Bug ID 746875: When the rate-limit setting is configured to a low value, sampled attack log messages are not logged

Last Modified: Sep 11, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP AFM(all modules)

Known Affected Versions:
13.1.0,,,,,,,,, 13.1.1,,,,,, 13.1.3, 14.0.0,,,,,, 14.0.1, 14.1.0,,,,,,, 14.1.2

Fixed In:

Opened: Oct 15, 2018
Severity: 3-Major


On hardware platforms, with the default-internal-rate-limit of a DoS vector being set to a low number, there is no sampled attack message in the log, even the attack is being detected.


No visibility of the attack after being detected.


-- Setting the default-internal-rate-limit of the targeted DoS vector to a low number, e.g., 2. -- Detect attack.


Use a higher number for the default-internal-rate-limit of the targeted DoS vector.

Fix Information

A low default-internal-rate-limit value does not create problem. The sampled attack log message is being shown.

Behavior Change