Help Center> Web Application Firewall> User Guide> Policies> Configuring Intelligent Access Control Rules to Accurately Defend Against CC Attacks
Updated on 2024-04-17 GMT+08:00

Configuring Intelligent Access Control Rules to Accurately Defend Against CC Attacks

If you enable intelligent access control, WAF uses built-in AI-powered models to analyze traffic to your website, identify CC attacks and abnormal features in HTTP requests on the origin server, and generate specific precise protection and access control rules for your website. In this way, WAF can then automatically protect your website from CC attacks.

The intelligent access control protection is now available for open beta test (OBT). To enable it, submit a service ticket.

Prerequisites

You have added your website to a policy.

Constraints

  • In cloud mode, only the standard, professional, and platinum editions support intelligent access control rules.
  • Intelligent access control protection is available in North China regions only.

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner of the management console and select a region or project.
  3. Click in the upper left corner and choose Web Application Firewall under Security & Compliance.
  4. In the navigation pane on the left, choose Policies.
  5. Click the name of the target policy to go to the protection configuration page.
  6. Click the Intelligent Access Control configuration area and toggle it on or off if needed.

    • : enabled.
    • : disabled.

  7. Click Intelligent Threat Access Control.

    CC Attack Protection Rule/Precise Protection Rule: Configure Action and Maximum Age for them after you enable them.
    • Action: Select Log only, Block, or JS Challenge.
    • Maximum Age: The rule becomes invalid if WAF does not detect any CC attack traffic within the maximum age you configure.
    Figure 1 Configure WAF Rule

  8. Click OK.

    Click View WAF Rule to view the protection policies automatically generated by WAF after it detects CC attacks.