Bug ID 746875: When the rate-limit setting is configured to a low value, sampled attack log messages are not logged

Last Modified: Sep 14, 2023

Affected Product(s):
BIG-IP AFM(all modules)

Known Affected Versions:
13.1.0,,,,,,,,, 13.1.1,,,,, 13.1.3,,,,,,, 13.1.4,, 13.1.5,, 14.0.0,,,,,, 14.0.1,, 14.1.0,,,,,, 14.1.2,,,,,,,,, 14.1.3,, 14.1.4,,,,,,, 14.1.5,,,,,

Fixed In:

Opened: Oct 15, 2018

Severity: 3-Major


On hardware platforms, with the default-internal-rate-limit of a DoS vector being set to a low number, there is no sampled attack message in the log, even the attack is being detected.


No visibility of the attack after being detected.


-- Setting the default-internal-rate-limit of the targeted DoS vector to a low number, e.g., 2. -- Detect attack.


Use a higher number for the default-internal-rate-limit of the targeted DoS vector.

Fix Information

A low default-internal-rate-limit value does not create problem. The sampled attack log message is being shown.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips