Help Center/ Cloud Firewall/ User Guide/ Attack Defense/ Attack Defense Overview
Updated on 2024-10-09 GMT+08:00

Attack Defense Overview

CFW can defend against network attacks and virus files. You are advised to set Protection Mode to Intercept in a timely manner.

Prerequisites

At least one type of traffic protection has been enabled.

Defense Against Network Attacks and Virus Files

The following methods can be used:
  • IPS provides you with basic protection functions, and, with many years of attack defense experience, it detects and defends against a wide range of common network attacks and effectively protects your assets.
    • IPS provides four protection modes. For details about how to configure it, see Adjusting the IPS Protection Mode to Block Network Attacks.
      • Observe: Attacks are detected and recorded in logs but are not intercepted.
      • Intercept: Attacks and abnormal IP address access are automatically intercepted.
        • Intercept mode - loose: The protection granularity is coarse. In this mode, only attacks with high threat and high certainty are blocked.
        • Intercept mode - moderate: The protection granularity is medium. This mode meets protection requirements in most scenarios.
        • Intercept mode - strict: The protection granularity is fine-grained, and all attack requests are intercepted.
    • IPS provides multiple types of rule libraries. For details, see Table 1. Different rules are enabled for different interception modes. For details, see Default Actions of Rule Groups in Different Protection Modes.
      Table 1 Intrusion prevention rule libraries

      Function

      Description

      Check Type

      Configuration Method

      Basic defense

      A built-in rule library. It covers common network attacks and provides basic protection capabilities for your assets.

      • Scan for threats and scan vulnerabilities.
      • Check whether traffic contains phishing, Trojans, worms, hacker tools, spyware, password attacks, vulnerability attacks, SQL injection attacks, XSS attacks, and web attacks.
      • Checks whether there are protocol anomalies, buffer overflow, access control, suspicious DNS activities, and other suspicious behaviors in traffic.

      For details about how to view and modify rule library settings, see Modifying the Protection Action of an Intrusion Prevention Rule.

      Virtual patch

      Hot patches are provided for IPS at the network layer to intercept high-risk remote attacks in real time and prevent service interruption during vulnerability fixing.

      Updated rules are added to the virtual patch library first. You can determine whether to add the rules to the basic defense library.

      To add defense rules, enable this function to apply virtual patch rules. The protection action can be manually modified.

      Custom IPS signature (supported only by the professional edition)

      If the built-in rule library cannot meet your requirements, you can customize signature rules.

      The check types are the same as those of Basic defense.

      Signature rules of the HTTP, TCP, UDP, POP3, SMTP and FTP protocols can be added.

      For details, see Customizing IPS Signatures.

  • Sensitive directory scan can defend against scanning attacks on sensitive directories on cloud servers. For details, see Enabling Sensitive Directory Scan Defense.
  • Reverse shell detection can defend against network attacks in reverse shell mode. For details, see Enabling Reverse Shell Defense.
  • Antivirus can identify and process virus-infected files through virus feature detection to prevent data damage, permission change, and system breakdown caused by virus-infected files. HTTP, SMTP, POP3, FTP, IMAP4 and SMB protocols can be checked.

    For details about antivirus, see Blocking Virus-infected Files.

Protection Actions

  • Observe: The firewall records the traffic that matches the current rule in Attack Event Logs and does not block the traffic.
  • Intercept: The firewall records the traffic that matches the current rule in Attack Event Logs and blocks it.
  • Disable: The firewall does not log or block the traffic that matches the current rule.

References

For details about the protection overview, see Viewing Attack Defense Information on the Dashboard. For details about logs, see Attack Event Logs.