Before You Start
Web Application Firewall (WAF) examines HTTP/HTTPS requests to identify and block malicious traffic, keeping your core service data secure and web server performance stable. This document describes how to quickly use WAF to protect your workloads.
Overview
A glance at WAF:
Step 1: Buy a WAF Instance
- Log in to Huawei Cloud management console. On the console page, choose Security & Compliance > Web Application Firewall.
- In the upper right corner of the page, click Buy WAF. On the purchase page displayed, select a WAF mode.
- Buying a Cloud WAF Instance
- To use ELB-access cloud WAF, you need to to enable it for you first. ELB-access cloud WAF is available in some regions. For details, see .
- If you want to use the ELB access mode, make sure you are using standard, professional, or platinum cloud WAF. When you are using cloud WAF, the quotas for the domain name, QPS, and rule extension packages are shared between the ELB access and CNAME access modes.
- Buying a Dedicated WAF Instance
- Buying a Cloud WAF Instance
Step 2: Connect a Website to WAF
After buying a WAF instance, you need to add it to WAF, or WAF cannot check HTTP or HTTPS requests.
Access Mode |
Protection Scenario |
Reference Document |
---|---|---|
Cloud Mode - CNAME Access |
|
|
Dedicated mode |
Step 3: Configure a Protection Policy
After your website is connected to WAF, WAF applies a protection policy to your website and enables General Check (with Protective Action set to Log only and Protection Level set to Medium) in Basic Web Protection and enables Scanner check (with Protective Action set to Log only) in Anti-Crawler protection.
- If you do not have special security requirements, you can retain the default settings and view WAF protection logs on the Events page at any time. For details, see Viewing Protection Event Logs.
- If your website were under attacks, you can configure a custom protection policy based on attack details on the Dashboard and Events pages. For details, see Adding Rules to One or More Policies.
Step 4: View Protection Logs
On the Events page, view the protection details of the configured protection policy and handle the source IP address.
- To quickly whitelist a source IP address, locate the row that contains the corresponding event, choose Handle as False Alarm in the Operation column, and configure a global protection whitelist rule.
- To block or allow a source IP address, add it to an IP address blacklist or whitelist.
For details, see Handling False Alarms.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.