Configuring Application profiles
An Application Profile is a configuration object that defines how you want the FortiADC virtual server to handle traffic for specific protocols. Each Application Profile Type is compatible with specific virtual server types, load-balancing methods, and content routing types. To help you get started, FortiADC offers predefined profile configurations you can apply directly in the virtual server configuration, or use as a template to create a user-defined profile.
Before you begin:
- You must have already created configuration objects for certificates, caching, and compression if you want the profile to use them.
- You must have Read-Write permission for Load Balance settings.
Configuration Overview
The Application Profile configuration workflow is entirely dependent on the specific protocol. Each protocol, or Profile Type, requires its own set of parameters to be configured. The steps below outlines the basic workflow to configure a custom Application Profile.
- Go to Server Load Balance > Application Resources.
The configuration page displays the Application Profile tab. - Click Create New to display the configuration editor.
- In the Name field, specify a unique name for the custom Application Profile configuration object. Valid characters are
A
-Z
,a
-z
,0
-9
,_
, and-
. No space is allowed.
Once saved, the name of a Application Profile configuration cannot be changed. - From the Type field, select a protocol from the drop-down menu. This selection determines the parameters to configure.
To view the configuration parameters for each protocol type, see Application Profile Types where you can navigate to the desired Profile Type. - Click Save to save the configuration.
All values in the predefined profiles are view-only, and cannot be modified. However, You can clone a predefined configuration object to help you get started with a user-defined configuration. To clone a configuration object, click the clone icon that appears in the tools column on the configuration summary page. |
Application Profile Types
Each Application Profile Type requires specific parameters to be configured. FortiADC supports the following table lists of Application Profile Types and their usage and compatibilities. Use the links under the Profile Type column to navigate to the configuration parameters applicable to each Application Profile Type and view its available predefined Profile configuration.
Profile Type | Usage | VS Type | LB Methods | Persistence |
---|---|---|---|---|
|
Use for other TCP protocols. |
Layer 4 |
Round Robin, Least Connection, Fastest Response, Dynamic Load |
Source Address, Source Address Hash, Source Address-Port Hash |
Layer 2 |
Round Robin, Least Connection, Fastest Response, Destination IP Hash, Dynamic Load |
|||
Use with UDP servers. |
Layer 4 |
Round Robin, Least Connection, Fastest Response, Dynamic Load |
Source Address, Source Address Hash, Source Address-Port Hash |
|
Layer 2 |
Round Robin, Least Connection, Fastest Response, Dynamic Load, Destination IP Hash |
|||
Use for standard, unsecured web server traffic. |
Layer 7 |
Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load |
Source Address, Source Address Hash, Source Address-Port Hash, HTTP Header Hash, HTTP Request Hash, Cookie Hash, Persistent Cookie, Insert Cookie, Embedded Cookie, Rewrite Cookie, Passive Cookie |
|
Layer 2 |
Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load, Destination IP Hash |
|||
Use with FTP servers. |
Layer 7 |
Round Robin, Least Connection |
Source Address, Source Address Hash
|
|
Layer 4 |
Round Robin, Least Connection, Fastest Response, Dynamic Load |
Source Address, Source Address Hash, Source Address-Port Hash |
||
Use with RADIUS servers. |
Layer 7 |
Round Robin |
RADIUS attribute |
|
Use for secured TCP when offloading TLS/SSL from the backend servers. |
Layer 7 |
Round Robin, Least Connection, Dynamic Load |
Source Address, Source Address Hash, Source Address-Port Hash, SSL Session ID |
|
Layer 2 |
Round Robin, Least Connection, Destination IP Hash, Dynamic Load |
|||
Use for secured web server traffic when offloading TLS/SSL from the backend servers. You must import the backend server certificates into FortiADC and select them in the HTTPS profile. |
Layer 7 |
Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load |
Source Address, Source Address Hash, Source Address-Port Hash, HTTP Header Hash, HTTP Request Hash, Cookie Hash, Persistent Cookie, Insert Cookie, Embedded Cookie, Rewrite Cookie, Passive Cookie, SSL Session ID |
|
Layer 2 |
Round Robin, Least Connection, URI Hash, Full URI Hash, Host Hash, Host Domain Hash, Dynamic Load, Destination IP Hash |
|||
Use for unsecured HTTP traffic that does not require advanced features like caching, compression, content rewriting, rate limiting, Geo IP blocking, or source NAT. The profile can be used with content routes and destination NAT, but the HTTP request must be in the first data packet. This profile enables packet-based forwarding that reduces network latency and system CPU usage. However, packet-based forwarding for HTTP is advisable only when you do not anticipate dropped packets or out-of-order packets. |
Layer 7 |
Round Robin, Least Connection, Fastest Response |
Source Address |
|
|
Use with applications that use Session Initiation Protocol (SIP), such as VoIP, instant messaging, and video. |
Layer 7 |
Round Robin, URI Hash, Full URI Hash |
Source Address, Source Address Hash, Source Address-Port Hash, SIP Call ID |
Use with Windows Terminal Service (Remote Desktop Protocol). |
Layer 7 |
Round Robin, Least Connection |
Source Address, Source Address Hash, Source Address-Port Hash, RDP Cookie | |
Use with DNS servers. |
Layer 7 |
Round Robin, Least Connection |
Not supported yet. |
|
Combines with Layer 2 TCP/UDP/HTTP virtual server to balance the rest of the IP packets passed through FortiADC. When running the IP protocol 0 VS, the traffic always tries to match none protocol 0 VS first. |
Layer 2
|
Round Robin, Dynamic Load
|
Source Address, Source Address Hash, Source Address-Port Hash
|
|
Use with SMTP servers. |
Layer 7 |
Round Robin, Least Connection |
Source Address, Source Address Hash |
|
MySQL network protocol stack (such as MySQL-Proxy) which parses and builds MySQL protocol packets. |
Layer 7
|
Round Robin, Least Connection
|
N/A |
|
A network control protocol used for establishing and controlling media sessions between end points. |
Layer 7 |
Round Robin, Least Connection |
Source Address, Source Address Hash |
|
A TCP-based protocol used for streaming audio, video, and data over the Internet. |
Layer 7 |
Round Robin, Least Connection |
Source Address, Source Address Hash |
|
A successor to RADIUS, Diameter is the next-generation Authentication, Authorization and Accounting (AAA) protocol widely used in IMS and LTE. | Layer 7 |
Round Robin |
Source Address Diameter Session ID (default) |
|
Use with ISO8583 servers. |
Layer 7 |
Round Robin |
N/A |
|
MSSQL network protocol stack, which parses and builds MSSQL protocol packets. |
Layer 7 |
Least Connection |
N/A |
|
A simple explicit/forward HTTP proxy mode. In this mode, you do not need to add backend real server pools. The destination IP address of the downstream is specified by the URL or Host field of the client request. |
Layer 7 |
N/A |
N/A |
|
Use for other TCP protocols. |
Layer 7 |
Round Robin, Least Connection |
Source Address, Source Address Hash |
|
Use with UDP servers. |
Layer 7 |
Round Robin, Least Connection |
Source Address, Source Address Hash |
TCP
Parameter |
Description |
---|---|
Timeout TCP Session |
Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400. |
Timeout TCP Session after FIN |
Client-side connection timeout. The default is 100 seconds. The valid range is 1 to 86,400. |
Timeout Send RST |
Enable to send TCP RST to the client and real server when the TCP session expires. This is disabled by default. Note: This function is supported for both IPv4 and IPv6 in L4 and L2 virtual servers. For L4 virtual servers, Timeout Sent RST is supported for DNAT/FullNAT/NAT46/NAT64 packet forwarding methods. |
Client IP Insertion in TCP Option |
Enable to insert the Client IP in the TCP option. This is disabled by default. This function is applicable in Layer 4 TCP virtual servers using DNAT or Full NAT as the packet forwarding method. By inserting the Client IP in the TCP option it allows the real server to easily retrieve the client address even after the Client IP has been modified during packet forwarding. Note: FortiADC cannot insert the Client IP in the TCP option under the following conditions:
|
Client IP Insertion in TCP Option Number |
The Client IP Insertion in TCP Option Number option is available if Client IP Insertion in TCP Option is enabled. Specify the TCP Option Number which indicates the TCP option kind to be collected. The default is 28. The valid range is 2 to 255. |
IP Reputation |
Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Predefined TCP Profile: LB_PROF_TCP
Parameter |
Default value |
---|---|
Timeout TCP Session | 100 |
Timeout TCP Session after FIN | 100 |
Timeout Send RST |
Disabled |
Client IP Insertion in TCP Option |
Disabled |
IP Reputation | Disabled |
Geo IP Blocklist |
None |
Geo IP Allowlist |
None |
Navigate back to Application Profile Types.
UDP
Parameter |
Description |
---|---|
Stateless |
Enable to apply UDP stateless function. |
Timeout UDP Session |
Client-side session timeout. The default is 100 seconds. The valid range is 1 to 86,400. |
IP Reputation |
Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Predefined UDP Profile: LB_PROF_UDP
Parameter |
Default value |
---|---|
Timeout UDP Session | 100 |
IP Reputation | Disabled |
Stateless | Disabled |
Geo IP Blocklist |
None |
Geo IP Allowlist |
None |
Navigate back to Application Profile Types.
HTTP
Parameter |
Description |
---|---|
Client Timeout |
This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client. |
Server Timeout |
This timeout is counted as the amount of time when the server did not send a complete response HTTP header to the FortiADC after the FortiADC sent a request to server. If this timeout expires, FortiADC will close the server side connection and send a 503 message to the client and close the connection to the client. |
Connect Timeout |
This timeout is counted as the amount of time during which FortiADC tried to connect to the server with TCP SYN. After this timeout, if TCP connection is not established, FortiADC will drop this current connection to server and respond with a 503 message to client side and close the connection to the client. |
Queue Timeout |
This timeout is counted as the amount of time during which the request is queued in the dispatched queue. When the request cannot be dispatched to a server by a load balance method (for example, the server's connection limited is reached), it will be put into a queue. If this timeout expires, the request in the queue will be dropped and FortiADC will respond with a 503 message to client side and close the connection to the client. |
HTTP Send Timeout |
This timeout is counted as the amount of time it took FortiADC to send a response body data (not including the header); the time is counted starting from when the body is transferred. If this timeout expires, FortiADC will close the connection of both side. |
HTTP Request Timeout |
This timeout is counted as the amount of time the client did not send a complete request (including both HTTP header and request body) to FortiADC after the client connected to FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client. |
HTTP Keepalive Timeout |
This timeout is counted as the time FortiADC can wait for a new request after the previous transaction is completed. This is an idle timeout if the client does not send anything in this period. If this timeout expires, FortiADC will close the connection to the client. |
Client Address |
Use the original client IP address as the source address when connecting to the real server. |
X-Forwarded-For |
Append the client IP address found in IP layer packets to the HTTP header that you have specified in the X-Forwarded-For Header setting. If there is no existing X-Forwarded-For header, the system creates it. If you only enable http-x-forwarded-for and do not configure http-x-forwarded-for-header, the default is to add such a header: X-Forwarded-For: <client's ip> |
X-Forwarded-For Header |
Specify the HTTP header to which to write the client IP address. Typically, this is the X-Forwarded-For header, but it is customizable because you might support traffic that uses different headers for this. Examples: Forwarded-For, Real-IP, or True-IP. If http-x-forwarded-for-header <string> is configured, the added header is: <string>: <client's ip>, |
IP Reputation |
Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings. |
IP Reputation Redirect URL |
Type a URL including the FQDN/IP and path, if any, to which a client will be redirected if the request violates the IP reputation policy. |
HTTP Mode |
|
Compression |
Select a compression configuration object. See Configuring compression rules. |
Decompression |
Select a decompression configuration object. See Configuring decompression rules. |
HTTP2 |
Select an HTTP2 Profile configuration object. See Configuring HTTP2 profiles. |
Caching |
Select a caching configuration object. See Using caching features. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Geo IP Redirect URL |
For HTTP, if you have configured a Geo IP redirect action, specify a redirect URL. |
Advanced Settings |
|
Tune Buffer Size |
Adjust the value of the HTTP/HTTPS VS's connection buffer size.
|
Max HTTP Headers |
Adjust the max header number that HTTP/HTTPS VS can process for every request or response. If a request or response has a header over this limit, it will be dropped, and return error message 400.
|
Response Half Closed Connection |
Enable to continue to serve half-closed connections. |
Predefined HTTP Profiles:
LB_PROF_HTTP
Parameter |
Default value |
---|---|
Client Timeout | 50 |
Server Timeout | 50 |
Connect Timeout | 5 |
Queue Timeout | 5 |
HTTP Request Timeout | 50 |
HTTP Keepalive Timeout | 50 |
Client Address | Disabled |
X-Forwarded-For | Disabled |
X-Forwarded-For Header | Blank |
IP Reputation | Disabled |
HTTP Mode | Keep Alive |
Compression | None |
Decompression | None |
Caching | None |
Geo IP Blocklist | None |
Geo IP Allowlist | None |
Geo IP Redirect URL | http:// |
HTTP Send Timeout | 5 |
HTTP2 | None |
LB_PROF_HTTP_SERVERCLOSE
Parameter |
Default value |
---|---|
Client Timeout | 50 |
Server Timeout | 50 |
Connect Timeout | 5 |
Queue Timeout | 5 |
HTTP Request Timeout | 50 |
HTTP Keepalive Timeout | 50 |
Buffer Pool |
Enabled |
Client Address | Disabled |
X-Forwarded-For | Disabled |
X-Forwarded-For Header | None |
IP Reputation | Disabled |
HTTP Mode | Server Close |
Customized SSL Ciphers Flag |
Disabled |
Compression | None |
Decompression | None |
Caching | None |
Geo IP Blocklist | None |
Geo IP Allowlist | None |
Geo IP Redirect URL | http:// |
HTTP Send Timeout | 0 |
HTTP2 | None |
LB_PROF_HTTP2_H2C
Parameter |
Default value |
---|---|
Client Timeout | 50 |
Server Timeout | 50 |
Connect Timeout | 5 |
Queue Timeout | 5 |
HTTP Send Timeout |
0 |
HTTP Request Timeout | 50 |
HTTP Keepalive Timeout | 50 |
Client Address | Disabled |
X-Forwarded-For | Disabled |
X-Forwarded-For Header | None |
IP Reputation | Disabled |
HTTP Mode | Keep Alive |
Compression | None |
Decompression | None |
HTTP2 |
LB_HTTP2_PROFILE_DEFAULT |
Caching | None |
Geo IP Blocklist | None |
Geo IP Allowlist | None |
Geo IP Redirect URL | http:// |
Tune Buffer Size | 17418 |
Max HTTP Headers |
200 |
Response Half Closed Connection |
Disabled |
Navigate back to Application Profile Types.
FTP
Parameter |
Description |
---|---|
Timeout TCP Session |
Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400. |
Timeout TCP Session after FIN |
Client-side connection timeout. The default is 100 seconds. The valid range is 1 to 86,400. |
Client Address |
Use the original client IP address as the source address when connecting to the real server. |
IP Reputation |
Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Security Mode |
Select either of the following:
|
Predefined FTP Profile: LB_PROF_FTP
Parameter |
Default value |
---|---|
Timeout TCP Session | 100 |
Timeout TCP Session after FIN | 100 |
IP Reputation | Disabled |
Geo IP Blocklist |
None |
Geo IP Allowlist |
None |
Client Address |
Off |
Security Mode |
None |
Navigate back to Application Profile Types.
RADIUS
Parameter |
Description |
---|---|
Client Address |
Use the original client IP address as the source address when connecting to the real server. |
Source Port |
Use the original client port as the source port when connecting to the real server. |
Timeout RADIUS Session |
The default is 300 seconds. The valid range is 1 to 3,600. |
Dynamic Auth |
Enable or disable Dynamic Authorization for RADIUS Change of Authorization (CoA). |
Dynamic Auth Port |
Configures the UDP port for CoA requests. The default is 3799. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Predefined RADIUS Profile: LB_PROF_RADIUS
Parameter |
Default value |
---|---|
Client Address | Off |
Source Port | Off |
Dynamic Auth | Disabled |
RADIUS Session |
300 |
Geo IP Blocklist |
None |
Geo IP Allowlist |
None |
Navigate back to Application Profile Types.
TCPS
Parameter |
Description |
---|---|
Client Timeout |
Client-side TCP connection timeout. The default is 50 seconds. The valid range is 1 to 3,600. |
Server Timeout |
Server-side IP session timeout. The default is 50 seconds. The valid range is 1 to 3,600. |
Connect Timeout |
Multiplexed server-side TCP connection timeout. Usually less than the client-side timeout. The default is 5 seconds. The valid range is 1 to 3,600. |
Queue Timeout |
Specifies how long connection requests to a backend server remain in a queue if the server has reached its maximum number of connections. If the timeout period expires before the client can connect, the system drops the connection and sends a 503 error to the client. The default is 5 seconds. The valid range is 1 to 3,600. |
Client Address |
Use the original client IP address as the source address in the connection to the real server. |
IP Reputation |
Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Advanced Settings | |
Tune Buffer Size |
Adjust the value of the TCPS VS's connection buffer size.
|
Response Half Closed Connection |
Enable to continue to serve half-closed connections. |
Predefined TCPS Profile: LB_PROF_TCPS
Parameter |
Default value |
---|---|
Client Timeout | 50 |
Server Timeout | 50 |
Connect Timeout | 5 |
Queue Timeout |
5 |
Client Address |
Disabled |
IP Reputation |
Disabled |
Geo IP Blocklist |
None |
Navigate back to Application Profile Types.
HTTPS
Parameter |
Description |
---|---|
Client Timeout |
This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client. |
Server Timeout |
This timeout is counted as the amount of time when the server did not send a complete response HTTP header to the FortiADC after the FortiADC sent a request to server. If this timeout expires, FortiADC will close the server side connection and send a 503 message to the client and close the connection to the client. |
Connect Timeout |
This timeout is counted as the amount of time during which FortiADC tried to connect to the server with TCP SYN. After this timeout, if TCP connection is not established, FortiADC will drop this current connection to server and respond with a 503 message to client side and close the connection to the client. |
Queue Timeout |
This timeout is counted as the amount of time during which the request is queued in the dispatched queue. When the request cannot be dispatched to a server by a load balance method (for example, the server's connection limited is reached), it will be put into a queue. If this timeout expires, the request in the queue will be dropped and FortiADC will respond with a 503 message to client side and close the connection to the client. |
HTTP Send Timeout |
This timeout is counted as the amount of time it took FortiADC to send a response body data (not including the header); the time is counted starting from when the body is transferred. If this timeout expires, FortiADC will close the connection of both side. |
HTTP Request Timeout |
This timeout is counted as the amount of time the client did not send a complete request (including both HTTP header and request body) to FortiADC after the client connected to FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client. |
HTTP Keepalive Timeout |
This timeout is counted as the time FortiADC can wait for a new request after the previous transaction is completed. This is an idle timeout if the client does not send anything in this period. If this timeout expires, FortiADC will close the connection to the client. |
Client Address |
Use the original client IP address as the source address when connecting to the real server. |
X-Forwarded-For |
Append the client IP address found in IP layer packets to the HTTP header that you have specified in the X-Forwarded-For Header setting. If there is no existing X-Forwarded-For header, the system creates it. If you only enable http-x-forwarded-for and do not configure http-x-forwarded-for-header, the default is to add such a header: X-Forwarded-For: <client's ip> |
X-Forwarded-For Header |
Specify the HTTP header to which to write the client IP address. Typically, this is the X-Forwarded-For header, but it is customizable because you might support traffic that uses different headers for this. Examples: Forwarded-For, Real-IP, or True-IP. If http-x-forwarded-for-header <string> is configured, the added header is: <string>: <client's ip>, |
IP Reputation |
Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings. |
IP Reputation Redirect URL |
Type a URL including the FQDN/IP and path, if any, to which a client will be redirected if the request violates the IP reputation policy. |
HTTP Mode |
|
Compression |
Select a compression configuration object. See Configuring compression rules. |
Decompression |
Select a decompression configuration object. See Configuring decompression rules. |
HTTP2 |
Select an HTTP2 Profile configuration object. See Configuring HTTP2 profiles. |
HTTP3 |
Select an HTTP3 Profile configuration object. See Configuring HTTP3 profiles. |
Caching |
Select a caching configuration object. See Using caching features. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Geo IP Redirect URL |
For HTTP, if you have configured a Geo IP redirect action, specify a redirect URL. |
Advanced Settings |
|
Tune Buffer Size |
Adjust the value of the HTTP/HTTPS VS's connection buffer size.
|
Max HTTP Headers |
Adjust the max header number that HTTP/HTTPS VS can process for every request or response. If a request or response has a header over this limit, it will be dropped, and return error message 400.
|
Response Half Closed Connection |
Enable to continue to serve half-closed connections. |
Predefined HTTPS Profiles:
LB_PROF_HTTPS
Parameter |
Default value |
---|---|
Client Timeout | 50 |
Server Timeout | 50 |
Connect Timeout | 5 |
Queue Timeout | 5 |
HTTP Request Timeout | 50 |
HTTP Keepalive Timeout | 50 |
Client Address | Disabled |
X-Forwarded-For | Disabled |
X-Forwarded-For Header | None |
IP Reputation | Disabled |
HTTP Mode | Keep Alive |
SSL Proxy Mode |
Disabled |
Compression | None |
Decompression | None |
Caching | None |
Geo IP Blocklist | None |
Geo IP Allowlist | None |
Geo IP Redirect URL | http:// |
HTTP Send Timeout | 0 |
HTTP2 | None |
LB_PROF_HTTPS_SERVERCLOSE
Parameter |
Default value |
---|---|
Client Timeout | 50 |
Server Timeout | 50 |
Connect Timeout | 5 |
Queue Timeout | 5 |
HTTP Request Timeout | 50 |
HTTP Keepalive Timeout | 50 |
Client Address | Disabled |
X-Forwarded-For | Disabled |
X-Forwarded-For Header | None |
IP Reputation | Disabled |
HTTP Mode | Server Close |
Compression | None |
Decompression | None |
Caching | None |
Geo IP Blocklist | None |
Geo IP Allowlist | None |
Geo IP Redirect URL | http:// |
HTTP Send Timeout | 0 |
HTTP2 | None |
LB_PROF_HTTP2_H2
Parameter |
Default value |
---|---|
Client Timeout | 50 |
Server Timeout | 50 |
Connect Timeout | 5 |
Queue Timeout | 5 |
HTTP Send Timeout |
0 |
HTTP Request Timeout | 50 |
HTTP Keepalive Timeout | 50 |
Client Address | Disabled |
X-Forwarded-For | Disabled |
X-Forwarded-For Header | None |
IP Reputation | Disabled |
HTTP Mode | Keep Alive |
Compression | None |
Decompression | None |
HTTP2 |
LB_HTTP2_PROFILE_DEFAULT |
Caching | None |
Geo IP Blocklist | None |
Geo IP Allowlist | None |
Geo IP Redirect URL | http:// |
Tune Buffer Size | 17418 |
Max HTTP Headers |
200 |
Response Half Closed Connection |
Disabled |
LB_PROF_HTTP3
Parameter |
Default value |
---|---|
Client Timeout | 50 |
Server Timeout | 50 |
Connect Timeout | 5 |
Queue Timeout | 5 |
HTTP Request Timeout | 50 |
HTTP Keepalive Timeout | 50 |
X-Forwarded-For | Disabled |
X-Forwarded-For Header | None |
HTTP Mode | Keep Alive |
HTTP3 |
LB_HTTP3_PROFILE_DEFAULT |
Tune Buffer Size | 32768 |
Max HTTP Headers |
200 |
Navigate back to Application Profile Types.
HTTP Turbo
Parameter |
Description |
---|---|
Timeout TCP Session |
Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400. |
Timeout TCP Session after FIN |
Client-side connection timeout. The default is 100 seconds. The valid range is from 1 to 86,400. |
IP Reputation |
Enable to apply the FortiGuard IP reputation service. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Predefined HTTP Turbo Profile: LB_PROF_TURBOHTTP
Parameter |
Default value |
---|---|
Timeout TCP Session | 100 |
Timeout TCP Session after FIN | 100 |
IP Reputation | Disabled |
Geo IP Blocklist | None |
Geo IP Allowlist | None |
Navigate back to Application Profile Types.
SIP
Parameter |
Description |
---|---|
SIP Max Size |
Maximum message size. The default is 65535 bytes. The valid range is from 1 to 65,535. |
Server Keepalive Timeout |
Maximum wait for a new server-side request to appear. The default is 30 seconds. The valid range is 5-300. |
Server Keepalive |
Enable/disable a keepalive period for new server-side requests. Supports CRLF ping-pong for TCP connections. Enabled by default. |
Client Keepalive |
Enable/disable a keepalive period for new client-side requests. Supports CRLF ping-pong for TCP connections. Disabled by default. |
Client Protocol |
Client-side transport protocol:
|
Server Protocol |
Server-side transport protocol.
Default is "unset", so the client-side protocol determines the server-side protocol. |
Failed Client Type |
Action when the SIP client cannot be reached:
|
Failed Server Type |
Action when the SIP server cannot be reached:
|
Insert Client IP |
Enable/disable option to insert the client source IP address into the X-Forwarded-For header of the SIP request. |
Client Address |
Use the original client IP address as the source address in the connection to the real server. |
Media Address |
Change the media address of SIP payload to specified address. 0.0.0.0 is default. |
Client-Request-Header-Insert (maximum 4 members) |
|
Type |
|
HeaderName:Value |
The header:value pair to be inserted. |
Client-Request-Header-Erase (maximum 4 members) |
|
Type |
|
HeaderName |
Header to be erased. |
Client-Response-Header-Insert (maximum 4 members) |
|
Type |
|
HeaderName:Value |
The header:value pair to be inserted. |
Client-Response-Header-Erase (maximum 4 members) |
|
Type |
|
HeaderName |
Header to be erased. |
Server-Request-Header-Insert (maximum 4 members) |
|
Type |
|
HeaderName:Value |
The header:value pair to be inserted. |
Server-Request-Header-Erase (maximum 4 members) |
|
Type |
|
HeaderName |
Header to be erased. |
Server-Response-Header-Insert (maximum 4 members) |
|
Type |
|
HeaderName:Value |
The header:value pair to be inserted. |
Server-Response-Header-Erase (maximum 4 members) |
|
Type |
|
HeaderName |
Header to be erased. |
Predefined SIP Profile: LB_PROF_SIP
Parameter |
Default value |
---|---|
SIP Max Size | 65535 |
Server Keepalive Timeout | Server Keepalive Timeout |
Server Keepalive | Enabled |
Client Keepalive | Disabled |
Client Protocol | UDP |
Server Protocol | None |
Failed Client Type | Drop |
Failed Server Type | Drop |
Insert Client IP | Disabled |
Geo IP Blocklist | None |
Geo IP Allowlist | None |
Client Address | Off |
Media Address | 0.0.0.0 |
Navigate back to Application Profile Types.
RDP
Parameter |
Description |
---|---|
Client Timeout |
Client-side TCP connection timeout. The default is 50 seconds. The valid range is 1 to 3,600. |
Server Timeout |
Server-side IP session timeout. The default is 50 seconds. The valid range is 1 to 3,600. |
Connect Timeout |
Multiplexed server-side TCP connection timeout. Usually less than the client-side timeout. The default is 5 seconds. The valid range is 1 to 3,600. |
Queue Timeout |
Specifies how long connection requests to a backend server remain in a queue if the server has reached its maximum number of connections. If the timeout period expires before the client can connect, FortiADC drops the connection and sends a 503 error to the client. The default is 5 seconds. The valid range is 1 to 3,600. |
Client Address |
Use the original client IP address as the source address in the connection to the real server. |
IP Reputation |
Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Advanced Settings | |
Tune Buffer Size |
Adjust the value of the RDP VS's connection buffer size.
|
Response Half Closed Connection |
Enable to continue to serve half-closed connections. |
Predefined RDP Profile: LB_PROF_RDP
Parameter |
Default value |
---|---|
Client Timeout | 50 |
Server Timeout | 50 |
Connect Timeout | 5 |
Queue Timeout |
5 |
Source Address |
Disabled |
IP Reputation |
Disabled |
Geo IP Blocklist |
None |
Geo IP Allowlist |
None |
Navigate back to Application Profile Types.
DNS
Parameter |
Description |
---|---|
Client Address |
Enable/disable to use the original client IP address as the source address when connecting to the real server. |
DNS Cache Flag |
Enable/disable the cache for the DNS virtual server. |
DNS Cache Ageout Time |
Specify the cache age-out time (in seconds). The default is 3,600. The valid range is 0 to 65,535. |
DNS Cache Size |
Specify the maximum cache size (in Megabytes). The default is 10. The valid range is 1 to 100. |
DNS Cache Entry Size |
Specify the maximum cache entry size. The default is 512. The valid range is 256 to 4,096. |
DNS Cache Response Type |
Select either of the following cache response types:
|
DNS Malform Query Action |
Select either of the following reactions for the malformed requests:
|
DNS Max Query Length |
Specify the maximum query length. The default is 512. The valid range is 256 to 4,096. |
DNS Authentication Flag |
Enable/disable to authenticate client by redirecting UDP query to TCP. |
Predefined DNS Profile: LB_PROF_DNS
Parameter |
Default value |
---|---|
Client Address | Off |
DNS Cache Flag | Enabled |
DNS Cache Ageout Time | 3600 |
DNS Cache Size | 10 |
DNS Cache Entry Size | 512 |
DNS Cache Response Type | All Records |
DNS Malform Query Action | Drop |
DNS Max Query Length | 512 |
DNS Authentication Flag |
Disabled |
Navigate back to Application Profile Types.
IP
Parameter |
Description |
---|---|
IP Reputation |
Enable to apply FortiGuard IP reputation service. IP reputation. See Managing IP Reputation policy settings. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Timeout IP Session |
Client-side session timeout. The default is 100 seconds. The valid range is 1 to 86,400. |
Predefined IP Profile: LB_PROF_IP
Parameter |
Default value |
---|---|
IP Reputation |
Disabled |
Geo IP Blocklist |
None |
Geo IP Allowlist |
None |
Timeout IP Session |
100 |
Navigate back to Application Profile Types.
SMTP
Parameter |
Description |
---|---|
Client Address |
Use the original client IP address as the source address in the connection to the real server. Note: When using the NAT Source Pool for SMTP VS, ensure the SMTP application profile is disabled for Client Address. When the SMTP is enabled for Client Address, it will use the original client IP address as the source address when connecting to the real server, which cannot be done when the NAT source pool is used at the same time. |
STARTTLS Active Mode |
Select one of the following:
|
Forbidden Command Status |
Enable/disable to forbid the command(s) selected in Forbidden Command. |
Forbidden Command |
Select any, all, or none of the commands:
If selected, the command or commands will be rejected by FortiADC; otherwise, the command or commands will be accepted and forwarded to the back end. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Domain Name |
Specify the domain name. |
Predefined SMTP Profile: LB_PROF_SMTP
Parameter |
Default value |
---|---|
Client Address | Disable |
STARTTLS Active Mode | Required |
Forbidden Command Status | Enable |
Forbidden Command | EXPN, TURN, VRFY |
Geo IP Blocklist | None |
Geo IP Allowlist | None |
Domain Name | default.com |
Navigate back to Application Profile Types.
MySQL
Parameter |
Description |
---|---|
MySQL Mode |
Select either of the following MySQL modes:
|
For more configuration details, see Configuring MySQL profiles.
Navigate back to Application Profile Types.
RTSP
Parameter |
Description |
---|---|
Client Address |
Disabled by default. When enabled, FortiADC will use the client address to connect to the server pool. |
Max Header Size |
Specify the maximum size of the RTSP header. Default is 4096. Valid values range from 2048 to 65536. |
Predefined RTSP Profile: LB_PROF_RTSP
Parameter |
Default value |
---|---|
Client Address |
Disabled |
Max Header Size |
4096 |
Navigate back to Application Profile Types.
RTMP
Parameter |
Description |
---|---|
Client Address |
Disabled by default. When enabled, FortiADC will use the client address to connect to the server pool. |
Predefined RTMP Profile: LB_PROF_RTMP
Parameter |
Default value |
---|---|
Client Address |
Disabled |
Navigate back to Application Profile Types.
Diameter
Parameter |
Description |
---|---|
Origin Host |
Specify the Origin Host. Once defined, FortiADC will change the Origin-Host AVP of the Diameter packet. |
Origin Realm |
Specify the Origin Realm. Once defined, FortiADC will change the Origin-Realm AVP of the Diameter packet. |
Vendor ID |
Specify the Vendor ID. Default is 0. Range is 0-2147483647. Once defined, FortiADC will change the Vendor-ID AVP of the Diameter packet. |
Product Name |
Specify the Product Name. Once defined, FortiADC will change the Product-Name AVP of the Diameter packet. |
Idle Timeout |
300 (seconds) by default. Valid values range from 1 to 86,400. This refers to the built-in session ID persistence timeout. |
Server Close Propagation |
Disabled by default, this means that the connection on the client side stays open when the server closes the connection on its side. |
Client SSL |
Enable or disable Client SSL. This is disabled by default. |
Predefined Diameter Profile: LB_PROF_DIAMETER
Parameter |
Default value |
---|---|
Origin Host |
Blank |
Origin Realm |
Blank |
Vendor ID |
0 |
Product Name |
Blank |
Idle Timeout |
300 |
Server Close Propagation |
Disable |
Client SSL |
Disable |
Note: When the LB_PROF_DIAMETER profile is applied, FortiADC will not change Diameter packets except the host IP address AVP, which means that FortiADC functions as a relay agent.
Navigate back to Application Profile Types.
ISO8583
Parameter |
Description |
---|---|
Timeout TCP Session |
Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400 seconds. |
Message Encode Type |
Specify the encode type for protocol message:
The default option is ASCII. |
Length Indicator Type |
Specify the encode type of length indicator:
The default option is binary. |
Length Indicator Shift |
Specify bytes to shift from the beginning of payload to read length value. Default is 0, range 0-32. |
Length Indicator Size |
Specify total bytes reading to calculate length. Default is 2, range 0-8. |
Optional Header Length |
Specify length of optional header before MTI, including the length-indicator. Default is 0, range 0-32. |
Optional Trailer Hex |
Specify hex string of optional trailer, maximum length 16, i.e. 8 bytes in binary |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Predefined ISO8583 Profile: LB_PROF_ISO8583
Parameter |
Default value |
---|---|
Timeout TCP Session |
100 |
Message Encode Type |
ASCII |
Length Indicator Type |
binary |
Length Indicator Shift |
0 |
Length Indicator Size |
2 |
Optional Header Length |
2 |
Optional Trailer Hex |
None |
Geo IP Blocklist |
None |
Geo IP Allowlist |
None |
Navigate back to Application Profile Types.
MSSQL
Parameter |
Description |
---|---|
Client Timeout |
This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client. The default is 50 seconds. The valid range is 1 to 86,400 seconds. |
Server Age |
Specify the maximum inactivity time for MS SQL server on the server side. |
Server Max Size |
Specify the maximum connections that can connect to the MS SQL server on the server side. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
For more configuration details, see Configuring MSSQL profiles.
Navigate back to Application Profile Types.
EXPLICIT_HTTP
Parameter |
Description |
---|---|
Client Timeout |
This timeout is counted as the amount of time when the client did not send a complete request HTTP header to the FortiADC after the client connected to the FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client. |
Server Timeout |
This timeout is counted as the amount of time when the server did not send a complete response HTTP header to the FortiADC after the FortiADC sent a request to server. If this timeout expires, FortiADC will close the server side connection and send a 503 message to the client and close the connection to the client. |
Connect Timeout |
This timeout is counted as the amount of time during which FortiADC tried to connect to the server with TCP SYN. After this timeout, if TCP connection is not established, FortiADC will drop this current connection to server and respond with a 503 message to client side and close the connection to the client. |
Queue Timeout |
This timeout is counted as the amount of time during which the request is queued in the dispatched queue. When the request cannot be dispatched to a server by a load balance method (for example, the server's connection limited is reached), it will be put into a queue. If this timeout expires, the request in the queue will be dropped and FortiADC will respond with a 503 message to client side and close the connection to the client. |
HTTP Send Timeout |
This timeout is counted as the amount of time it took FortiADC to send a response body data (not including the header); the time is counted starting from when the body is transferred. If this timeout expires, FortiADC will close the connection of both side. |
HTTP Request Timeout |
This timeout is counted as the amount of time the client did not send a complete request (including both HTTP header and request body) to FortiADC after the client connected to FortiADC. If this timeout expires, FortiADC will send a 408 message to client and close the connection to the client. |
HTTP Keepalive Timeout |
This timeout is counted as the time FortiADC can wait for a new request after the previous transaction is completed. This is an idle timeout if the client does not send anything in this period. If this timeout expires, FortiADC will close the connection to the client. |
Client Address |
Use the original client IP address as the source address when connecting to the real server. |
X-Forwarded-For |
Enable this option to append the client IP address found in IP layer packets to the HTTP header, for example, The default header name is |
X-Forwarded-For Header |
Specify a custom name for the HTTP header which carries the client IP address. Do not include the 'X-' prefix. Examples: Forwarded-For, Real-IP, or True-IP. |
IP Reputation |
Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings. |
IP Reputation Redirect URL |
Type a URL including the FQDN/IP and path, if any, to which a client will be redirected if the request violates the IP reputation policy. |
Decompression |
Select a compression configuration object. See Configuring compression rules. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Geo IP Redirect URL |
For HTTP, if you have configured a Geo IP redirect action, specify a redirect URL. |
Advanced Settings |
|
Tune Buffer Size |
Adjust the value of the HTTP/HTTPS VS's connection buffer size.
|
Max HTTP Headers |
Adjust the max header number that HTTP/HTTPS VS can process for every request or response. If a request or response has a header over this limit, it will be dropped, and return error message 400.
|
Response Half Closed Connection |
Enable to continue to serve half-closed connections. |
Predefined EXPLICIT_HTTP Profile: LB_PROF_EXPLICIT_HTTP
Parameter |
Default value |
---|---|
Client Timeout |
50 |
Server Timeout |
50 |
Connect Timeout |
50 |
Queue Timeout |
50 |
HTTP Send Timeout |
0 |
HTTP Request Timeout |
50 |
HTTP Keepalive Timeout |
50 |
Client Address |
Disabled |
X-Forwarded-For |
Disabled |
X-Forwarded-For Header |
None |
IP Reputation |
Disabled |
Decompression |
None |
Geo IP Blocklist |
None |
Geo IP Allowlist |
None |
Geo IP Redirect URL |
http:// |
Tune Buffer Size |
8030 |
Max HTTP Headers |
100 |
Response Half Closed Connection |
Disabled |
Navigate back to Application Profile Types.
L7 TCP
Parameter |
Description |
---|---|
Timeout TCP Session |
Client-side timeout for connections where the client has not sent a FIN signal, but the connection has been idle. The default is 100 seconds. The valid range is 1 to 86,400. |
IP Reputation |
Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Predefined L7 TCP Profile: LB_PROF_L7_TCP
Parameter |
Default value |
---|---|
Timeout TCP Session |
100 |
IP Reputation |
Disabled |
Geo IP Blocklist |
None |
Geo IP Allowlist |
None |
Navigate back to Application Profile Types.
L7 UDP
Parameter |
Description |
---|---|
Timeout UDP Session |
Client-side session timeout. The default is 100 seconds. The valid range is 1 to 86,400 seconds. |
IP Reputation |
Enable to apply the FortiGuard IP reputation service. See Managing IP Reputation policy settings. |
Geo IP Blocklist |
Select a Geo IP block list configuration object. See Using the Geo IP block list. |
Geo IP Allowlist |
Select an allowlist configuration object. See Using the Geo IP allowlist. |
Predefined L7 UDP Profile: LB_PROF_L7_UDP
Parameter |
Default value |
---|---|
Timeout UDP Session |
100 |
IP Reputation |
Disabled |
Geo IP Blocklist |
None |
Geo IP Allowlist |
None |
Navigate back to Application Profile Types.