Fortinet black logo

User Guide

Maximum configuration values

Maximum configuration values

The following table provides the maximum number of configuration objects in each application.

Application item

Maximum value

Logs > attack log servers

5

Network > origin servers

32

Network > Endpoint > Custom Certificate

32

Network > Endpoint > Intermediate Certificate

32

Network > Endpoint > Domains

10

Security Rules > Known Attack > Exception rules

128

Security Rules > Anomaly Detection > Source IP List

No Limit

Security Rules > Information Leakage > Exception rules

128

Security Rules > Cookie Security > Except Cookies

64

Client Security > CSRF Protection > Page List

256

Client Security > CSRF Protection > URL List

256

Client Security > MITB Protection > Protected Parameter

256

Client Security > MITB Protection > Allowed External Domains for AJAX Request

256

Access rules > URL access rules

12

Bot Mitigation > Biometrics Based Detection rules

12

Bot Mitigation > Bot Deception rules

255

Advanced Applications > Custom rules

12

Advanced Applications > Web Socket Security rules

12

API Protection > Open API Validation > Validation rules

10

API Protection > API Gateway > API users

12

API Protection > API Gateway > API Gateway rules

12

API Protection > Mobile API Protection Request URL

12

API Protection > JSON Security rules

10

API Protection > XML Protection rules

10

Application Delivery > Rewriting Request rules

12

Global Trustlist

12

The following table provides the maximum number of configuration objects in Global tabs.

Global item

Maximum value

Global > Templates 16
Global > Report No Limit
Global > Admin Management > Users No Limit
Global > Administrators > Role Management > Roles No Limit
Global > System Settings > Cloud Connectors No Limit
Global > System Settings > Custom Block Pages 8
Global > System Settings > Settings > API Key 1

Maximum configuration values

The following table provides the maximum number of configuration objects in each application.

Application item

Maximum value

Logs > attack log servers

5

Network > origin servers

32

Network > Endpoint > Custom Certificate

32

Network > Endpoint > Intermediate Certificate

32

Network > Endpoint > Domains

10

Security Rules > Known Attack > Exception rules

128

Security Rules > Anomaly Detection > Source IP List

No Limit

Security Rules > Information Leakage > Exception rules

128

Security Rules > Cookie Security > Except Cookies

64

Client Security > CSRF Protection > Page List

256

Client Security > CSRF Protection > URL List

256

Client Security > MITB Protection > Protected Parameter

256

Client Security > MITB Protection > Allowed External Domains for AJAX Request

256

Access rules > URL access rules

12

Bot Mitigation > Biometrics Based Detection rules

12

Bot Mitigation > Bot Deception rules

255

Advanced Applications > Custom rules

12

Advanced Applications > Web Socket Security rules

12

API Protection > Open API Validation > Validation rules

10

API Protection > API Gateway > API users

12

API Protection > API Gateway > API Gateway rules

12

API Protection > Mobile API Protection Request URL

12

API Protection > JSON Security rules

10

API Protection > XML Protection rules

10

Application Delivery > Rewriting Request rules

12

Global Trustlist

12

The following table provides the maximum number of configuration objects in Global tabs.

Global item

Maximum value

Global > Templates 16
Global > Report No Limit
Global > Admin Management > Users No Limit
Global > Administrators > Role Management > Roles No Limit
Global > System Settings > Cloud Connectors No Limit
Global > System Settings > Custom Block Pages 8
Global > System Settings > Settings > API Key 1