Compute
Elastic Cloud Server
Huawei Cloud Flexus
Bare Metal Server
Auto Scaling
Image Management Service
Dedicated Host
FunctionGraph
Cloud Phone Host
Huawei Cloud EulerOS
Networking
Virtual Private Cloud
Elastic IP
Elastic Load Balance
NAT Gateway
Direct Connect
Virtual Private Network
VPC Endpoint
Cloud Connect
Enterprise Router
Enterprise Switch
Global Accelerator
Management & Governance
Cloud Eye
Identity and Access Management
Cloud Trace Service
Resource Formation Service
Tag Management Service
Log Tank Service
Config
OneAccess
Resource Access Manager
Simple Message Notification
Application Performance Management
Application Operations Management
Organizations
Optimization Advisor
IAM Identity Center
Cloud Operations Center
Resource Governance Center
Migration
Server Migration Service
Object Storage Migration Service
Cloud Data Migration
Migration Center
Cloud Ecosystem
KooGallery
Partner Center
User Support
My Account
Billing Center
Cost Center
Resource Center
Enterprise Management
Service Tickets
HUAWEI CLOUD (International) FAQs
ICP Filing
Support Plans
My Credentials
Customer Operation Capabilities
Partner Support Plans
Professional Services
Analytics
MapReduce Service
Data Lake Insight
CloudTable Service
Cloud Search Service
Data Lake Visualization
Data Ingestion Service
GaussDB(DWS)
DataArts Studio
Data Lake Factory
DataArts Lake Formation
IoT
IoT Device Access
Others
Product Pricing Details
System Permissions
Console Quick Start
Common FAQs
Instructions for Associating with a HUAWEI CLOUD Partner
Message Center
Security & Compliance
Security Technologies and Applications
Web Application Firewall
Host Security Service
Cloud Firewall
SecMaster
Anti-DDoS Service
Data Encryption Workshop
Database Security Service
Cloud Bastion Host
Data Security Center
Cloud Certificate Manager
Edge Security
Situation Awareness
Managed Threat Detection
Blockchain
Blockchain Service
Web3 Node Engine Service
Media Services
Media Processing Center
Video On Demand
Live
SparkRTC
MetaStudio
Storage
Object Storage Service
Elastic Volume Service
Cloud Backup and Recovery
Storage Disaster Recovery Service
Scalable File Service Turbo
Scalable File Service
Volume Backup Service
Cloud Server Backup Service
Data Express Service
Dedicated Distributed Storage Service
Containers
Cloud Container Engine
SoftWare Repository for Container
Application Service Mesh
Ubiquitous Cloud Native Service
Cloud Container Instance
Databases
Relational Database Service
Document Database Service
Data Admin Service
Data Replication Service
GeminiDB
GaussDB
Distributed Database Middleware
Database and Application Migration UGO
TaurusDB
Middleware
Distributed Cache Service
API Gateway
Distributed Message Service for Kafka
Distributed Message Service for RabbitMQ
Distributed Message Service for RocketMQ
Cloud Service Engine
Multi-Site High Availability Service
EventGrid
Dedicated Cloud
Dedicated Computing Cluster
Business Applications
Workspace
ROMA Connect
Message & SMS
Domain Name Service
Edge Data Center Management
Meeting
AI
Face Recognition Service
Graph Engine Service
Content Moderation
Image Recognition
Optical Character Recognition
ModelArts
ImageSearch
Conversational Bot Service
Speech Interaction Service
Huawei HiLens
Video Intelligent Analysis Service
Developer Tools
SDK Developer Guide
API Request Signing Guide
Terraform
Koo Command Line Interface
Content Delivery & Edge Computing
Content Delivery Network
Intelligent EdgeFabric
CloudPond
Intelligent EdgeCloud
Solutions
SAP Cloud
High Performance Computing
Developer Services
ServiceStage
CodeArts
CodeArts PerfTest
CodeArts Req
CodeArts Pipeline
CodeArts Build
CodeArts Deploy
CodeArts Artifact
CodeArts TestPlan
CodeArts Check
CodeArts Repo
Cloud Application Engine
MacroVerse aPaaS
KooMessage
KooPhone
KooDrive
On this page

Overview

Updated on 2024-04-12 GMT+08:00

After you enable the WAF service, you need to connect your website domain name to WAF so that all access requests are forwarded to WAF for protection.

Website Service Review

Sort out all website services you want to protect with WAF. This helps you learn about your workloads and specific data of your workloads so that you can choose and configure appropriate protection policies.

Table 1 Website services

Item

Description

Website and Service Information

Daily peak traffic of website/web application services, including the bandwidth (in Mbit/s) and QPS

Use it as the basis for selecting the service bandwidth and QPS specifications.

NOTE:

If your website traffic peak exceeds the maximum QPS specifications you are using, WAF will stop checking the traffic and directly forward it to the origin server. There is no protection for your website or applications.

Major user group (for example, major locations where the requests originate from)

Determine the attack source and then set geolocation access control rules to block users from these locations.

Whether the service uses a C/S architecture

If yes, check whether there is an app client, Windows client, Linux client, code callback, or any other client.

Location where the origin server is deployed

Decide which region you want to apply for the instance.

Operating system (Linux or Windows) and web service middleware (Apache, Nginx, or IIS) of the origin server

Check whether access control is enabled for the origin server. If yes, whitelist WAF IP addresses.

Domain protocol

Check whether WAF supports the communication protocol used by your site.

NOTE:
WAF can protect your website only when Client Protocol and Server Protocol are configured based on the real situation of your website.
  • Client Protocol: the protocol used by a client (for example, a browser) to access your website. You can select HTTP or HTTPS.
  • Server Protocol: the protocol used by WAF to forward requests from the client (such as a browser) to the origin server. You can select HTTP or HTTPS.

Service port

Check whether your service ports are within the port range supported by WAF.

  • Standard ports
    • 80: default port when the client protocol is HTTP
    • 443: default port when the client protocol is HTTPS
  • Non-standard ports

    Ports other than ports 80 and 443.

Whether TLSv1.0 or weak encryption suite is supported

Check whether WAF supports the encryption suite used by your site.

Whether advanced anti-DDoS, CDN, or other proxy services are deployed in front of WAF.

Check whether a proxy is used and whether domain name is resolved to a correct address.

Whether the client supports Server Name Indication (for HTTPS services)

If your domain name supports HTTPS, the client and server must support Server Name Indication (SNI).

Service interaction

Understand the service interaction process and service processing logic to facilitate subsequent configuration of protection policies.

Active users

Determine the severity of an attack event to take a low-risk measure to respond it.

Services and Attacks

Service types and features (such as games, cards, websites, or apps)

Help analyze the attack signatures.

Inbound traffic range and connection status of a single user or a single IP address

Help determine whether a rate limiting policy can be configured per IP address.

User group attribute

For example, individual users, Internet cafe users, or proxy users

Whether your website experienced large-volumetric attacks, the attack type, and maximum peak traffic

Determine whether a DDoS protection service is required and determine the DDoS protection specifications based on the peak attack traffic.

Whether your website experienced CC attacks and the maximum peak QPS in a CC attack

Configure the protection policies based on attack signatures.

Whether the pressure test has been performed

Evaluate the request processing performance of the origin server to determine whether service anomaly occurs due to attacks.

How to Use WAF

Table 2 describes the procedure to use WAF.
Table 2 Procedure to use WAF

Step

Description

Applying for dedicated WAF instances

Apply for a dedicated WAF instance.

For details, see Applying for a Dedicated WAF Engine.

Adding a website to WAF

Add the website you want to protect to WAF.

For details, see Step 1: Add a Website to WAF.

Enabling WAF protection

Enable WAF protection to protect added website.

NOTE:
  • Using WAF does not affect your web server performance because the WAF engine is not running on your web server.
  • After your domain name is connected to WAF, there will be a latency of tens of milliseconds, which might be raised based on the size of the requested page or number of incoming requests.

Configuring protection rules

Use WAF built-in protection rules and configure custom rules to protect your website. For more details, see Rule Configuration.

Handling false alarms

Mask blocked or logged events which are handled as false alarms. For more details, see Handling False Alarms.

Viewing Dashboard

View protection data of yesterday, today, last 3 days, last 7 days, or last 30 days. For more details, see Dashboard.

For details about how to connect your website to WAF, see Figure 1.
Figure 1 Flowchart of connecting a website to WAF

We use cookies to improve our site and your experience. By continuing to browse our site you accept our cookie policy. Find out more

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback