Fortinet white logo
Fortinet white logo

User Guide

Maximum configuration values

Maximum configuration values

The following table provides the maximum number of configuration objects in each application.

Application item

Maximum value

Logs > attack log servers

2

Network > origin servers

32

Network > Endpoint > Custom Certificate

32

Network > Endpoint > Intermediate Certificate

32

Network > Endpoint > Domains

10

Security Rules > Known Attack > Exception rules

128

Security Rules > Anomaly Detection > Source IP List

No Limit

Security Rules > Information Leakage > Exception rules

128

Security Rules > Cookie Security > Except Cookies

64

Client Security > CSRF Protection > Page List

256

Client Security > CSRF Protection > URL List

256

Client Security > MITB Protection > Protected Parameter

256

Client Security > MITB Protection > Allowed External Domains for AJAX Request

256

Access rules > URL access rules

12

Bot Mitigation > Biometrics Based Detection rules

12

Bot Mitigation > Bot Deception rules

255

Advanced Applications > Custom rules

24

Advanced Applications > Web Socket Security rules

12

API Protection > Open API Validation > Validation rules

10

API Protection > API Gateway > API users

12

API Protection > API Gateway > API Gateway rules

12

API Protection > Mobile API Protection Request URL

12

API Protection > JSON Security rules

10

API Protection > XML Protection rules

10

Application Delivery > Rewriting Request rules

12

Global Trustlist

12

The following table provides the maximum number of configuration objects in Global tabs.

Global item

Maximum value

WAF > Templates 16
WAF > Report No Limit
WAF > Admin Management > Users No Limit
WAF > System Settings > Cloud Connectors No Limit
WAF > System Settings > Custom Block Pages 8
WAF > System Settings > Settings > API Key 1

Maximum configuration values

Maximum configuration values

The following table provides the maximum number of configuration objects in each application.

Application item

Maximum value

Logs > attack log servers

2

Network > origin servers

32

Network > Endpoint > Custom Certificate

32

Network > Endpoint > Intermediate Certificate

32

Network > Endpoint > Domains

10

Security Rules > Known Attack > Exception rules

128

Security Rules > Anomaly Detection > Source IP List

No Limit

Security Rules > Information Leakage > Exception rules

128

Security Rules > Cookie Security > Except Cookies

64

Client Security > CSRF Protection > Page List

256

Client Security > CSRF Protection > URL List

256

Client Security > MITB Protection > Protected Parameter

256

Client Security > MITB Protection > Allowed External Domains for AJAX Request

256

Access rules > URL access rules

12

Bot Mitigation > Biometrics Based Detection rules

12

Bot Mitigation > Bot Deception rules

255

Advanced Applications > Custom rules

24

Advanced Applications > Web Socket Security rules

12

API Protection > Open API Validation > Validation rules

10

API Protection > API Gateway > API users

12

API Protection > API Gateway > API Gateway rules

12

API Protection > Mobile API Protection Request URL

12

API Protection > JSON Security rules

10

API Protection > XML Protection rules

10

Application Delivery > Rewriting Request rules

12

Global Trustlist

12

The following table provides the maximum number of configuration objects in Global tabs.

Global item

Maximum value

WAF > Templates 16
WAF > Report No Limit
WAF > Admin Management > Users No Limit
WAF > System Settings > Cloud Connectors No Limit
WAF > System Settings > Custom Block Pages 8
WAF > System Settings > Settings > API Key 1