We’re trying to mitigate users who employ auto‑clicker or automation tools that repeatedly send HTTP POST requests every 100 milliseconds. Our goal is to restrict each user to a maximum of 1 request per 300 milliseconds, and to return HTTP 429 (Too Many Requests) if that limit is exceeded.
We’re looking for the best way to implement this restriction within a Fortinet environment—specifically using FortiWeb or FortiGate if possible.
Can FortiWeb’s Rate Limiting or Bot Mitigation features be configured to apply per‑client‑IP or session with a millisecond‑level interval?
If not, what’s the most effective configuration to approximate a 300 ms threshold (e.g., through request‑per‑second rules, anomaly detection profiles, or custom WAF policies)?
Are there any best practices or sample configurations to handle legitimate bursts without blocking valid users?
Any guidance or example policies for achieving this kind of fine‑grained rate control would be greatly appreciated.
Did you try with DoS policy?
https://docs.fortinet.com/document/fortiweb/8.0.1/administration-guide/276350/dos-prevention
User | Count |
---|---|
2636 | |
1400 | |
810 | |
677 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.