Configuring Threat Intelligence Access Control Rules to Block or Allow IP Addresses in a Specified IP Address Library
Access is controlled based on the IP address library of an Internet Data Center (IDC). The available IP address library platforms include Dr. Peng, Google, Tencent, and Meituan. With this protection, when a source IP address in the target IP address library initiates an access request to any path under the protected domain name, the configured access control rule is triggered, and the request is blocked, allowed, or logged only.
Prerequisites
- You have added a website to WAF or added a protection policy.
- For cloud CNAME access mode, see Connecting Your Website to WAF with Cloud Mode - CNAME Access.
- For dedicated access mode, see Connecting Your Website to WAF with Dedicated Mode.
- If you use a dedicated WAF instance, make sure it has been upgraded to the latest version. For details, see Managing Dedicated WAF Engines.
Constraints
- In cloud mode, threat intelligence access control rules are available only in the professional and enterprise editions.
- In dedicated mode, only dedicated instances released in September 2022 and later support threat intelligence access control rules. For details about dedicated instance versions, see Dedicated Engine Version Iteration.
- ELB-mode WAF does not support threat intelligence access control rules.
Configuring a Threat Intelligence Access Control Rule
- Log in to the WAF console.
- Click
in the upper left corner and select a region or project.
- (Optional) If you have enabled the enterprise project function, in the upper part of the navigation pane on the left, select your enterprise project from the Filter by enterprise project drop-down list. Then, WAF will display the related security data in the enterprise project on the page.
- In the navigation pane on the left, click Policies.
- Click the name of the target policy to go to the protection rule configuration page.
Before configuring protection rules, ensure that the target protection policy has been applied to a domain name. A protection policy can be applied to multiple protected domain names, but a protected domain name can have only one protection policy.
- Click the Threat Intelligence Access Control configuration box and ensure that the threat intelligence access control protection is enabled.
: enabled.
- In the upper left corner above the rule list, click Add Rule.
- In the dialog box displayed, add a threat intelligence access control rule. Table 1 describes the parameters.
Figure 1 Add Threat Intelligence Access Rule
Table 1 Parameter description Parameter
Description
Example Value
Rule Name
Name of the rule.
WAFtest
Rule Description (Optional)
A brief description of the rule.
--
IP Reputation Library Type
Select the IP reputation library type. Currently, only IDC is supported.
Select IDC from the drop-down list box and select the IP database platform.
Dr. Peng, Google, Tencent, Meituan, and other platforms.
IDC
Huawei
Protective Action
Protective action for the rule when a request matches the rule.
- Block: Requests that hit the rule will be blocked, and a block response page will be returned to the client that initiates the requests.
By default, WAF uses a unified block response page. You can also customize this page.
- Allow: Requests that hit the rule are forwarded to backend servers.
- Log only: Requests that hit the rule will be logged but not be blocked.
Allow
- Block: Requests that hit the rule will be blocked, and a block response page will be returned to the client that initiates the requests.
- Click OK. You can view the added threat intelligence access control rule in the rule list.
After completing the preceding configurations, you can:
- Check the rule status: In the protection rule list, check the rule you added. Rule Status is Enabled by default.
- Disable the rule: If you do not want the rule to take effect, click Disable in the Operation column of the rule.
- Delete or modify the rule: Click Delete or Modify in the Operation column of the rule.
- Verify the protection effect:
- Clear the browser cache and access http://www.example.com using IP addresses in Huawei Cloud IP address library. If WAF blocks the request and returns the block page, the rule works.
- On the Events page, check the protection logs.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot