expires, the request in the queue will be dropped and FortiADC will respond with a 503 message to client side and close the connection to the client.

HTTP Send Timeout

This timeout is counted as the amount of time it took FortiADC to send a response body data (not including the header); the time is counted starting from when the body is transferred. If this timeout expires, FortiADC will close the connection of both side.

HTTP Request Timeout

This timeout is counted as the amount of time the client did not send a complete request (including both HTTP header and request body) to FortiADC after the client connected to FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

HTTP Keepalive Timeout

This timeout is counted as the time FortiADC can wait for a new request after the previous transaction is completed. This is an idle timeout if the client does not send anything in this period. If this timeout expires, FortiADC will close the connection to the client.

Client Address

Use the original client IP address as the source address when connecting to the real server.

X-Forwarded-For

Append the client IP address found in IP layer packets to the HTTP header that you have specified in the X-Forwarded-For Header setting. If there is no existing X-Forwarded-For header, the system creates it.

If you only enable http-x-forwarded-for and do not configure http-x-forwarded-for-header, the default is to add such a header: X-Forwarded-For: <client's ip>

X-Forwarded-For Header

Specify the HTTP header to which to write the client IP address. Typically, this is the X-Forwarded-For header, but it is customizable because you might support traffic that uses different headers for this. Examples: Forwarded-For, Real-IP, or True-IP.

If http-x-forwarded-for-header <string> is configured, the added header is: <string>: <client's ip>,

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

IP Reputation Redirect URL

Type a URL including the FQDN/IP and path, if any, to which a client will be redirected if the request violates the IP reputation policy.

HTTP Mode

  • Server Close—Close the connection to the real server after each HTTP transaction.
  • Once Only— An HTTP transaction can consist of multiple HTTP requests (separate requests for an HTML page and the images contained therein, for example). To improve performance, the "once only" flag instructs the FortiADC to evaluate only the first set of headers in a connection. Subsequent requests belonging to the connection are not load balanced, but sent to the same server as the first request.
  • Keep Alive—Do not close the connection to the real server after each HTTP transaction. Instead, keep the connection between FortiADC and the real server open until the client-side connection is closed. This option is required for applications like Microsoft SharePoint.

Compression

Select a compression configuration object. See Configuring compression rules.

Decompression

Select a decompression configuration object. See Configuring decompression rules.

HTTP2

Select an HTTP2 Profile configuration object. See Configuring HTTP2 profiles.

Caching

Select a caching configuration object. See Using caching features.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Geo IP Redirect URL

For HTTP, if you have configured a Geo IP redirect action, specify a redirect URL.

Advanced Settings

Tune Buffer Size

Adjust the value of the HTTP/HTTPS VS's connection buffer size.

  • For every session, there are two connection buffers.
  • The default size is 8030, it is not recommended that you edit it. It's hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous because it may lead to concurrent session number reduction or other unpredictable problems.

Max HTTP Headers

Adjust the max header number that HTTP/HTTPS VS can process for every request or response. If a request or response has a header over this limit, it will be dropped, and return error message 400.

  • The default value is 100, it's not recommended that you edit it. It is hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous and may lead to concurrent session number reduction or other unpredictable problems.

Response Half Closed Connection

Enable to continue to serve half-closed connections.

Predefined HTTP Profiles:

LB_PROF_HTTP

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5
HTTP Request Timeout 50
HTTP Keepalive Timeout 50
Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header Blank
IP Reputation Disabled
HTTP Mode Keep Alive
Compression None
Decompression None
Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
HTTP Send Timeout 5
HTTP2 None

LB_PROF_HTTP_SERVERCLOSE

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5
HTTP Request Timeout 50
HTTP Keepalive Timeout 50

Buffer Pool

Enabled

Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header None
IP Reputation Disabled
HTTP Mode Server Close

Customized SSL Ciphers Flag

Disabled

Compression None
Decompression None
Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
HTTP Send Timeout 0
HTTP2 None

LB_PROF_HTTP2_H2C

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5

HTTP Send Timeout

0

HTTP Request Timeout 50
HTTP Keepalive Timeout 50
Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header None
IP Reputation Disabled
HTTP Mode Keep Alive
Compression None
Decompression None

HTTP2

LB_HTTP2_PROFILE_DEFAULT

Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
Tune Buffer Size 17418

Max HTTP Headers

200

Response Half Closed Connection

Disabled

Navigate back to Application Profile Types.

FTP

Parameter

Description

Timeout TCP Session

Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400.

Timeout TCP Session after FIN

Client-side connection timeout. The default is 100 seconds. The valid range is 1 to 86,400.

Client Address

Use the original client IP address as the source address when connecting to the real server.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Security Mode

Select either of the following:

  • None

  • Explicit

  • Implicit

Predefined FTP Profile: LB_PROF_FTP

Parameter

Default value

Timeout TCP Session 100
Timeout TCP Session after FIN 100
IP Reputation Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Client Address

Off

Security Mode

None

Navigate back to Application Profile Types.

RADIUS

Parameter

Description

Client Address

Use the original client IP address as the source address when connecting to the real server.

Source Port

Use the original client port as the source port when connecting to the real server.

Timeout RADIUS Session

The default is 300 seconds. The valid range is 1 to 3,600.

Dynamic Auth

Enable or disable Dynamic Authorization for RADIUS Change of Authorization (CoA).

Dynamic Auth Port

Configures the UDP port for CoA requests. The default is 3799.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined RADIUS Profile: LB_PROF_RADIUS

Parameter

Default value

Client Address Off
Source Port Off
Dynamic Auth Disabled

RADIUS Session

300

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

TCPS

Parameter

Description

Client Timeout

Client-side TCP connection timeout. The default is 50 seconds. The valid range is 1 to 3,600.

Server Timeout

Server-side IP session timeout. The default is 50 seconds. The valid range is 1 to 3,600.

Connect Timeout

Multiplexed server-side TCP connection timeout. Usually less than the client-side timeout. The default is 5 seconds. The valid range is 1 to 3,600.

Queue Timeout

Specifies how long connection requests to a backend server remain in a queue if the server has reached its maximum number of connections. If the timeout period expires before the client can connect, the system drops the connection and sends a 503 error to the client. The default is 5 seconds. The valid range is 1 to 3,600.

Client Address

Use the original client IP address as the source address in the connection to the real server.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Advanced Settings

Tune Buffer Size

Adjust the value of the TCPS VS's connection buffer size.

  • For every session, there are two connection buffers.
  • The default size is 8030, it is not recommended that you edit it. It's hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous because it may lead to concurrent session number reduction or other unpredictable problems.

Response Half Closed Connection

Enable to continue to serve half-closed connections.

Predefined TCPS Profile: LB_PROF_TCPS

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5

Queue Timeout

5

Client Address

Disabled

IP Reputation

Disabled

Geo IP Blocklist

None

Navigate back to Application Profile Types.

HTTPS

Parameter

Description

Client Timeout

This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

Server Timeout

This timeout is counted as the amount of time when the server did not send a complete response HTTP header to the FortiADC after the FortiADC sent a request to server. If this timeout expires, FortiADC will close the server side connection and send a 503 message to the client and close the connection to the client.

Connect Timeout

This timeout is counted as the amount of time during which FortiADC tried to connect to the server with TCP SYN. After this timeout, if TCP connection is not established, FortiADC will drop this current connection to server and respond with a 503 message to client side and close the connection to the client.

Queue Timeout

This timeout is counted as the amount of time during which the request is queued in the dispatched queue. When the request cannot be dispatched to a server by a load balance method (for example, the server's connection limited is reached), it will be put into a queue. If this timeout expires, the request in the queue will be dropped and FortiADC will respond with a 503 message to client side and close the connection to the client.

HTTP Send Timeout

This timeout is counted as the amount of time it took FortiADC to send a response body data (not including the header); the time is counted starting from when the body is transferred. If this timeout expires, FortiADC will close the connection of both side.

HTTP Request Timeout

This timeout is counted as the amount of time the client did not send a complete request (including both HTTP header and request body) to FortiADC after the client connected to FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

HTTP Keepalive Timeout

This timeout is counted as the time FortiADC can wait for a new request after the previous transaction is completed. This is an idle timeout if the client does not send anything in this period. If this timeout expires, FortiADC will close the connection to the client.

Client Address

Use the original client IP address as the source address when connecting to the real server.

X-Forwarded-For

Append the client IP address found in IP layer packets to the HTTP header that you have specified in the X-Forwarded-For Header setting. If there is no existing X-Forwarded-For header, the system creates it.

If you only enable http-x-forwarded-for and do not configure http-x-forwarded-for-header, the default is to add such a header: X-Forwarded-For: <client's ip>

X-Forwarded-For Header

Specify the HTTP header to which to write the client IP address. Typically, this is the X-Forwarded-For header, but it is customizable because you might support traffic that uses different headers for this. Examples: Forwarded-For, Real-IP, or True-IP.

If http-x-forwarded-for-header <string> is configured, the added header is: <string>: <client's ip>,

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

IP Reputation Redirect URL

Type a URL including the FQDN/IP and path, if any, to which a client will be redirected if the request violates the IP reputation policy.

HTTP Mode

  • Server Close—Close the connection to the real server after each HTTP transaction.
  • Once Only— An HTTP transaction can consist of multiple HTTP requests (separate requests for an HTML page and the images contained therein, for example). To improve performance, the "once only" flag instructs the FortiADC to evaluate only the first set of headers in a connection. Subsequent requests belonging to the connection are not load balanced, but sent to the same server as the first request.
  • Keep Alive—Do not close the connection to the real server after each HTTP transaction. Instead, keep the connection between FortiADC and the real server open until the client-side connection is closed. This option is required for applications like Microsoft SharePoint.

Compression

Select a compression configuration object. See Configuring compression rules.

Decompression

Select a decompression configuration object. See Configuring decompression rules.

HTTP2

Select an HTTP2 Profile configuration object. See Configuring HTTP2 profiles.

HTTP3

Select an HTTP3 Profile configuration object. See Configuring HTTP3 profiles.

Caching

Select a caching configuration object. See Using caching features.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Geo IP Redirect URL

For HTTP, if you have configured a Geo IP redirect action, specify a redirect URL.

Advanced Settings

Tune Buffer Size

Adjust the value of the HTTP/HTTPS VS's connection buffer size.

  • For every session, there are two connection buffers.
  • The default size is 8030, it is not recommended that you edit it. It's hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous because it may lead to concurrent session number reduction or other unpredictable problems.

Max HTTP Headers

Adjust the max header number that HTTP/HTTPS VS can process for every request or response. If a request or response has a header over this limit, it will be dropped, and return error message 400.

  • The default value is 100, it's not recommended that you edit it. It is hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous and may lead to concurrent session number reduction or other unpredictable problems.

Response Half Closed Connection

Enable to continue to serve half-closed connections.

Predefined HTTPS Profiles:

LB_PROF_HTTPS

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5
HTTP Request Timeout 50
HTTP Keepalive Timeout 50
Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header None
IP Reputation Disabled
HTTP Mode Keep Alive

SSL Proxy Mode

Disabled

Compression None
Decompression None
Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
HTTP Send Timeout 0
HTTP2 None

LB_PROF_HTTPS_SERVERCLOSE

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5
HTTP Request Timeout 50
HTTP Keepalive Timeout 50
Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header None
IP Reputation Disabled
HTTP Mode Server Close
Compression None
Decompression None
Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
HTTP Send Timeout 0
HTTP2 None

LB_PROF_HTTP2_H2

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5

HTTP Send Timeout

0

HTTP Request Timeout 50
HTTP Keepalive Timeout 50
Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header None
IP Reputation Disabled
HTTP Mode Keep Alive
Compression None
Decompression None

HTTP2

LB_HTTP2_PROFILE_DEFAULT

Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
Tune Buffer Size 17418

Max HTTP Headers

200

Response Half Closed Connection

Disabled

LB_PROF_HTTP3

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5
HTTP Request Timeout 50
HTTP Keepalive Timeout 50
X-Forwarded-For Disabled
X-Forwarded-For Header None
HTTP Mode Keep Alive

HTTP3

LB_HTTP3_PROFILE_DEFAULT

Tune Buffer Size 32768

Max HTTP Headers

200

Navigate back to Application Profile Types.

HTTP Turbo

Parameter

Description

Timeout TCP Session

Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400.

Timeout TCP Session after FIN

Client-side connection timeout. The default is 100 seconds. The valid range is from 1 to 86,400.

IP Reputation

Enable to apply the FortiGuard IP reputation service.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined HTTP Turbo Profile: LB_PROF_TURBOHTTP

Parameter

Default value

Timeout TCP Session 100
Timeout TCP Session after FIN 100
IP Reputation Disabled
Geo IP Blocklist None
Geo IP Allowlist None

Navigate back to Application Profile Types.

SIP

Parameter

Description

SIP Max Size

Maximum message size. The default is 65535 bytes. The valid range is from 1 to 65,535.

Server Keepalive Timeout

Maximum wait for a new server-side request to appear. The default is 30 seconds. The valid range is 5-300.

Server Keepalive

Enable/disable a keepalive period for new server-side requests. Supports CRLF ping-pong for TCP connections. Enabled by default.

Client Keepalive

Enable/disable a keepalive period for new client-side requests. Supports CRLF ping-pong for TCP connections. Disabled by default.

Client Protocol

Client-side transport protocol:

  • TCP
  • UDP (default)

Server Protocol

Server-side transport protocol.

  • TCP
  • UDP

Default is "unset", so the client-side protocol determines the server-side protocol.

Failed Client Type

Action when the SIP client cannot be reached:

  • Drop—Drop the connection.
  • Send—Drop the connection and send a message, for example, a status code and error message.

Failed Server Type

Action when the SIP server cannot be reached:

  • Drop—Drop the connection.
  • Send—Drop the connection and send a message, for example, a status code and error message.

Insert Client IP

Enable/disable option to insert the client source IP address into the X-Forwarded-For header of the SIP request.

Client Address

Use the original client IP address as the source address in the connection to the real server.

Media Address

Change the media address of SIP payload to specified address. 0.0.0.0 is default.

Client-Request-Header-Insert (maximum 4 members)

Type

  • Insert If Not Exist—Insert before the first header only if the header is not already present.
  • Insert Always—Insert before the first header even if the header is already present.
  • Append If Not Exist—Append only if the header is not present.
  • Append Always—Append after the last header.

HeaderName:Value

The header:value pair to be inserted.

Client-Request-Header-Erase (maximum 4 members)

Type

  • All—Parse all headers for a match.
  • First—Parse the first header for a match.

HeaderName

Header to be erased.

Client-Response-Header-Insert (maximum 4 members)

Type

  • Insert If Not Exist—Insert before the first header only if the header is not already present.
  • Insert Always—Insert before the first header even if the header is already present.
  • Append If Not Exist—Append only if the header is not present.
  • Append Always—Append after the last header.

HeaderName:Value

The header:value pair to be inserted.

Client-Response-Header-Erase (maximum 4 members)

Type

  • All—Parse all headers for a match.
  • First—Parse the first header for a match.

HeaderName

Header to be erased.

Server-Request-Header-Insert (maximum 4 members)

Type

  • Insert If Not Exist—Insert before the first header only if the header is not already present.
  • Insert Always—Insert before the first header even if the header is already present.
  • Append If Not Exist—Append only if the header is not present.
  • Append Always—Append after the last header.

HeaderName:Value

The header:value pair to be inserted.

Server-Request-Header-Erase (maximum 4 members)

Type

  • All—Parse all headers for a match.
  • First—Parse the first header for a match.

HeaderName

Header to be erased.

Server-Response-Header-Insert (maximum 4 members)

Type

  • Insert If Not Exist—Insert before the first header only if the header is not already present.
  • Insert Always—Insert before the first header even if the header is already present.
  • Append If Not Exist—Append only if the header is not present.
  • Append Always—Append after the last header.

HeaderName:Value

The header:value pair to be inserted.

Server-Response-Header-Erase (maximum 4 members)

Type

  • All—Parse all headers for a match.
  • First—Parse the first header for a match.

HeaderName

Header to be erased.

Predefined SIP Profile: LB_PROF_SIP

Parameter

Default value

SIP Max Size 65535
Server Keepalive Timeout Server Keepalive Timeout
Server Keepalive Enabled
Client Keepalive Disabled
Client Protocol UDP
Server Protocol None
Failed Client Type Drop
Failed Server Type Drop
Insert Client IP Disabled
Geo IP Blocklist None
Geo IP Allowlist None
Client Address Off
Media Address 0.0.0.0

Navigate back to Application Profile Types.

RDP

Parameter

Description

Client Timeout

Client-side TCP connection timeout. The default is 50 seconds. The valid range is 1 to 3,600.

Server Timeout

Server-side IP session timeout. The default is 50 seconds. The valid range is 1 to 3,600.

Connect Timeout

Multiplexed server-side TCP connection timeout. Usually less than the client-side timeout. The default is 5 seconds. The valid range is 1 to 3,600.

Queue Timeout

Specifies how long connection requests to a backend server remain in a queue if the server has reached its maximum number of connections. If the timeout period expires before the client can connect, FortiADC drops the connection and sends a 503 error to the client. The default is 5 seconds. The valid range is 1 to 3,600.

Client Address

Use the original client IP address as the source address in the connection to the real server.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Advanced Settings

Tune Buffer Size

Adjust the value of the RDP VS's connection buffer size.

  • For every session, there are two connection buffers.
  • The default size is 8030, it is not recommended that you edit it. It's hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous because it may lead to concurrent session number reduction or other unpredictable problems.

Response Half Closed Connection

Enable to continue to serve half-closed connections.

Predefined RDP Profile: LB_PROF_RDP

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5

Queue Timeout

5

Source Address

Disabled

IP Reputation

Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

DNS

Parameter

Description

Client Address

Enable/disable to use the original client IP address as the source address when connecting to the real server.

DNS Cache Flag

Enable/disable the cache for the DNS virtual server.

DNS Cache Ageout Time

Specify the cache age-out time (in seconds). The default is 3,600. The valid range is 0 to 65,535.

DNS Cache Size

Specify the maximum cache size (in Megabytes). The default is 10. The valid range is 1 to 100.

DNS Cache Entry Size

Specify the maximum cache entry size. The default is 512. The valid range is 256 to 4,096.

DNS Cache Response Type

Select either of the following cache response types:

  • All Records

  • Round Robin

DNS Malform Query Action

Select either of the following reactions for the malformed requests:

  • Drop

  • Forward

DNS Max Query Length

Specify the maximum query length. The default is 512. The valid range is 256 to 4,096.

DNS Authentication Flag

Enable/disable to authenticate client by redirecting UDP query to TCP.

Predefined DNS Profile: LB_PROF_DNS

Parameter

Default value

Client Address Off
DNS Cache Flag Enabled
DNS Cache Ageout Time 3600
DNS Cache Size 10
DNS Cache Entry Size 512
DNS Cache Response Type All Records
DNS Malform Query Action Drop
DNS Max Query Length 512

DNS Authentication Flag

Disabled

Navigate back to Application Profile Types.

IP

Parameter

Description

IP Reputation

Enable to apply FortiGuard IP reputation service. IP reputation. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Timeout IP Session

Client-side session timeout. The default is 100 seconds. The valid range is 1 to 86,400.

Predefined IP Profile: LB_PROF_IP

Parameter

Default value

IP Reputation

Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Timeout IP Session

100

Navigate back to Application Profile Types.

SMTP

Parameter

Description

Client Address

Use the original client IP address as the source address in the connection to the real server.

Note: When using the NAT Source Pool for SMTP VS, ensure the SMTP application profile is disabled for Client Address. When the SMTP is enabled for Client Address, it will use the original client IP address as the source address when connecting to the real server, which cannot be done when the NAT source pool is used at the same time.

STARTTLS Active Mode

Select one of the following:

  • Allow—The client can either use or not use the STARTTLS command.
  • Required—The STARTTLS command must be used to encrypt the connection first.
  • None—The STARTTLS command is NOT supported.

Forbidden Command Status

Enable/disable to forbid the command(s) selected in Forbidden Command.

Forbidden Command

Select any, all, or none of the commands:

  • EXPN

  • TURN

  • VRFY

If selected, the command or commands will be rejected by FortiADC; otherwise, the command or commands will be accepted and forwarded to the back end.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Domain Name

Specify the domain name.

Predefined SMTP Profile: LB_PROF_SMTP

Parameter

Default value

Client Address Disable
STARTTLS Active Mode Required
Forbidden Command Status Enable
Forbidden Command EXPN, TURN, VRFY
Geo IP Blocklist None
Geo IP Allowlist None
Domain Name default.com

Navigate back to Application Profile Types.

MySQL

Parameter

Description

MySQL Mode

Select either of the following MySQL modes:

  • Single Primary — The profile will use the single-primary mode. You will then need to specify and configure the primary server and secondary servers.

  • Sharding — The profile will use the sharding mode to load-balance MySQL traffic.

For more configuration details, see Configuring MySQL profiles.

Navigate back to Application Profile Types.

RTSP

Parameter

Description

Client Address

Disabled by default. When enabled, FortiADC will use the client address to connect to the server pool.

Max Header Size

Specify the maximum size of the RTSP header. Default is 4096. Valid values range from 2048 to 65536.

Predefined RTSP Profile: LB_PROF_RTSP

Parameter

Default value

Client Address

Disabled

Max Header Size

4096

Navigate back to Application Profile Types.

RTMP

Parameter

Description

Client Address

Disabled by default. When enabled, FortiADC will use the client address to connect to the server pool.

Predefined RTMP Profile: LB_PROF_RTMP

Parameter

Default value

Client Address

Disabled

Navigate back to Application Profile Types.

Diameter

Parameter

Description

Origin Host

Specify the Origin Host.

Once defined, FortiADC will change the Origin-Host AVP of the Diameter packet.

Origin Realm

Specify the Origin Realm.

Once defined, FortiADC will change the Origin-Realm AVP of the Diameter packet.

Vendor ID

Specify the Vendor ID. Default is 0. Range is 0-2147483647.

Once defined, FortiADC will change the Vendor-ID AVP of the Diameter packet.

Product Name

Specify the Product Name.

Once defined, FortiADC will change the Product-Name AVP of the Diameter packet.

Idle Timeout

300 (seconds) by default. Valid values range from 1 to 86,400.

This refers to the built-in session ID persistence timeout.

Server Close Propagation

Disabled by default, this means that the connection on the client side stays open when the server closes the connection on its side.

Client SSL

Enable or disable Client SSL. This is disabled by default.

Predefined Diameter Profile: LB_PROF_DIAMETER

Parameter

Default value

Origin Host

Blank

Origin Realm

Blank

Vendor ID

0

Product Name

Blank

Idle Timeout

300

Server Close Propagation

Disable

Client SSL

Disable

Note: When the LB_PROF_DIAMETER profile is applied, FortiADC will not change Diameter packets except the host IP address AVP, which means that FortiADC functions as a relay agent.

Navigate back to Application Profile Types.

ISO8583

Parameter

Description

Timeout TCP Session

Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400 seconds.

Message Encode Type

Specify the encode type for protocol message:

  • ASCII

  • Binary

The default option is ASCII.

Length Indicator Type

Specify the encode type of length indicator:

  • binary

  • BCD

  • decimal-str

  • hex-str

The default option is binary.

Length Indicator Shift

Specify bytes to shift from the beginning of payload to read length value. Default is 0, range 0-32.

Length Indicator Size

Specify total bytes reading to calculate length. Default is 2, range 0-8.

Optional Header Length

Specify length of optional header before MTI, including the length-indicator. Default is 0, range 0-32.

Optional Trailer Hex

Specify hex string of optional trailer, maximum length 16, i.e. 8 bytes in binary

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined ISO8583 Profile: LB_PROF_ISO8583

Parameter

Default value

Timeout TCP Session

100

Message Encode Type

ASCII

Length Indicator Type

binary

Length Indicator Shift

0

Length Indicator Size

2

Optional Header Length

2

Optional Trailer Hex

None

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

MSSQL

Parameter

Description

Client Timeout

This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client. The default is 50 seconds. The valid range is 1 to 86,400 seconds.

Server Age

Specify the maximum inactivity time for MS SQL server on the server side.

Server Max Size

Specify the maximum connections that can connect to the MS SQL server on the server side.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

For more configuration details, see Configuring MSSQL profiles.

Navigate back to Application Profile Types.

EXPLICIT_HTTP

Parameter

Description

Client Timeout

This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

Server Timeout

This timeout is counted as the amount of time when the server did not send a complete response HTTP header to the FortiADC after the FortiADC sent a request to server. If this timeout expires, FortiADC will close the server side connection and send a 503 message to the client and close the connection to the client.

Connect Timeout

This timeout is counted as the amount of time during which FortiADC tried to connect to the server with TCP SYN. After this timeout, if TCP connection is not established, FortiADC will drop this current connection to server and respond with a 503 message to client side and close the connection to the client.

Queue Timeout

This timeout is counted as the amount of time during which the request is queued in the dispatched queue. When the request cannot be dispatched to a server by a load balance method (for example, the server's connection limited is reached), it will be put into a queue. If this timeout expires, the request in the queue will be dropped and FortiADC will respond with a 503 message to client side and close the connection to the client.

HTTP Send Timeout

This timeout is counted as the amount of time it took FortiADC to send a response body data (not including the header); the time is counted starting from when the body is transferred. If this timeout expires, FortiADC will close the connection of both side.

HTTP Request Timeout

This timeout is counted as the amount of time the client did not send a complete request (including both HTTP header and request body) to FortiADC after the client connected to FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

HTTP Keepalive Timeout

This timeout is counted as the time FortiADC can wait for a new request after the previous transaction is completed. This is an idle timeout if the client does not send anything in this period. If this timeout expires, FortiADC will close the connection to the client.

Client Address

Use the original client IP address as the source address when connecting to the real server.

X-Forwarded-For

Enable this option to append the client IP address found in IP layer packets to the HTTP header, for example, X-forwarded-for: 192.168.161.100.

The default header name is X-forwarded-for. If you prefer a different name, use X-Forwarded-For Header to define a custom name.

X-Forwarded-For Header

Specify a custom name for the HTTP header which carries the client IP address. Do not include the 'X-' prefix. Examples: Forwarded-For, Real-IP, or True-IP.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

IP Reputation Redirect URL

Type a URL including the FQDN/IP and path, if any, to which a client will be redirected if the request violates the IP reputation policy.

Decompression

Select a compression configuration object. See Configuring compression rules.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Geo IP Redirect URL

For HTTP, if you have configured a Geo IP redirect action, specify a redirect URL.

Advanced Settings

Tune Buffer Size

Adjust the value of the HTTP/HTTPS VS's connection buffer size.

  • For every session, there are two connection buffers.
  • The default size is 8030, it is not recommended that you edit it. It's hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous because it may lead to concurrent session number reduction or other unpredictable problems.

Max HTTP Headers

Adjust the max header number that HTTP/HTTPS VS can process for every request or response. If a request or response has a header over this limit, it will be dropped, and return error message 400.

  • The default value is 100, it's not recommended that you edit it. It is hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous and may lead to concurrent session number reduction or other unpredictable problems.

Response Half Closed Connection

Enable to continue to serve half-closed connections.

Predefined EXPLICIT_HTTP Profile: LB_PROF_EXPLICIT_HTTP

Parameter

Default value

Client Timeout

50

Server Timeout

50

Connect Timeout

50

Queue Timeout

50

HTTP Send Timeout

0

HTTP Request Timeout

50

HTTP Keepalive Timeout

50

Client Address

Disabled

X-Forwarded-For

Disabled

X-Forwarded-For Header

None

IP Reputation

Disabled

Decompression

None

Geo IP Blocklist

None

Geo IP Allowlist

None

Geo IP Redirect URL

http://

Tune Buffer Size

8030

Max HTTP Headers

100

Response Half Closed Connection

Disabled

Navigate back to Application Profile Types.

L7 TCP

Parameter

Description

Timeout TCP Session

Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined L7 TCP Profile: LB_PROF_L7_TCP

Parameter

Default value

Timeout TCP Session

100

IP Reputation

Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

L7 UDP

Parameter

Description

Timeout UDP Session

Client-side session timeout. The default is 100 seconds. The valid range is 1 to 86,400 seconds.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined L7 UDP Profile: LB_PROF_L7_UDP

Parameter

Default value

Timeout UDP Session

100

IP Reputation

Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

See also:

Configuring Application profiles

Configuring Application profiles

An Application Profile is a configuration object that defines how you want the FortiADC virtual server to handle traffic for specific protocols. Each Application Profile Type is compatible with specific virtual server types, load-balancing methods, and content routing types. To help you get started, FortiADC offers predefined profile configurations you can apply directly in the virtual server configuration, or use as a template to create a user-defined profile.

Before you begin:
  • You must have already created configuration objects for certificates, caching, and compression if you want the profile to use them.
  • You must have Read-Write permission for Load Balance settings.

Configuration Overview

The Application Profile configuration workflow is entirely dependent on the specific protocol. Each protocol, or Profile Type, requires its own set of parameters to be configured. The steps below outlines the basic workflow to configure a custom Application Profile.

  1. Go to Server Load Balance > Application Resources.
    The configuration page displays the Application Profile tab.
  2. Click Create New to display the configuration editor.
  3. In the Name field, specify a unique name for the custom Application Profile configuration object. Valid characters are A-Z, a-z, 0-9, _, and -. No space is allowed.
    Once saved, the name of a Application Profile configuration cannot be changed.
  4. From the Type field, select a protocol from the drop-down menu. This selection determines the parameters to configure.
    To view the configuration parameters for each protocol type, see Application Profile Types where you can navigate to the desired Profile Type.
  5. Click Save to save the configuration.

All values in the predefined profiles are view-only, and cannot be modified. However, You can clone a predefined configuration object to help you get started with a user-defined configuration.

To clone a configuration object, click the clone icon that appears in the tools column on the configuration summary page.

Application Profile Types

Each Application Profile Type requires specific parameters to be configured. FortiADC supports the following table lists of Application Profile Types and their usage and compatibilities. Use the links under the Profile Type column to navigate to the configuration parameters applicable to each Application Profile Type and view its available predefined Profile configuration.

Profile Type Usage VS Type LB Methods Persistence

TCP

Use for other TCP protocols.

Layer 4

Round Robin, Least Connection, Fastest Response, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash

Layer 2

Round Robin, Least Connection, Fastest Response, Destination IP Hash, Dynamic Load

UDP

Use with UDP servers.

Layer 4

Round Robin, Least Connection, Fastest Response, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash

Layer 2

Round Robin, Least Connection, Fastest Response, Dynamic Load, Destination IP Hash

HTTP

Use for standard, unsecured web server traffic.

Layer 7

Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash, HTTP Header Hash, HTTP Request Hash, Cookie Hash, Persistent Cookie, Insert Cookie, Embedded Cookie, Rewrite Cookie, Passive Cookie

Layer 2

Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load, Destination IP Hash

FTP

Use with FTP servers.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

Layer 4

Round Robin, Least Connection, Fastest Response, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash

RADIUS

Use with RADIUS servers.

Layer 7

Round Robin

RADIUS attribute

TCPS

Use for secured TCP when offloading TLS/SSL from the backend servers.
You must import the backend server certificates into FortiADC and select them in the TCPS profile.

Layer 7

Round Robin, Least Connection, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash, SSL Session ID

Layer 2

Round Robin, Least Connection, Destination IP Hash, Dynamic Load

HTTPS

Use for secured web server traffic when offloading TLS/SSL from the backend servers. You must import the backend server certificates into FortiADC and select them in the HTTPS profile.

Layer 7

Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash, HTTP Header Hash, HTTP Request Hash, Cookie Hash, Persistent Cookie, Insert Cookie, Embedded Cookie, Rewrite Cookie, Passive Cookie, SSL Session ID

Layer 2

Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load, Destination IP Hash

HTTP Turbo

Use for unsecured HTTP traffic that does not require advanced features like caching, compression, content rewriting, rate limiting, Geo IP blocking, or source NAT. The profile can be used with content routes and destination NAT, but the HTTP request must be in the first data packet.

This profile enables packet-based forwarding that reduces network latency and system CPU usage. However, packet-based forwarding for HTTP is advisable only when you do not anticipate dropped packets or out-of-order packets.

Layer 7

Round Robin, Least Connection, Fastest Response

Source Address

SIP

Use with applications that use Session Initiation Protocol (SIP), such as VoIP, instant messaging, and video.

Layer 7

Round Robin, URI Hash, Full URI Hash

Source Address, Source Address Hash, Source Address-Port Hash, SIP Call ID

RDP

Use with Windows Terminal Service (Remote Desktop Protocol).

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash, Source Address-Port Hash, RDP Cookie

DNS

Use with DNS servers.

Layer 7

Round Robin, Least Connection

Not supported yet.

IP

Combines with Layer 2 TCP/UDP/HTTP virtual server to balance the rest of the IP packets passed through FortiADC. When running the IP protocol 0 VS, the traffic always tries to match none protocol 0 VS first.

Layer 2

Round Robin, Dynamic Load

Source Address, Source Address Hash, Source Address-Port Hash

SMTP

Use with SMTP servers.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

MySQL

MySQL network protocol stack (such as MySQL-Proxy) which parses and builds MySQL protocol packets.

Layer 7

Round Robin, Least Connection

N/A

RTSP

A network control protocol used for establishing and controlling media sessions between end points.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

RTMP

A TCP-based protocol used for streaming audio, video, and data over the Internet.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

Diameter

A successor to RADIUS, Diameter is the next-generation Authentication, Authorization and Accounting (AAA) protocol widely used in IMS and LTE. Layer 7

Round Robin

Source Address

Diameter Session ID (default)

ISO8583

Use with ISO8583 servers.

Layer 7

Round Robin

N/A

MSSQL

MSSQL network protocol stack, which parses and builds MSSQL protocol packets.

Layer 7

Least Connection

N/A

EXPLICIT_HTTP

A simple explicit/forward HTTP proxy mode.

In this mode, you do not need to add backend real server pools. The destination IP address of the downstream is specified by the URL or Host field of the client request.

Layer 7

N/A

N/A

L7 TCP

Use for other TCP protocols.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

L7 UDP

Use with UDP servers.

Layer 7

Round Robin, Least Connection

Source Address, Source Address Hash

TCP


Parameter

Description

Timeout TCP Session

Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400.

Timeout TCP Session after FIN

Client-side connection timeout. The default is 100 seconds. The valid range is 1 to 86,400.

Timeout Send RST

Enable to send TCP RST to the client and real server when the TCP session expires. This is disabled by default.

Note: This function is supported for both IPv4 and IPv6 in L4 and L2 virtual servers. For L4 virtual servers, Timeout Sent RST is supported for DNAT/FullNAT/NAT46/NAT64 packet forwarding methods.

Client IP Insertion in TCP Option

Enable to insert the Client IP in the TCP option. This is disabled by default.

This function is applicable in Layer 4 TCP virtual servers using DNAT or Full NAT as the packet forwarding method. By inserting the Client IP in the TCP option it allows the real server to easily retrieve the client address even after the Client IP has been modified during packet forwarding.

Note:

FortiADC cannot insert the Client IP in the TCP option under the following conditions:

  • If the TCP option number already exists.

  • If the length of the TCP header will exceed 60 bytes once the client address is inserted.

Client IP Insertion in TCP Option Number

The Client IP Insertion in TCP Option Number option is available if Client IP Insertion in TCP Option is enabled.

Specify the TCP Option Number which indicates the TCP option kind to be collected. The default is 28. The valid range is 2 to 255.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined TCP Profile: LB_PROF_TCP

Parameter

Default value

Timeout TCP Session 100
Timeout TCP Session after FIN 100

Timeout Send RST

Disabled

Client IP Insertion in TCP Option

Disabled

IP Reputation Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

UDP

Parameter

Description

Stateless

Enable to apply UDP stateless function.

Timeout UDP Session

Client-side session timeout. The default is 100 seconds. The valid range is 1 to 86,400.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined UDP Profile: LB_PROF_UDP

Parameter

Default value

Timeout UDP Session 100
IP Reputation Disabled
Stateless Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

HTTP

Parameter

Description

Client Timeout

This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

Server Timeout

This timeout is counted as the amount of time when the server did not send a complete response HTTP header to the FortiADC after the FortiADC sent a request to server. If this timeout expires, FortiADC will close the server side connection and send a 503 message to the client and close the connection to the client.

Connect Timeout

This timeout is counted as the amount of time during which FortiADC tried to connect to the server with TCP SYN. After this timeout, if TCP connection is not established, FortiADC will drop this current connection to server and respond with a 503 message to client side and close the connection to the client.

Queue Timeout

This timeout is counted as the amount of time during which the request is queued in the dispatched queue. When the request cannot be dispatched to a server by a load balance method (for example, the server's connection limited is reached), it will be put into a queue. If this timeout expires, the request in the queue will be dropped and FortiADC will respond with a 503 message to client side and close the connection to the client.

HTTP Send Timeout

This timeout is counted as the amount of time it took FortiADC to send a response body data (not including the header); the time is counted starting from when the body is transferred. If this timeout expires, FortiADC will close the connection of both side.

HTTP Request Timeout

This timeout is counted as the amount of time the client did not send a complete request (including both HTTP header and request body) to FortiADC after the client connected to FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

HTTP Keepalive Timeout

This timeout is counted as the time FortiADC can wait for a new request after the previous transaction is completed. This is an idle timeout if the client does not send anything in this period. If this timeout expires, FortiADC will close the connection to the client.

Client Address

Use the original client IP address as the source address when connecting to the real server.

X-Forwarded-For

Append the client IP address found in IP layer packets to the HTTP header that you have specified in the X-Forwarded-For Header setting. If there is no existing X-Forwarded-For header, the system creates it.

If you only enable http-x-forwarded-for and do not configure http-x-forwarded-for-header, the default is to add such a header: X-Forwarded-For: <client's ip>

X-Forwarded-For Header

Specify the HTTP header to which to write the client IP address. Typically, this is the X-Forwarded-For header, but it is customizable because you might support traffic that uses different headers for this. Examples: Forwarded-For, Real-IP, or True-IP.

If http-x-forwarded-for-header <string> is configured, the added header is: <string>: <client's ip>,

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

IP Reputation Redirect URL

Type a URL including the FQDN/IP and path, if any, to which a client will be redirected if the request violates the IP reputation policy.

HTTP Mode

  • Server Close—Close the connection to the real server after each HTTP transaction.
  • Once Only— An HTTP transaction can consist of multiple HTTP requests (separate requests for an HTML page and the images contained therein, for example). To improve performance, the "once only" flag instructs the FortiADC to evaluate only the first set of headers in a connection. Subsequent requests belonging to the connection are not load balanced, but sent to the same server as the first request.
  • Keep Alive—Do not close the connection to the real server after each HTTP transaction. Instead, keep the connection between FortiADC and the real server open until the client-side connection is closed. This option is required for applications like Microsoft SharePoint.

Compression

Select a compression configuration object. See Configuring compression rules.

Decompression

Select a decompression configuration object. See Configuring decompression rules.

HTTP2

Select an HTTP2 Profile configuration object. See Configuring HTTP2 profiles.

Caching

Select a caching configuration object. See Using caching features.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Geo IP Redirect URL

For HTTP, if you have configured a Geo IP redirect action, specify a redirect URL.

Advanced Settings

Tune Buffer Size

Adjust the value of the HTTP/HTTPS VS's connection buffer size.

  • For every session, there are two connection buffers.
  • The default size is 8030, it is not recommended that you edit it. It's hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous because it may lead to concurrent session number reduction or other unpredictable problems.

Max HTTP Headers

Adjust the max header number that HTTP/HTTPS VS can process for every request or response. If a request or response has a header over this limit, it will be dropped, and return error message 400.

  • The default value is 100, it's not recommended that you edit it. It is hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous and may lead to concurrent session number reduction or other unpredictable problems.

Response Half Closed Connection

Enable to continue to serve half-closed connections.

Predefined HTTP Profiles:

LB_PROF_HTTP

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5
HTTP Request Timeout 50
HTTP Keepalive Timeout 50
Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header Blank
IP Reputation Disabled
HTTP Mode Keep Alive
Compression None
Decompression None
Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
HTTP Send Timeout 5
HTTP2 None

LB_PROF_HTTP_SERVERCLOSE

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5
HTTP Request Timeout 50
HTTP Keepalive Timeout 50

Buffer Pool

Enabled

Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header None
IP Reputation Disabled
HTTP Mode Server Close

Customized SSL Ciphers Flag

Disabled

Compression None
Decompression None
Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
HTTP Send Timeout 0
HTTP2 None

LB_PROF_HTTP2_H2C

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5

HTTP Send Timeout

0

HTTP Request Timeout 50
HTTP Keepalive Timeout 50
Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header None
IP Reputation Disabled
HTTP Mode Keep Alive
Compression None
Decompression None

HTTP2

LB_HTTP2_PROFILE_DEFAULT

Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
Tune Buffer Size 17418

Max HTTP Headers

200

Response Half Closed Connection

Disabled

Navigate back to Application Profile Types.

FTP

Parameter

Description

Timeout TCP Session

Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400.

Timeout TCP Session after FIN

Client-side connection timeout. The default is 100 seconds. The valid range is 1 to 86,400.

Client Address

Use the original client IP address as the source address when connecting to the real server.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Security Mode

Select either of the following:

  • None

  • Explicit

  • Implicit

Predefined FTP Profile: LB_PROF_FTP

Parameter

Default value

Timeout TCP Session 100
Timeout TCP Session after FIN 100
IP Reputation Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Client Address

Off

Security Mode

None

Navigate back to Application Profile Types.

RADIUS

Parameter

Description

Client Address

Use the original client IP address as the source address when connecting to the real server.

Source Port

Use the original client port as the source port when connecting to the real server.

Timeout RADIUS Session

The default is 300 seconds. The valid range is 1 to 3,600.

Dynamic Auth

Enable or disable Dynamic Authorization for RADIUS Change of Authorization (CoA).

Dynamic Auth Port

Configures the UDP port for CoA requests. The default is 3799.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined RADIUS Profile: LB_PROF_RADIUS

Parameter

Default value

Client Address Off
Source Port Off
Dynamic Auth Disabled

RADIUS Session

300

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

TCPS

Parameter

Description

Client Timeout

Client-side TCP connection timeout. The default is 50 seconds. The valid range is 1 to 3,600.

Server Timeout

Server-side IP session timeout. The default is 50 seconds. The valid range is 1 to 3,600.

Connect Timeout

Multiplexed server-side TCP connection timeout. Usually less than the client-side timeout. The default is 5 seconds. The valid range is 1 to 3,600.

Queue Timeout

Specifies how long connection requests to a backend server remain in a queue if the server has reached its maximum number of connections. If the timeout period expires before the client can connect, the system drops the connection and sends a 503 error to the client. The default is 5 seconds. The valid range is 1 to 3,600.

Client Address

Use the original client IP address as the source address in the connection to the real server.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Advanced Settings

Tune Buffer Size

Adjust the value of the TCPS VS's connection buffer size.

  • For every session, there are two connection buffers.
  • The default size is 8030, it is not recommended that you edit it. It's hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous because it may lead to concurrent session number reduction or other unpredictable problems.

Response Half Closed Connection

Enable to continue to serve half-closed connections.

Predefined TCPS Profile: LB_PROF_TCPS

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5

Queue Timeout

5

Client Address

Disabled

IP Reputation

Disabled

Geo IP Blocklist

None

Navigate back to Application Profile Types.

HTTPS

Parameter

Description

Client Timeout

This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

Server Timeout

This timeout is counted as the amount of time when the server did not send a complete response HTTP header to the FortiADC after the FortiADC sent a request to server. If this timeout expires, FortiADC will close the server side connection and send a 503 message to the client and close the connection to the client.

Connect Timeout

This timeout is counted as the amount of time during which FortiADC tried to connect to the server with TCP SYN. After this timeout, if TCP connection is not established, FortiADC will drop this current connection to server and respond with a 503 message to client side and close the connection to the client.

Queue Timeout

This timeout is counted as the amount of time during which the request is queued in the dispatched queue. When the request cannot be dispatched to a server by a load balance method (for example, the server's connection limited is reached), it will be put into a queue. If this timeout expires, the request in the queue will be dropped and FortiADC will respond with a 503 message to client side and close the connection to the client.

HTTP Send Timeout

This timeout is counted as the amount of time it took FortiADC to send a response body data (not including the header); the time is counted starting from when the body is transferred. If this timeout expires, FortiADC will close the connection of both side.

HTTP Request Timeout

This timeout is counted as the amount of time the client did not send a complete request (including both HTTP header and request body) to FortiADC after the client connected to FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

HTTP Keepalive Timeout

This timeout is counted as the time FortiADC can wait for a new request after the previous transaction is completed. This is an idle timeout if the client does not send anything in this period. If this timeout expires, FortiADC will close the connection to the client.

Client Address

Use the original client IP address as the source address when connecting to the real server.

X-Forwarded-For

Append the client IP address found in IP layer packets to the HTTP header that you have specified in the X-Forwarded-For Header setting. If there is no existing X-Forwarded-For header, the system creates it.

If you only enable http-x-forwarded-for and do not configure http-x-forwarded-for-header, the default is to add such a header: X-Forwarded-For: <client's ip>

X-Forwarded-For Header

Specify the HTTP header to which to write the client IP address. Typically, this is the X-Forwarded-For header, but it is customizable because you might support traffic that uses different headers for this. Examples: Forwarded-For, Real-IP, or True-IP.

If http-x-forwarded-for-header <string> is configured, the added header is: <string>: <client's ip>,

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

IP Reputation Redirect URL

Type a URL including the FQDN/IP and path, if any, to which a client will be redirected if the request violates the IP reputation policy.

HTTP Mode

  • Server Close—Close the connection to the real server after each HTTP transaction.
  • Once Only— An HTTP transaction can consist of multiple HTTP requests (separate requests for an HTML page and the images contained therein, for example). To improve performance, the "once only" flag instructs the FortiADC to evaluate only the first set of headers in a connection. Subsequent requests belonging to the connection are not load balanced, but sent to the same server as the first request.
  • Keep Alive—Do not close the connection to the real server after each HTTP transaction. Instead, keep the connection between FortiADC and the real server open until the client-side connection is closed. This option is required for applications like Microsoft SharePoint.

Compression

Select a compression configuration object. See Configuring compression rules.

Decompression

Select a decompression configuration object. See Configuring decompression rules.

HTTP2

Select an HTTP2 Profile configuration object. See Configuring HTTP2 profiles.

HTTP3

Select an HTTP3 Profile configuration object. See Configuring HTTP3 profiles.

Caching

Select a caching configuration object. See Using caching features.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Geo IP Redirect URL

For HTTP, if you have configured a Geo IP redirect action, specify a redirect URL.

Advanced Settings

Tune Buffer Size

Adjust the value of the HTTP/HTTPS VS's connection buffer size.

  • For every session, there are two connection buffers.
  • The default size is 8030, it is not recommended that you edit it. It's hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous because it may lead to concurrent session number reduction or other unpredictable problems.

Max HTTP Headers

Adjust the max header number that HTTP/HTTPS VS can process for every request or response. If a request or response has a header over this limit, it will be dropped, and return error message 400.

  • The default value is 100, it's not recommended that you edit it. It is hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous and may lead to concurrent session number reduction or other unpredictable problems.

Response Half Closed Connection

Enable to continue to serve half-closed connections.

Predefined HTTPS Profiles:

LB_PROF_HTTPS

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5
HTTP Request Timeout 50
HTTP Keepalive Timeout 50
Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header None
IP Reputation Disabled
HTTP Mode Keep Alive

SSL Proxy Mode

Disabled

Compression None
Decompression None
Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
HTTP Send Timeout 0
HTTP2 None

LB_PROF_HTTPS_SERVERCLOSE

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5
HTTP Request Timeout 50
HTTP Keepalive Timeout 50
Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header None
IP Reputation Disabled
HTTP Mode Server Close
Compression None
Decompression None
Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
HTTP Send Timeout 0
HTTP2 None

LB_PROF_HTTP2_H2

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5

HTTP Send Timeout

0

HTTP Request Timeout 50
HTTP Keepalive Timeout 50
Client Address Disabled
X-Forwarded-For Disabled
X-Forwarded-For Header None
IP Reputation Disabled
HTTP Mode Keep Alive
Compression None
Decompression None

HTTP2

LB_HTTP2_PROFILE_DEFAULT

Caching None
Geo IP Blocklist None
Geo IP Allowlist None
Geo IP Redirect URL http://
Tune Buffer Size 17418

Max HTTP Headers

200

Response Half Closed Connection

Disabled

LB_PROF_HTTP3

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5
Queue Timeout 5
HTTP Request Timeout 50
HTTP Keepalive Timeout 50
X-Forwarded-For Disabled
X-Forwarded-For Header None
HTTP Mode Keep Alive

HTTP3

LB_HTTP3_PROFILE_DEFAULT

Tune Buffer Size 32768

Max HTTP Headers

200

Navigate back to Application Profile Types.

HTTP Turbo

Parameter

Description

Timeout TCP Session

Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400.

Timeout TCP Session after FIN

Client-side connection timeout. The default is 100 seconds. The valid range is from 1 to 86,400.

IP Reputation

Enable to apply the FortiGuard IP reputation service.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined HTTP Turbo Profile: LB_PROF_TURBOHTTP

Parameter

Default value

Timeout TCP Session 100
Timeout TCP Session after FIN 100
IP Reputation Disabled
Geo IP Blocklist None
Geo IP Allowlist None

Navigate back to Application Profile Types.

SIP

Parameter

Description

SIP Max Size

Maximum message size. The default is 65535 bytes. The valid range is from 1 to 65,535.

Server Keepalive Timeout

Maximum wait for a new server-side request to appear. The default is 30 seconds. The valid range is 5-300.

Server Keepalive

Enable/disable a keepalive period for new server-side requests. Supports CRLF ping-pong for TCP connections. Enabled by default.

Client Keepalive

Enable/disable a keepalive period for new client-side requests. Supports CRLF ping-pong for TCP connections. Disabled by default.

Client Protocol

Client-side transport protocol:

  • TCP
  • UDP (default)

Server Protocol

Server-side transport protocol.

  • TCP
  • UDP

Default is "unset", so the client-side protocol determines the server-side protocol.

Failed Client Type

Action when the SIP client cannot be reached:

  • Drop—Drop the connection.
  • Send—Drop the connection and send a message, for example, a status code and error message.

Failed Server Type

Action when the SIP server cannot be reached:

  • Drop—Drop the connection.
  • Send—Drop the connection and send a message, for example, a status code and error message.

Insert Client IP

Enable/disable option to insert the client source IP address into the X-Forwarded-For header of the SIP request.

Client Address

Use the original client IP address as the source address in the connection to the real server.

Media Address

Change the media address of SIP payload to specified address. 0.0.0.0 is default.

Client-Request-Header-Insert (maximum 4 members)

Type

  • Insert If Not Exist—Insert before the first header only if the header is not already present.
  • Insert Always—Insert before the first header even if the header is already present.
  • Append If Not Exist—Append only if the header is not present.
  • Append Always—Append after the last header.

HeaderName:Value

The header:value pair to be inserted.

Client-Request-Header-Erase (maximum 4 members)

Type

  • All—Parse all headers for a match.
  • First—Parse the first header for a match.

HeaderName

Header to be erased.

Client-Response-Header-Insert (maximum 4 members)

Type

  • Insert If Not Exist—Insert before the first header only if the header is not already present.
  • Insert Always—Insert before the first header even if the header is already present.
  • Append If Not Exist—Append only if the header is not present.
  • Append Always—Append after the last header.

HeaderName:Value

The header:value pair to be inserted.

Client-Response-Header-Erase (maximum 4 members)

Type

  • All—Parse all headers for a match.
  • First—Parse the first header for a match.

HeaderName

Header to be erased.

Server-Request-Header-Insert (maximum 4 members)

Type

  • Insert If Not Exist—Insert before the first header only if the header is not already present.
  • Insert Always—Insert before the first header even if the header is already present.
  • Append If Not Exist—Append only if the header is not present.
  • Append Always—Append after the last header.

HeaderName:Value

The header:value pair to be inserted.

Server-Request-Header-Erase (maximum 4 members)

Type

  • All—Parse all headers for a match.
  • First—Parse the first header for a match.

HeaderName

Header to be erased.

Server-Response-Header-Insert (maximum 4 members)

Type

  • Insert If Not Exist—Insert before the first header only if the header is not already present.
  • Insert Always—Insert before the first header even if the header is already present.
  • Append If Not Exist—Append only if the header is not present.
  • Append Always—Append after the last header.

HeaderName:Value

The header:value pair to be inserted.

Server-Response-Header-Erase (maximum 4 members)

Type

  • All—Parse all headers for a match.
  • First—Parse the first header for a match.

HeaderName

Header to be erased.

Predefined SIP Profile: LB_PROF_SIP

Parameter

Default value

SIP Max Size 65535
Server Keepalive Timeout Server Keepalive Timeout
Server Keepalive Enabled
Client Keepalive Disabled
Client Protocol UDP
Server Protocol None
Failed Client Type Drop
Failed Server Type Drop
Insert Client IP Disabled
Geo IP Blocklist None
Geo IP Allowlist None
Client Address Off
Media Address 0.0.0.0

Navigate back to Application Profile Types.

RDP

Parameter

Description

Client Timeout

Client-side TCP connection timeout. The default is 50 seconds. The valid range is 1 to 3,600.

Server Timeout

Server-side IP session timeout. The default is 50 seconds. The valid range is 1 to 3,600.

Connect Timeout

Multiplexed server-side TCP connection timeout. Usually less than the client-side timeout. The default is 5 seconds. The valid range is 1 to 3,600.

Queue Timeout

Specifies how long connection requests to a backend server remain in a queue if the server has reached its maximum number of connections. If the timeout period expires before the client can connect, FortiADC drops the connection and sends a 503 error to the client. The default is 5 seconds. The valid range is 1 to 3,600.

Client Address

Use the original client IP address as the source address in the connection to the real server.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Advanced Settings

Tune Buffer Size

Adjust the value of the RDP VS's connection buffer size.

  • For every session, there are two connection buffers.
  • The default size is 8030, it is not recommended that you edit it. It's hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous because it may lead to concurrent session number reduction or other unpredictable problems.

Response Half Closed Connection

Enable to continue to serve half-closed connections.

Predefined RDP Profile: LB_PROF_RDP

Parameter

Default value

Client Timeout 50
Server Timeout 50
Connect Timeout 5

Queue Timeout

5

Source Address

Disabled

IP Reputation

Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

DNS

Parameter

Description

Client Address

Enable/disable to use the original client IP address as the source address when connecting to the real server.

DNS Cache Flag

Enable/disable the cache for the DNS virtual server.

DNS Cache Ageout Time

Specify the cache age-out time (in seconds). The default is 3,600. The valid range is 0 to 65,535.

DNS Cache Size

Specify the maximum cache size (in Megabytes). The default is 10. The valid range is 1 to 100.

DNS Cache Entry Size

Specify the maximum cache entry size. The default is 512. The valid range is 256 to 4,096.

DNS Cache Response Type

Select either of the following cache response types:

  • All Records

  • Round Robin

DNS Malform Query Action

Select either of the following reactions for the malformed requests:

  • Drop

  • Forward

DNS Max Query Length

Specify the maximum query length. The default is 512. The valid range is 256 to 4,096.

DNS Authentication Flag

Enable/disable to authenticate client by redirecting UDP query to TCP.

Predefined DNS Profile: LB_PROF_DNS

Parameter

Default value

Client Address Off
DNS Cache Flag Enabled
DNS Cache Ageout Time 3600
DNS Cache Size 10
DNS Cache Entry Size 512
DNS Cache Response Type All Records
DNS Malform Query Action Drop
DNS Max Query Length 512

DNS Authentication Flag

Disabled

Navigate back to Application Profile Types.

IP

Parameter

Description

IP Reputation

Enable to apply FortiGuard IP reputation service. IP reputation. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Timeout IP Session

Client-side session timeout. The default is 100 seconds. The valid range is 1 to 86,400.

Predefined IP Profile: LB_PROF_IP

Parameter

Default value

IP Reputation

Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Timeout IP Session

100

Navigate back to Application Profile Types.

SMTP

Parameter

Description

Client Address

Use the original client IP address as the source address in the connection to the real server.

Note: When using the NAT Source Pool for SMTP VS, ensure the SMTP application profile is disabled for Client Address. When the SMTP is enabled for Client Address, it will use the original client IP address as the source address when connecting to the real server, which cannot be done when the NAT source pool is used at the same time.

STARTTLS Active Mode

Select one of the following:

  • Allow—The client can either use or not use the STARTTLS command.
  • Required—The STARTTLS command must be used to encrypt the connection first.
  • None—The STARTTLS command is NOT supported.

Forbidden Command Status

Enable/disable to forbid the command(s) selected in Forbidden Command.

Forbidden Command

Select any, all, or none of the commands:

  • EXPN

  • TURN

  • VRFY

If selected, the command or commands will be rejected by FortiADC; otherwise, the command or commands will be accepted and forwarded to the back end.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Domain Name

Specify the domain name.

Predefined SMTP Profile: LB_PROF_SMTP

Parameter

Default value

Client Address Disable
STARTTLS Active Mode Required
Forbidden Command Status Enable
Forbidden Command EXPN, TURN, VRFY
Geo IP Blocklist None
Geo IP Allowlist None
Domain Name default.com

Navigate back to Application Profile Types.

MySQL

Parameter

Description

MySQL Mode

Select either of the following MySQL modes:

  • Single Primary — The profile will use the single-primary mode. You will then need to specify and configure the primary server and secondary servers.

  • Sharding — The profile will use the sharding mode to load-balance MySQL traffic.

For more configuration details, see Configuring MySQL profiles.

Navigate back to Application Profile Types.

RTSP

Parameter

Description

Client Address

Disabled by default. When enabled, FortiADC will use the client address to connect to the server pool.

Max Header Size

Specify the maximum size of the RTSP header. Default is 4096. Valid values range from 2048 to 65536.

Predefined RTSP Profile: LB_PROF_RTSP

Parameter

Default value

Client Address

Disabled

Max Header Size

4096

Navigate back to Application Profile Types.

RTMP

Parameter

Description

Client Address

Disabled by default. When enabled, FortiADC will use the client address to connect to the server pool.

Predefined RTMP Profile: LB_PROF_RTMP

Parameter

Default value

Client Address

Disabled

Navigate back to Application Profile Types.

Diameter

Parameter

Description

Origin Host

Specify the Origin Host.

Once defined, FortiADC will change the Origin-Host AVP of the Diameter packet.

Origin Realm

Specify the Origin Realm.

Once defined, FortiADC will change the Origin-Realm AVP of the Diameter packet.

Vendor ID

Specify the Vendor ID. Default is 0. Range is 0-2147483647.

Once defined, FortiADC will change the Vendor-ID AVP of the Diameter packet.

Product Name

Specify the Product Name.

Once defined, FortiADC will change the Product-Name AVP of the Diameter packet.

Idle Timeout

300 (seconds) by default. Valid values range from 1 to 86,400.

This refers to the built-in session ID persistence timeout.

Server Close Propagation

Disabled by default, this means that the connection on the client side stays open when the server closes the connection on its side.

Client SSL

Enable or disable Client SSL. This is disabled by default.

Predefined Diameter Profile: LB_PROF_DIAMETER

Parameter

Default value

Origin Host

Blank

Origin Realm

Blank

Vendor ID

0

Product Name

Blank

Idle Timeout

300

Server Close Propagation

Disable

Client SSL

Disable

Note: When the LB_PROF_DIAMETER profile is applied, FortiADC will not change Diameter packets except the host IP address AVP, which means that FortiADC functions as a relay agent.

Navigate back to Application Profile Types.

ISO8583

Parameter

Description

Timeout TCP Session

Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400 seconds.

Message Encode Type

Specify the encode type for protocol message:

  • ASCII

  • Binary

The default option is ASCII.

Length Indicator Type

Specify the encode type of length indicator:

  • binary

  • BCD

  • decimal-str

  • hex-str

The default option is binary.

Length Indicator Shift

Specify bytes to shift from the beginning of payload to read length value. Default is 0, range 0-32.

Length Indicator Size

Specify total bytes reading to calculate length. Default is 2, range 0-8.

Optional Header Length

Specify length of optional header before MTI, including the length-indicator. Default is 0, range 0-32.

Optional Trailer Hex

Specify hex string of optional trailer, maximum length 16, i.e. 8 bytes in binary

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined ISO8583 Profile: LB_PROF_ISO8583

Parameter

Default value

Timeout TCP Session

100

Message Encode Type

ASCII

Length Indicator Type

binary

Length Indicator Shift

0

Length Indicator Size

2

Optional Header Length

2

Optional Trailer Hex

None

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

MSSQL

Parameter

Description

Client Timeout

This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client. The default is 50 seconds. The valid range is 1 to 86,400 seconds.

Server Age

Specify the maximum inactivity time for MS SQL server on the server side.

Server Max Size

Specify the maximum connections that can connect to the MS SQL server on the server side.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

For more configuration details, see Configuring MSSQL profiles.

Navigate back to Application Profile Types.

EXPLICIT_HTTP

Parameter

Description

Client Timeout

This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

Server Timeout

This timeout is counted as the amount of time when the server did not send a complete response HTTP header to the FortiADC after the FortiADC sent a request to server. If this timeout expires, FortiADC will close the server side connection and send a 503 message to the client and close the connection to the client.

Connect Timeout

This timeout is counted as the amount of time during which FortiADC tried to connect to the server with TCP SYN. After this timeout, if TCP connection is not established, FortiADC will drop this current connection to server and respond with a 503 message to client side and close the connection to the client.

Queue Timeout

This timeout is counted as the amount of time during which the request is queued in the dispatched queue. When the request cannot be dispatched to a server by a load balance method (for example, the server's connection limited is reached), it will be put into a queue. If this timeout expires, the request in the queue will be dropped and FortiADC will respond with a 503 message to client side and close the connection to the client.

HTTP Send Timeout

This timeout is counted as the amount of time it took FortiADC to send a response body data (not including the header); the time is counted starting from when the body is transferred. If this timeout expires, FortiADC will close the connection of both side.

HTTP Request Timeout

This timeout is counted as the amount of time the client did not send a complete request (including both HTTP header and request body) to FortiADC after the client connected to FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client.

HTTP Keepalive Timeout

This timeout is counted as the time FortiADC can wait for a new request after the previous transaction is completed. This is an idle timeout if the client does not send anything in this period. If this timeout expires, FortiADC will close the connection to the client.

Client Address

Use the original client IP address as the source address when connecting to the real server.

X-Forwarded-For

Enable this option to append the client IP address found in IP layer packets to the HTTP header, for example, X-forwarded-for: 192.168.161.100.

The default header name is X-forwarded-for. If you prefer a different name, use X-Forwarded-For Header to define a custom name.

X-Forwarded-For Header

Specify a custom name for the HTTP header which carries the client IP address. Do not include the 'X-' prefix. Examples: Forwarded-For, Real-IP, or True-IP.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

IP Reputation Redirect URL

Type a URL including the FQDN/IP and path, if any, to which a client will be redirected if the request violates the IP reputation policy.

Decompression

Select a compression configuration object. See Configuring compression rules.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Geo IP Redirect URL

For HTTP, if you have configured a Geo IP redirect action, specify a redirect URL.

Advanced Settings

Tune Buffer Size

Adjust the value of the HTTP/HTTPS VS's connection buffer size.

  • For every session, there are two connection buffers.
  • The default size is 8030, it is not recommended that you edit it. It's hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous because it may lead to concurrent session number reduction or other unpredictable problems.

Max HTTP Headers

Adjust the max header number that HTTP/HTTPS VS can process for every request or response. If a request or response has a header over this limit, it will be dropped, and return error message 400.

  • The default value is 100, it's not recommended that you edit it. It is hidden in the Advance tab, and when you edit it you will get a warning message.
  • Tuning this option is dangerous and may lead to concurrent session number reduction or other unpredictable problems.

Response Half Closed Connection

Enable to continue to serve half-closed connections.

Predefined EXPLICIT_HTTP Profile: LB_PROF_EXPLICIT_HTTP

Parameter

Default value

Client Timeout

50

Server Timeout

50

Connect Timeout

50

Queue Timeout

50

HTTP Send Timeout

0

HTTP Request Timeout

50

HTTP Keepalive Timeout

50

Client Address

Disabled

X-Forwarded-For

Disabled

X-Forwarded-For Header

None

IP Reputation

Disabled

Decompression

None

Geo IP Blocklist

None

Geo IP Allowlist

None

Geo IP Redirect URL

http://

Tune Buffer Size

8030

Max HTTP Headers

100

Response Half Closed Connection

Disabled

Navigate back to Application Profile Types.

L7 TCP

Parameter

Description

Timeout TCP Session

Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined L7 TCP Profile: LB_PROF_L7_TCP

Parameter

Default value

Timeout TCP Session

100

IP Reputation

Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

L7 UDP

Parameter

Description

Timeout UDP Session

Client-side session timeout. The default is 100 seconds. The valid range is 1 to 86,400 seconds.

IP Reputation

Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings.

Geo IP Blocklist

Select a Geo IP block list configuration object. See Using the Geo IP block list.

Geo IP Allowlist

Select an allowlist configuration object. See Using the Geo IP allowlist.

Predefined L7 UDP Profile: LB_PROF_L7_UDP

Parameter

Default value

Timeout UDP Session

100

IP Reputation

Disabled

Geo IP Blocklist

None

Geo IP Allowlist

None

Navigate back to Application Profile Types.

See also: