- What's New
- Function Overview
-
Product Bulletin
- Java Spring Framework Remote Code Execution Vulnerability
- Apache Dubbo Deserialization Vulnerability
- DoS Vulnerability in the Open-Source Component Fastjson
- Remote Code Execution Vulnerability of Fastjson
- Oracle WebLogic wls9-async Deserialization Remote Command Execution Vulnerability (CNVD-C-2019-48814)
- Service Overview
-
Billing
- WAF Billing Overview
- Billing Modes
- Billing Items
- Billing Examples
- Changing the Billing Mode
- Renewing Your Subscription
- Bills
- About Arrears
- Billing Termination
- Cost Management
-
Billing FAQs
- Can I Switch Between Yearly/Monthly and Pay-per-Use Billing Modes for WAF?
- Can I Use WAF for Free?
- How Is WAF Billed?
- Can WAF Continue Protecting a Domain Name When It Expires?
- How Do I Unsubscribe from WAF?
- Can I Retain the Original Configurations When I Unsubscribe from a WAF Instance and Then Purchase Another One?
- How Do I Know When My WAF Expires?
- Getting Started
-
User Guide
- Creating a User Group and Granting Permissions
- Buying WAF
- Connecting Your Website to WAF
- Viewing Protection Events
-
Configuring Protection Policies
- Protection Configuration Overview
- Configuring Basic Web Protection to Defend Against Common Web Attacks
- Configuring CC Attack Protection Rules to Defend Against CC Attacks
- Configuring Custom Precise Protection Rules
- Configuring IP Address Blacklist and Whitelist Rules to Block or Allow Specified IP Addresses
- Configuring Geolocation Access Control Rules to Block or Allow Requests from Specific Locations
- Configuring Threat Intelligence Access Control Rules to Block or Allow IP Addresses in a Specified IP Address Library
- Configuring Web Tamper Protection Rules to Prevent Static Web Pages from Being Tampered With
- Configuring Anti-Crawler Rules
- Configuring Information Leakage Prevention Rules to Protect Sensitive Information from Leakage
- Configuring a Global Protection Whitelist Rule to Ignore False Alarms
- Configuring Data Masking Rules to Prevent Privacy Information Leakage
- Configuring a Scanning Blocking Rule to Automatically Block Heavy-Traffic Attacks
- Configuring Bot Protection Rules to Defend Against Bot Behavior
- Creating a Reference Table to Configure Protection Metrics in Batches
- Configuring a Known Attack Source Rule to Block Specific Visitors for a Specified Duration
- Condition Field Description
- Application Types WAF Can Protect
- Checking Dashboard
-
Website Settings
-
Recommended Configurations After Website Connection
- Configuring PCI DSS/3DS Compliance Check and TLS
- Enabling the HTTP/2 Protocol
- Configuring a Response Body Length in Logs
- Configuring Request and Response Header Forwarding
- Modifying the Alarm Page
- Stopping WAF from Inserting Cookie Fields
- Enabling WAF IPv6 Protection
- Modifying the Load Balancing Algorithm
- Enabling the Cookie Security Attributes
- Modifying a Verification Code
- Configuring a Custom Log Trace ID
- Configuring a Traffic Identifier for a Known Attack Source
- Configuring a JA3/JA4 Fingerprint Tag
- Configuring a Timeout for Connections Between WAF and a Website Server
- Enabling Break Protection to Protect Origin Servers
-
Managing Websites
- Viewing Basic Information of a Website
- Exporting Website Settings
- Changing the Protection Mode
- Changing the Protection Policy for a Protected Website
- Updating the Certificate Used for a Website
- Editing Server Information
- Viewing Protection Information About a Protected Website on Cloud Eye
- Migrating Domain Names to Other Enterprise Projects
- Deleting a Protected Website from WAF
-
Recommended Configurations After Website Connection
- Policy Management
- Security Reports
- Object Management
- Instance Management
- Permissions Management
- Monitoring and Auditing
-
Best Practices
- WAF Best Practices You May Need
-
Website Access Configuration
- Connecting a Website Without a Proxy to WAF in CNAME Access Mode
- Combining AAD and WAF to Get All-Round Protection
- Combining CDN and WAF to Get Improved Protection and Load Speed
- Combining WAF and Layer-7 Load Balancers to Protect Services over Any Ports
- Using WAF, ELB, and NAT Gateway to Protect Services Not Deployed on Our Cloud
- Website Protection Configuration Suggestions
-
Mitigating Web Security Vulnerabilities
- Java Spring Framework Remote Code Execution Vulnerability
- Apache Dubbo Deserialization Vulnerability
- DoS Vulnerability in the Open-Source Component Fastjson
- Remote Code Execution Vulnerability of Fastjson
- Oracle WebLogic wls9-async Deserialization Remote Command Execution Vulnerability (CNVD-C-2019-48814)
- Defending Against Challenge Collapsar (CC) Attacks
- Using WAF to Block Crawler Attacks
- Verifying a Global Protection Whitelist Rule by Simulating Requests with Postman
- Combining WAF and HSS to Improve Web Page Tampering Protection
- Configuring Header Field Forwarding to Disable Response Packet Compression
- Configuring Origin Server Security
- Using LTS to Analyze WAF Logs
- Obtaining the Real Client IP Addresses
- Configuring Alarms on Cloud Eye for Abnormal WAF Metrics
- Migrating Protection Policies for Your Website
-
API Reference
- Before You Start
- API Overview
- API Calling
-
APIs
-
Managing Websites Protected by Dedicated WAF Engines
- Querying the List of Domain Names Protected by Dedicated WAF Instances
- Adding a Domain Name to a Dedicated WAF Instance
- Modifying a Domain Name Protected by a Dedicated WAF Instance
- Querying Domain Name Settings in Dedicated Mode
- Deleting a Domain Name from a Dedicated WAF Instance
- Modifying the Protection Status of a Domain Name in Dedicated Mode
- Policy Management
-
Rule Management
- Changing the Status of a Rule
- Querying CC Attack Protection Rules
- Creating a CC Attack Protection Rule
- Querying a CC Attack Protection Rule by ID
- Updating a CC Attack Protection Rule
- Deleting a CC Attack Protection Rule
- Querying the List of Precise Protection Rules
- Creating a precise protection rule
- Querying a Precise Protection Rule by ID
- Updating a precise protection rule
- Deleting a precise protection rule
- Creating a Global Protection Whitelist (Formerly False Alarm Masking) Rule
- Querying the List of Global Protection Whitelist (Formerly False Alarm Masking) Rules
- Updating a Global Protection Whitelist (Formerly False Alarm Masking) Rule
- Deleting a Global Protection Whitelist (Formerly False Alarm Masking) Rule
- Querying the Blacklist and Whitelist Rule List
- Creating a Blacklist/Whitelist Rule
- Querying a blacklist or whitelist rule
- Updating a Blacklist or Whitelist Protection Rule
- Querying Global Protection Whitelist (Formerly False Alarm Masking) Rules
- Deleting a Blacklist or Whitelist Rule
- Querying the JavaScript Anti-Crawler Rule List
- Updating a JavaScript Anti-Crawler Protection Rule
- Creating a JavaScript Anti-Crawler Rule
- Querying a JavaScript Anti-Crawler Rule
- Updating a JavaScript Anti-Crawler Rule
- Deleting a JavaScript Anti-Crawler Rule
- Querying the list of Data Masking Rules.
- Creating a Data Masking Rule
- Querying a Data Masking Rule
- Updating a Data Masking Rule
- Deleting a Data Masking Rule
- Querying the List of Known Attack Source Rules
- Creating a Known Attack Source Rule
- Querying a Known Attack Source Rule by ID
- Updating a Known Attack Source Rule
- Deleting a Known Attack Source Rule
- Querying the List of Geolocation Access Control Rules
- Creating a Geolocation Access Control Rule
- Querying a Geolocation Access Control Rule by ID.
- Updating a Geolocation Access Control Rule
- Deleting a Geolocation Access Control Rule
- Querying the List of Web Tamper Protection Rules
- Creating a Web Tamper Protection Rule
- Querying a Web Tamper Protection Rule
- Deleting a Web Tamper Protection Rule
- Updating the Cache for a Web Tamper Protection Rule
- Querying the List of Information Leakage Prevention Rules
- Creating an Information Leakage Prevention Rule
- Querying an Information Leakage Prevention Rule
- Updating an Information Leakage Prevention Rule
- Deleting an Information Leakage Prevention Rule
- Querying the Reference Table List
- Creating a Reference Table
- Querying a Reference Table
- Modifying a Reference Table
- Deleting a Reference Table
- Address Group Management
- Certificate Management
- Event Management
- Dashboard
- Dedicated Instance Management
- Log Reporting
- Managing Your Subscriptions
- Domain Name Management
- System Management
- Alarm Management
-
Protected Website Management in Cloud Mode
- Querying the List of Domain Names Protected in Cloud Mode
- Adding a Domain Name to the Cloud WAF
- Querying Details About a Domain Name by Domain Name ID in Cloud Mode
- Updating Configurations of Domain Names Protected with Cloud WAF
- Deleting a Domain Name from the Cloud WAF
- Changing the Protection Status of a Domain Name
- Obtaining Domain Name Routing Information (in Cloud Mode)
- Querying the Domain Name of a Tenant
- Querying Features Available at a Site
-
Managing Websites Protected by Dedicated WAF Engines
- Appendix
- SDK Reference
-
FAQs
-
About WAF
- WAF Basics
- Can WAF Protect an IP Address?
- What Objects Does WAF Protect?
- Does WAF Block Customized POST Requests?
- Does WAF Protect Traffic from Both IPv4 and IPv6 Addresses?
- What Are the Differences Between the Web Tamper Protection Functions of WAF and HSS?
- Which Web Service Framework Protocols Does WAF Support?
- Can WAF Protect Websites Accessed Through HSTS or NTLM Authentication?
- What Are the Differences Between WAF Forwarding and Nginx Forwarding?
- What Are the Differences Between WAF and CFW?
- Can I Configure Session Cookies in WAF?
- How Does WAF Detect SQL Injection, XSS, and PHP Injection Attacks?
- Can WAF Defend Against the Apache Struts2 Remote Code Execution Vulnerability (CVE-2021-31805)?
- Why Does the Vulnerability Scanning Tool Report Disabled Non-standard Ports for My WAF-Protected Website?
- What Are the Restrictions on Using WAF in Enterprise Projects?
- What Are Local File Inclusion and Remote File Inclusion?
- What Is the Difference Between QPS and the Number of Requests?
- Does WAF Support Custom Authorization Policies?
- Why Do Cookies Contain the HWWAFSESID or HWWAFSESTIME field?
- Can I Switch Between the WAF Cloud Mode and Dedicated Mode?
- Can I Add a Domain Name or IP Address to WAF Under Different Accounts?
- What Are Regions and AZs?
- Can I Use WAF Across Regions?
- In Which Regions Is WAF Available?
- Can I Use WAF Across Enterprise Projects?
- Can I Use a WAF Instance in a Specific Enterprise Project for Other Enterprise Projects?
-
About Purchase and Specifications Change
- Can I Buy Multiple WAF Instances Using the Same Account?
- What Are the Differences Between the Permissions of an Account and Those of IAM Users?
- Can I Share My WAF with Other Accounts?
- How Does WAF Calculate Domain Name Quota Usage?
- Can I Add More Protection Rules?
- What Can I Do If the Website Traffic Exceeds the WAF Service Request Limit?
- What Are the Impacts When QPS Exceeds the Allowed Peak Rate?
- Can I Change WAF Specifications During Renewal?
- Where and When Can I Buy a Domain, QPS, or Rule Expansion Package?
- How Do I Select Service QPS When Purchasing WAF?
- Is Service QPS Calculated Based on Incoming Traffic or Outgoing Traffic?
- Does WAF Have a Limit on the Protection Bandwidth or Shared Bandwidth?
- Where Can I View the Inbound and Outbound Bandwidths of a Protected Website?
-
Website Connect Issues
- How Do I Configure Domain Names to Be Protected When Adding Domain Names?
- Do I Have to Configure the Same Port as That of the Origin Server When Adding a Website to WAF?
- How Do I Whitelist Back-to-Source IP Addresses of Cloud WAF?
- How Long Will CNAME Records Be Retained After I Delete a Domain Name from WAF?
- What Are the Precautions for Configuring Multiple Server Addresses for Backend Servers?
- Does WAF Support Wildcard Domain Names?
- Does WAF Protect Chinese Domain Names?
- How Does WAF Forward Access Requests When Both a Wildcard Domain Name and a Single Domain Name Are Connected to WAF?
- What Can I Do If the Message "Illegal server address" Is Displayed When I Add a Domain Name?
- Why Am I Seeing the "Someone else has already added this domain name. Please confirm that the domain name belongs to you" Error Message?
- Why Cannot I Select a Client Protocol When Adding a Domain Name?
- Can I Set the Origin Server Address to a CNAME Record If I Use Cloud WAF?
- How Do I Verify Domain Ownership Using Huawei Cloud DNS?
- What Are Impacts If No Subdomain Name and TXT Record Are Configured?
- How Do I Query a Domain Name Provider?
- What Are the Differences Between the Old and New CNAME Records?
- Can I Access a Website Using an IP Address After a Domain Name Is Connected to WAF?
- How Can I Forward Requests Directly to the Origin Server Without Passing Through WAF?
- Why Cannot the Protection Mode Be Enabled After a Domain Name Is Connected to WAF?
-
Protection Rules
- Which Protection Levels Can Be Set for Basic Web Protection?
- What Is the Peak Rate of CC Attack Protection?
- When Is Cookie Used to Identify Users?
- What Are the Differences Between Rate Limit and Allowable Frequency in a CC Rule?
- Why Cannot the Verification Code Be Refreshed When Verification Code Is Configured in a CC Attack Protection Rule?
- How Can I Allow Access from .js Files?
- Can I Batch Add IP Addresses to a Blacklist or Whitelist Rule?
- Can I Import or Export a Blacklist or Whitelist into or from WAF?
- Why Does a Requested Page Fail to Respond to the Client After the JavaScript-based Anti-Crawler Is Enabled?
- Is There Any Impact on Website Loading Speed If Other Crawler Check in Anti-Crawler Is Enabled?
- How Does JavaScript Anti-Crawler Detection Work?
- In Which Situations Will the WAF Policies Fail?
- How Do I Allow Requests from Only IP Addresses in a Specified Geographical Region?
- How Do I Allow Only Specified IP Addresses to Access Protected Websites?
- Which Protection Rules Are Included in the System-Generated Policy?
- Why Does the Page Fail to Be Refreshed After WTP Is Enabled?
- What Are the Differences Between Blacklist/Whitelist Rules and Precise Protection Rules on Blocking Access Requests from Specified IP Addresses?
- What Do I Do If a Scanner, such as AppScan, Detects that the Cookie Is Missing Secure or HttpOnly?
- How Do I Block Layer-4 IP Addresses?
- IPv6 Protection
- Certificate Management
-
Protection Event Logs
- Can WAF Log Protection Events?
- Can I Obtain WAF Logs Using APIs?
- How Do I Obtain Data about Block Actions?
- What Does "Mismatch" for "Protective Action" Mean in the Event List?
- How Does WAF Obtain the Real Client IP Address for a Request?
- Can WAF Logs Be Transferred to OBS?
- How Long Can WAF Protection Logs Be Stored?
- Can I Query Protection Events of a Batch of Specified IP Addresses at Once?
- Will WAF Record Unblocked Events?
- Why Is the Traffic Statistics on WAF Inconsistent with That on the Origin Server?
- Why Is the Number of Logs on the Dashboard Page Inconsistent with That on the Configure Logs Tab?
- Why Are There Garbled Characters in Event Data I Exported from WAF?
-
About WAF
-
Troubleshooting
- Troubleshooting Website Connection Exceptions
-
Troubleshooting Certificate and Cipher Suite Issues
- How Do I Fix an Incomplete Certificate Chain?
- Why Does My Certificate Not Match the Key?
- Why Are HTTPS Requests Denied on Some Mobile Phones?
- What Do I Do If the Protocol Is Not Supported and the Client and Server Do Not Support Common SSL Protocol Versions or Cipher Suites?
- Why Is the Bar Mitzvah Attack on SSL/TLS Detected?
-
Troubleshooting Traffic Forwarding Exceptions
- What Is Error Code 404, 502, or 504 Returned to Visitors After My Website or Application Is Connected to WAF?
- Why Am I Seeing Error Code 418?
- Why Am I Seeing Error Code 523?
- Why Was My Website Redirected So Many Times?
- Why Am I Seeing Error Code 414 Request-URI Too Large?
- What Do I Do If the CPU Usage of the Origin Server Reaches 100%?
- What Is the Connection Timeout Duration of WAF? Can I Manually Set the Timeout Duration?
- Checking Whether Normal Requests Are Blocked Mistakenly
- Checking for Permission Exceptions
- Videos
-
More Documents
-
User Guide (Paris)
- Introduction
- Monitoring Metrics
- Ports Supported by WAF
- Cloud WAF
-
Dedicated WAF Mode
- WAF Operation Guide
- Applying for a Dedicated WAF Instance
- Dashboard
- Events
-
Policies
- How to Configure WAF Protection
- Configuring Basic Protection Rules to Defend Against Common Web Attacks
- Configuring a CC Attack Protection Rule
- Configuring Custom Precise Protection Rules
- Configuring IP Address Blacklist and Whitelist Rules to Block or Allow Specified IP Addresses
- Configuring Geolocation Access Control Rules to Block or Allow Requests from Specific Locations
- Configuring Web Tamper Protection Rules to Prevent Static Web Pages from Being Tampered With
- Configuring Anti-Crawler Rules
- Configuring Information Leakage Prevention Rules to Protect Sensitive Information from Leakage
- Configuring a Global Protection Whitelist Rule to Ignore False Alarms
- Configuring Data Masking Rules to Prevent Privacy Information Leakage
- Creating a Reference Table to Configure Protection Metrics In Batches
- Configuring a Known Attack Source Rule to Block Specific Visitors for a Specified Duration
- Condition Field Description
- Managing Policies
- Website Settings
- Certificate Management
- System Management
- Authorizing and Associating an Enterprise Project
- Auditing
-
Best Practices
-
Mitigating Web Security Vulnerabilities
- Java Spring Framework Remote Code Execution Vulnerability
- Apache Dubbo Deserialization Vulnerability
- DoS Vulnerability in the Open-Source Component Fastjson
- Remote Code Execution Vulnerability of Fastjson
- Oracle WebLogic wls9-async Deserialization Remote Command Execution Vulnerability (CNVD-C-2019-48814)
- Configuring the Minimum TLS Version and Cipher Suite to Better Secure Connections
- Configuring CC Attack Protection
- Configuring Anti-Crawler Rules to Prevent Crawler Attacks
- Configuring an Access Control Policy on an ECS or ELB to Protect Origin Servers
- Configuring Basic Web Protection
- Handling False Alarms to Get Improved Basic Web Protection
- Verifying a Global Protection Whitelist (Formerly False Alarm Masking) Rule by Simulating Requests with Postman
- WAF Cloud Mode Access Configuration
- Upgrading a Dedicated WAF Instance
- Obtaining Real Client IP Addresses
- Using LTS to Quickly Query and Analyze WAF Access Logs
- Using LTS to Analyze How WAF Blocks Spring Core RCE Vulnerability in Real Time
- Using LTS to Configure Block Alarms for WAF Rules
- Combining WAF and Layer-7 Load Balancers to Protect Services over Any Ports
- Combining WAF and HSS to Get Improved Web Tamper Protection
-
Mitigating Web Security Vulnerabilities
- IAM Permissions Management
-
FAQs
-
About the Product
- FAQs for Beginners
-
WAF Functions
- Can WAF Protect an IP Address?
- What Objects Does WAF Protect?
- About WAF Protection
- Can I Configure Session Cookies in WAF?
- Does WAF Block Customized POST Requests?
- What Are the Differences Between the Web Tamper Protection Functions of WAF and HSS?
- Which Web Service Framework Protocols Does WAF Support?
- Can WAF Protect Websites Accessed Through HSTS or NTLM Authentication?
- What Are the Differences Between WAF Forwarding and Nginx Forwarding?
- How Does WAF Detect SQL Injection, XSS, and PHP Injection Attacks?
- Can WAF Defend Against the Apache Struts2 Remote Code Execution Vulnerability (CVE-2021-31805)?
-
WAF Usage
- Why Does the Vulnerability Scanning Tool Report Disabled Non-standard Ports for My WAF-Protected Website?
- How Do I Obtain the Real IP Address of a Web Visitor?
- What Are Local File Inclusion and Remote File Inclusion?
- What Is the Difference Between QPS and the Number of Requests?
- Does WAF Support Custom Authorization Policies?
- Can I Add a Domain Name or IP Address to WAF Under Different Accounts?
- How Do I Configure My Server to Allow Only Requests from WAF?
- Why Do Cookies Contain the HWWAFSESID or HWWAFSESTIME field?
- Can I Switch Between the WAF Cloud Mode and Dedicated Mode?
- How Do I Configure WAF If a Reverse Proxy Server Is Deployed for My Website?
- How Does WAF Forward Access Requests When Both a Wildcard Domain Name and a Single Domain Name Are Connected to WAF?
- Enterprise Project
- Service Request/Specification
- About Billing
-
Website Access Configuration
-
Domain Name and Port Configuration
- How Do I Add a Domain Name/IP Address to WAF?
- Which Non-Standard Ports Does WAF Support?
- How Do I Use a Dedicated WAF Instance to Protect Non-Standard Ports That Are Not Supported by the Dedicated Instance?
- How Do I Configure Domain Names to Be Protected When Adding Domain Names?
- Do I Have to Configure the Same Port as That of the Origin Server When Adding a Website to WAF?
- How Do I Configure Non-standard Ports When Adding a Protected Domain Name?
- What Can I Do If One of Ports on an Origin Server Does Not Require WAF Protection?
- What Data Is Required for Connecting a Domain Name/IP Address to WAF?
- How Do I Safely Delete a Protected Domain Name?
- Can I Change the Domain Name That Has Been Added to WAF?
- What Are the Precautions for Configuring Multiple Server Addresses for Backend Servers?
- Does WAF Support Wildcard Domain Names?
- How Do I Route Website Traffic to My Cloud WAF Instance?
- Can I Configure Multiple Load Balancers for a Dedicated WAF Instance?
- Certificate Management
- Server Configuration
- Domain Name Resolution
- Operations After Connecting Websites to WAF
-
Domain Name and Port Configuration
-
Service Interruption Check
- How Do I Troubleshoot 500/502/504 Errors?
- Why Is My Domain Name or IP Address Inaccessible?
- How Do I Handle False Alarms as WAF Blocks Normal Requests to My Website?
- Why Are HTTPS Requests Denied on Some Mobile Phones?
- How Do I Fix an Incomplete Certificate Chain?
- Why Does My Certificate Not Match the Key?
- Why Am I Seeing Error Code 418?
- How Can I Upload Files After the Website Is Connected to WAF?
- Why Does WAF Block Normal Requests as Invalid Requests?
- How Do I Whitelist IP Address Ranges of Cloud WAF?
- What Is the Connection Timeout Duration of WAF? Can I Manually Set the Timeout Duration?
- How Do I Solve the Problem of Excessive Redirection Times?
- Why Am I Seeing Error Code 523?
- Why Does the Website Login Page Continuously Refreshed After a Domain Name Is Connected to WAF?
- Why Does the Requested Page Respond Slowly After the HTTP Forwarding Policy Is Configured?
- Why Am I Seeing Error Code 414 Request-URI Too Large?
- What Do I Do If the Protocol Is Not Supported and the Client and Server Do Not Support Common SSL Protocol Versions or Cipher Suites?
- Why Cannot I Access the Dedicated Engine Page?
- Why Is the Bar Mitzvah Attack on SSL/TLS Detected?
-
Protection Rule Configuration
- Basic Web Protection
- CC Attack Protection Rules
- Precise Protection rules
- Anti-Crawler Protection
-
Others
- In Which Situations Will the WAF Policies Fail?
- Can I Export or Back Up the WAF Configuration?
- What Working Modes and Protection Mechanisms Does WAF Have?
- Which Protection Rules Are Included in the System-Generated Policy?
- What Types of Protection Rules Does WAF Support?
- Which of the WAF Protection Rules Support the Log-Only Protective Action?
- Why Does the Page Fail to Be Refreshed After WTP Is Enabled?
- What Are the Differences Between Blacklist/Whitelist Rules and Precise Protection Rules on Blocking Access Requests from Specified IP Addresses?
- What Do I Do If a Scanner, such as AppScan, Detects that the Cookie Is Missing Secure or HttpOnly?
-
About the Product
- Change History
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- WAF Operation Guide
- Enabling WAF
- Creating a User Group and Granting Permissions
- Connecting a Website to WAF
- Viewing Protection Events
-
Configuring Protection Policies
- Protection Configuration Overview
- Configuring Basic Web Protection to Defend Against Common Web Attacks
- Configuring CC Attack Protection Rules to Defend Against CC Attacks
- Configuring Custom Precise Protection Rules
- Configuring IP Address Blacklist and Whitelist Rules to Block or Allow Specified IP Addresses
- Configuring Geolocation Access Control Rules to Block or Allow Requests from Specific Locations
- Configuring Web Tamper Protection Rules to Prevent Static Web Pages from Being Tampered With
- Configuring Anti-Crawler Rules
- Configuring Information Leakage Prevention Rules to Protect Sensitive Information from Leakage
- Configuring a Global Protection Whitelist Rule to Ignore False Alarms
- Configuring Data Masking Rules to Prevent Privacy Information Leakage
- Creating a Reference Table to Configure Protection Metrics in Batches
- Configuring a Known Attack Source Rule to Block Specific Visitors for a Specified Duration
- Condition Field Description
- Viewing the Dashboard
-
Website Settings
-
Recommended Configurations After Website Connection
- Configuring PCI DSS/3DS Compliance Check and TLS
- Enabling the HTTP/2 Protocol
- Configuring Header Forwarding
- Modifying the Alarm Page
- Switching the Load Balancing Algorithm
- Configuring a Traffic Identifier for a Known Attack Source
- Configuring a Timeout for Connections Between WAF and a Website Server
- Managing Websites
-
Recommended Configurations After Website Connection
- Policy Management
- Object Management
- Instance Management
- Permissions Management
- Monitoring and Auditing
-
FAQs
-
About WAF
- WAF Basics
- Can WAF Protect an IP Address?
- What Objects Does WAF Protect?
- Does WAF Block Customized POST Requests?
- What Are the Differences Between the Web Tamper Protection Functions of WAF and HSS?
- Which Web Service Framework Protocols Does WAF Support?
- Can WAF Protect Websites Accessed Through HSTS or NTLM Authentication?
- What Are the Differences Between WAF Forwarding and Nginx Forwarding?
- Can I Configure Session Cookies in WAF?
- How Does WAF Detect SQL Injection, XSS, and PHP Injection Attacks?
- Can WAF Defend Against the Apache Struts2 Remote Code Execution Vulnerability (CVE-2021-31805)?
- Why Does the Vulnerability Scanning Tool Report Disabled Non-standard Ports for My WAF-Protected Website?
- Will Traffic Be Permitted After WAF Is Switched to the Bypassed Mode?
- What Are Local File Inclusion and Remote File Inclusion?
- What Is the Difference Between QPS and the Number of Requests?
- Does WAF Support Custom Authorization Policies?
- Why Do Cookies Contain the HWWAFSESID or HWWAFSESTIME field?
- Can I Switch Between the WAF Cloud Mode and Dedicated Mode?
-
Website Connect Issues
- How Does a Dedicated WAF Instance Protect Non-Standard Ports That Are Not Supported by the Dedicated Instance?
- How Do I Configure Domain Names to Be Protected When Adding Domain Names?
- Do I Have to Configure the Same Port as That of the Origin Server When Adding a Website to WAF?
- How Do I Whitelist Back-to-Source IP Addresses of Cloud WAF?
- What Are the Precautions for Configuring Multiple Server Addresses for Backend Servers?
- Does WAF Support Wildcard Domain Names?
- How Does WAF Forward Access Requests When Both a Wildcard Domain Name and a Single Domain Name Are Connected to WAF?
- Why Am I Seeing the "Someone else has already added this domain name. Please confirm that the domain name belongs to you" Error Message?
- Why Cannot I Select a Client Protocol When Adding a Domain Name?
- Can I Set the Origin Server Address to a CNAME Record If I Use Cloud WAF?
- Can I Access a Website Using an IP Address After a Domain Name Is Connected to WAF?
- How Can I Forward Requests Directly to the Origin Server Without Passing Through WAF?
-
Protection Rules
- Which Protection Levels Can Be Set for Basic Web Protection?
- What Is the Peak Rate of CC Attack Protection?
- When Is Cookie Used to Identify Users?
- What Are the Differences Between Rate Limit and Allowable Frequency in a CC Rule?
- Why Cannot the Verification Code Be Refreshed When Verification Code Is Configured in a CC Attack Protection Rule?
- Can I Batch Add IP Addresses to a Blacklist or Whitelist Rule?
- Can I Import or Export a Blacklist or Whitelist into or from WAF?
- Why Does a Requested Page Fail to Respond to the Client After the JavaScript-based Anti-Crawler Is Enabled?
- Is There Any Impact on Website Loading Speed If Other Crawler Check in Anti-Crawler Is Enabled?
- How Does JavaScript Anti-Crawler Detection Work?
- In Which Situations Will the WAF Policies Fail?
- How Do I Allow Only Specified IP Addresses to Access Protected Websites?
- Which Protection Rules Are Included in the System-Generated Policy?
- Why Does the Page Fail to Be Refreshed After WTP Is Enabled?
- What Are the Differences Between Blacklist/Whitelist Rules and Precise Protection Rules on Blocking Access Requests from Specified IP Addresses?
- What Do I Do If a Scanner, such as AppScan, Detects that the Cookie Is Missing Secure or HttpOnly?
- Certificate Management
-
Protection Event Logs
- Can WAF Log Protection Events?
- How Do I Obtain Data about Block Actions?
- What Does "Mismatch" for "Protective Action" Mean in the Event List?
- How Long Can WAF Protection Logs Be Stored?
- Can I Query Protection Events of a Batch of Specified IP Addresses at Once?
- Will WAF Record Unblocked Events?
- Why Is the Traffic Statistics on WAF Inconsistent with That on the Origin Server?
- Troubleshooting Website Connection Exceptions
-
Troubleshooting Certificate and Cipher Suite Issues
- How Do I Fix an Incomplete Certificate Chain?
- Why Does My Certificate Not Match the Key?
- Why Are HTTPS Requests Denied on Some Mobile Phones?
- What Do I Do If the Protocol Is Not Supported and the Client and Server Do Not Support Common SSL Protocol Versions or Cipher Suites?
- Why Is the Bar Mitzvah Attack on SSL/TLS Detected?
-
Troubleshooting Traffic Forwarding Exceptions
- What Is Error Code 404, 502, or 504 Returned to Visitors After My Website or Application Is Connected to WAF?
- Why Am I Seeing Error Code 418?
- Why Am I Seeing Error Code 523?
- Why Was My Website Redirected So Many Times?
- Why Am I Seeing Error Code 414 Request-URI Too Large?
- What Is the Connection Timeout Duration of WAF? Can I Manually Set the Timeout Duration?
- Checking Whether Normal Requests Are Blocked Mistakenly
-
About WAF
-
User Guide (Kuala Lumpur Region)
- Service Overview
- WAF Operation Guide
- Enabling WAF
- Dashboard
- Events
-
Policies
- How to Configure WAF Protection
- Configuring Basic Protection Rules to Defend Against Common Web Attacks
- Configuring a CC Attack Protection Rule
- Configuring Custom Precise Protection Rules
- Configuring IP Address Blacklist and Whitelist Rules to Block or Allow Specified IP Addresses
- Configuring Geolocation Access Control Rules to Block or Allow Requests from Specific Locations
- Configuring Web Tamper Protection Rules to Prevent Static Web Pages from Being Tampered With
- Configuring Anti-Crawler Rules
- Configuring Information Leakage Prevention Rules to Protect Sensitive Information from Leakage
- Configuring a Global Protection Whitelist Rule to Ignore False Alarms
- Configuring Data Masking Rules to Prevent Privacy Information Leakage
- Creating a Reference Table to Configure Protection Metrics In Batches
- Configuring a Known Attack Source Rule to Block Specific Visitors for a Specified Duration
- Condition Field Description
- Managing Policies
- Website Settings
- Object Management
- System Management
- Permissions Management
- Monitoring and Auditing
-
FAQs
-
About WAF
- FAQs for Beginners
-
WAF Functions
- Can WAF Protect an IP Address?
- What Objects Does WAF Protect?
- Does WAF Block Customized POST Requests?
- What Are the Differences Between the Web Tamper Protection Functions of WAF and HSS?
- Which Web Service Framework Protocols Does WAF Support?
- Can WAF Protect Websites Accessed Through HSTS or NTLM Authentication?
- What Are the Differences Between WAF Forwarding and Nginx Forwarding?
- Can I Configure Session Cookies in WAF?
- How Does WAF Detect SQL Injection, XSS, and PHP Injection Attacks?
- Can WAF Defend Against the Apache Struts2 Remote Code Execution Vulnerability (CVE-2021-31805)?
-
WAF Usage
- Why Does the Vulnerability Scanning Tool Report Disabled Non-standard Ports for My WAF-Protected Website?
- How Do I Obtain the Real IP Address of a Web Visitor?
- What Are Local File Inclusion and Remote File Inclusion?
- What Is the Difference Between QPS and the Number of Requests?
- How Do I Configure My Server to Allow Only Requests from WAF?
- Why Do Cookies Contain the HWWAFSESID or HWWAFSESTIME field?
- Can I Switch Between the WAF Cloud Mode and Dedicated Mode?
- How Do I Configure WAF If a Reverse Proxy Server Is Deployed for My Website?
- How Does WAF Forward Access Requests When Both a Wildcard Domain Name and a Single Domain Name Are Connected to WAF?
- Service Request/Specification
-
Website Domain Name Access Configuration
-
Domain Name and Port Configuration
- How Do I Add a Domain Name/IP Address to WAF?
- Which Non-Standard Ports Does WAF Support?
- How Do I Use a Dedicated WAF Instance to Protect Non-Standard Ports That Are Not Supported by the Dedicated Instance?
- How Do I Configure Domain Names to Be Protected When Adding Domain Names?
- Do I Have to Configure the Same Port as That of the Origin Server When Adding a Website to WAF?
- How Do I Configure Non-standard Ports When Adding a Protected Domain Name?
- What Can I Do If One of Ports on an Origin Server Does Not Require WAF Protection?
- What Data Is Required for Connecting a Domain Name/IP Address to WAF?
- How Do I Safely Delete a Protected Domain Name?
- Can I Change the Domain Name That Has Been Added to WAF?
- What Are the Precautions for Configuring Multiple Server Addresses for Backend Servers?
- Does WAF Support Wildcard Domain Names?
- How Do I Route Website Traffic to My Cloud WAF Instance?
- Can I Configure Multiple Load Balancers for a Dedicated WAF Instance?
- Why Am I Seeing the "Someone else has already added this domain name. Please confirm that the domain name belongs to you" Error Message?
- Certificate Management
- Server Configuration
- Operations After Connecting Websites to WAF
-
Domain Name and Port Configuration
-
Service Interruption Check
- How Do I Troubleshoot 404/502/504 Errors?
- Why Is My Domain Name or IP Address Inaccessible?
- How Do I Handle False Alarms as WAF Blocks Normal Requests to My Website?
- Why Does WAF Block Normal Requests as Invalid Requests?
- How Do I Whitelist IP Address Ranges of Cloud WAF?
- What Is the Connection Timeout Duration of WAF? Can I Manually Set the Timeout Duration?
- How Do I Solve the Problem of Excessive Redirection Times?
- Why Are HTTPS Requests Denied on Some Mobile Phones?
- How Do I Fix an Incomplete Certificate Chain?
- Why Does My Certificate Not Match the Key?
- Why Am I Seeing Error Code 418?
- Why Am I Seeing Error Code 523?
- Why Does the Website Login Page Continuously Refreshed After a Domain Name Is Connected to WAF?
- Why Does the Requested Page Respond Slowly After the HTTP Forwarding Policy Is Configured?
- How Can I Upload Files After the Website Is Connected to WAF?
- Why Am I Seeing Error Code 414 Request-URI Too Large?
- What Do I Do If the Protocol Is Not Supported and the Client and Server Do Not Support Common SSL Protocol Versions or Cipher Suites?
- Why Cannot I Access the Dedicated Engine Page?
- Why Is the Bar Mitzvah Attack on SSL/TLS Detected?
-
Protection Rule Configuration
- Basic Web Protection
- CC Attack Protection Rules
- Precise Protection rules
- IP Address Blacklist and Whitelist
- Anti-Crawler Protection
-
Others
- In Which Situations Will the WAF Policies Fail?
- What Working Modes and Protection Mechanisms Does WAF Have?
- What Types of Protection Rules Does WAF Support?
- Which of the WAF Protection Rules Support the Log-Only Protective Action?
- Which Protection Rules Are Included in the System-Generated Policy?
- Why Does the Page Fail to Be Refreshed After WTP Is Enabled?
- What Are the Differences Between Blacklist/Whitelist Rules and Precise Protection Rules on Blocking Access Requests from Specified IP Addresses?
- What Do I Do If a Scanner, such as AppScan, Detects that the Cookie Is Missing Secure or HttpOnly?
-
Protection Event Logs
- Can WAF Log Protection Events?
- How Do I Obtain Data about Block Actions?
- What Does "Mismatch" for "Protective Action" Mean in the Event List?
- How Long Can WAF Protection Logs Be Stored?
- Can I Query Protection Events of a Batch of Specified IP Addresses at Once?
- Will WAF Record Unblocked Events?
- Why Is the Traffic Statistics on WAF Inconsistent with That on the Origin Server?
-
About WAF
- Change History
-
User Guide (Ankara Region)
- Service Overview
- Overview
- Applying for a Dedicated WAF Engine
- Enabling WAF Protection
-
Website Domain Name Management
- Viewing Basic Information
- Switching WAF Working Mode
- Configuring the Minimum TLS Version and Cipher Suite
- Configuring Connection Timeout
- Configuring Connection Protection
- Updating a Certificate
- Configuring a Traffic Identifier for a Known Attack Source
- Editing Server Information
- Modifying the Alarm Page
- Removing a Protected Website from WAF
- Certificate Management
- Managing IP Address Blacklist and Whitelist Groups
-
Rule Configuration
- Configuration Guidance
- Configuring Basic Web Protection Rules
- Configuring a CC Attack Protection Rule
- Configuring a Precise Protection Rule
- Adding a Reference Table
- Configuring an IP Address Blacklist or Whitelist Rule
- Configuring a Known Attack Source Rule
- Configuring a Geolocation Access Control Rule
- Configuring a Web Tamper Protection Rule
- Configuring Anti-Crawler Rules
- Configuring an Information Leakage Prevention Rule
- Configuring a Global Protection Whitelist (Formerly False Alarm Masking) Rule
- Configuring a Data Masking Rule
- Dashboard
- Event Management
- Enabling Alarm Notifications
- Policy Management
- Dedicated WAF Engine Management
- Viewing Product Details
- Permissions Management
-
FAQs
-
About WAF
-
WAF Functions
- Can WAF Protect an IP Address?
- What Objects Does WAF Protect?
- Which OSs Does WAF Support?
- Which Layers Does WAF Provide Protection At?
- Does WAF Support File Caching?
- About WAF Protection
- Does WAF Support Two-Way SSL Authentication?
- Does WAF Support Application Layer Protocol- and Content-Based Access Control?
- Can WAF Check the Body I Add to a POST Request?
- Can WAF Limit the Access Speed of a Domain Name?
- Can WAF Block Data Packets in multipart/form-data Format?
- Can a WAF Instance Be Deployed in the VPC?
- Can WAF Block URL Requests That Contain Special Characters?
- Can WAF Block Spam and Malicious User Registrations?
- Can WAF Block Requests for Calling Other APIs from Web Pages?
- Can I Configure Session Cookies in WAF?
- Does WAF Block Customized POST Requests?
- Can WAF Limit Access Through Domain Names?
- Does WAF Have the IPS Module?
- Which Web Service Framework Protocols Does WAF Support?
- Can WAF Protect Websites Accessed Through HSTS or NTLM Authentication?
- What Are the Differences Between WAF Forwarding and Nginx Forwarding?
- Does WAF Cache Website Data?
- Is WAF a Hardware Firewall or a Software Firewall?
- Is There Any Impact on Origin Servers If I Enable HTTP/2 in WAF?
- How Does WAF Detect SQL Injection and XSS Attacks?
- Can WAF Defend Against the Apache Struts2 Remote Code Execution Vulnerability (CVE-2021-31805)?
- Does a Dedicated WAF Instance Support Cross-VPC Protection?
-
WAF Usage
- Why Does the Vulnerability Scanning Tool Report Disabled Non-standard Ports for My WAF-Protected Website?
- Does WAF Affect Email Ports or Email Receiving and Sending?
- How Do I Obtain the Real IP Address of a Web Visitor?
- How Does WAF Block Requests?
- What Are Local File Inclusion and Remote File Inclusion?
- What Is the Difference Between QPS and the Number of Requests?
- What Are Concurrent Requests?
- Can WAF Block Requests When a Certificate Is Mounted on ELB?
- Does WAF Affect My Existing Workloads and Server Running?
- How Do I Configure My Server to Allow Only Requests from WAF?
- Why Do Cookies Contain the HWWAFSESID or HWWAFSESTIME field?
- How Do I Configure WAF If a Reverse Proxy Server Is Deployed for My Website?
- How Does WAF Forward Access Requests When Both a Wildcard Domain Name and a Single Domain Name Are Connected to WAF?
- Does WAF Affect Data Transmission from the Internal Network to an External Network?
- Do I Need to Make Some Changes in WAF If the Security Group for Origin Server (Address) Is Changed?
-
WAF Functions
-
Website Domain Name Access Configuration
-
Domain Name and Port Configuration
- How Do I Add a Domain Name/IP Address to WAF?
- Which Non-Standard Ports Does WAF Support?
- Can WAF Protect Multiple Domain Names That Point to the Same Origin Server?
- How Do I Configure Domain Names to Be Protected When Adding Domain Names?
- Do I Have to Configure the Same Port as That of the Origin Server When Adding a Website to WAF?
- What Can I Do If One of Ports on an Origin Server Does Not Require WAF Protection?
- What Data Is Required for Connecting a Domain Name/IP Address to WAF?
- How Do I Safely Delete a Protected Domain Name?
- Can I Change the Domain Name That Has Been Added to WAF?
- What Are the Precautions for Configuring Multiple Server Addresses for Backend Servers?
- Does WAF Support Wildcard Domain Names?
- Can I Configure Multiple Load Balancers for a Dedicated WAF Instance?
- Why Am I Seeing the "Someone else has already added this domain name. Please confirm that the domain name belongs to you" Error Message?
- Certificate Management
-
Domain Name and Port Configuration
-
Service Interruption Check
- How Do I Troubleshoot 404/502/504 Errors?
- Why Is My Domain Name or IP Address Inaccessible?
- How Do I Handle False Alarms as WAF Blocks Normal Requests to My Website?
- Why Does WAF Block Normal Requests as Invalid Requests?
- What Is the Connection Timeout Duration of WAF? Can I Manually Set the Timeout Duration?
- How Do I Solve the Problem of Excessive Redirection Times?
- Why Are HTTPS Requests Denied on Some Mobile Phones?
- How Do I Fix an Incomplete Certificate Chain?
- Why Does My Certificate Not Match the Key?
- Why Am I Seeing Error Code 418?
- Why Am I Seeing Error Code 523?
- Why Does the Website Login Page Continuously Refreshed After a Domain Name Is Connected to WAF?
- Why Does the Requested Page Respond Slowly After the HTTP Forwarding Policy Is Configured?
- How Can I Upload Files After the Website Is Connected to WAF?
- Why Is the Bar Mitzvah Attack on SSL/TLS Detected?
-
Protection Rule Configuration
- Basic Web Protection
- CC Attack Protection Rules
- Precise Protection rules
- Anti-Crawler Protection
-
Others
- In Which Situations Will the WAF Policies Fail?
- Is the Path of a WAF Protection Rule Case-sensitive?
- What Protection Rules Does WAF Support?
- Which of the WAF Protection Rules Support the Log-Only Protective Action?
- Why Does the Page Fail to Be Refreshed After WTP Is Enabled?
- What Are the Differences Between Blacklist/Whitelist Rules and Precise Protection Rules on Blocking Access Requests from Specified IP Addresses?
- What Do I Do If a Scanner, such as AppScan, Detects that the Cookie Is Missing Secure or HttpOnly?
-
About WAF
- Change History
-
API Reference (Paris)
- Before You Start
- API Overview
- API Calling
-
APIs
-
Cloud Mode
- Resource Quotas
- Domain Names
- Certificate Management
- Protection Status and Domain Setup
- Policies
- Blacklist and Whitelist Rules
- CC Attack Protection Rules
- Precise Protection Rules
- Data Masking Rules
- Web Tamper Protection Rules
- False Alarm Masking Rules
-
Event Logs
- Querying Attack Event Logs
- Querying Attack Event Logs by ID
- Querying Event Distribution
- Querying Request Statistics and Attack Statistics in a Specified Time Range
- Querying the Total Number of Attacks
- Querying Top N Attack Source IP Addresses
- Querying the Number of Attack Source IP Addresses
- Querying the Total Number of Requests per Second
- Querying the List of Event Log Files
- Alarm Notification
- Obtaining Option Details
- Interconnecting with Cloud Eye
-
Dedicated Mode
- Dedicated Instance Management
- Domain Names Protected by WAF
- Protection Status and Domain Name Access
- Policy Management
- Blacklist and Whitelist Rule Management
- CC Attack Protection Rule Management
- Precise Protection Rule Management
- Data Masking Rule Management
- Web Tamper Protection Rule Management
- False Alarm Masking Rule Management
- Dashboard
- Protection Event Management
- Certificate Management
-
Cloud Mode
- Permissions and Supported Actions
- Appendix
- Change History
-
API Reference (Kuala Lumpur Region)
- Before You Start
- API Overview
- API Calling
-
API
- Policy Management
-
Rule Management
- Querying False Alarm Masking Rules
- Querying the Reference Table List
- Creating a Reference Table
- Modifying a Reference Table
- Deleting a Reference Table
- Querying the List of Blacklist and Whitelist Rules
- Creating a Whitelist or Blacklist Rule
- Updating a Whitelist or Blacklist Rule
- Deleting a Whitelist or Blacklist Rule
- Adding a Data Masking Rule
- Querying a Data Masking Rule
- Updating a Data Masking Rule
- Deleting a Data Masking Rule
- Querying the Geolocation Access Control Rule List
- Creating a Geolocation Access Control Rule
- Updating a Geolocation Access Control Rule
- Deleting a Geolocation Access Control Rule
- Querying the List of Web Tamper Protection Rules
- Creating a Web Tamper Protection Rule
- Deleting a Web Tamper Protection Rule
- Changing the Status of a Rule
- Certificate Management
- Event Management
-
Protected Website Management in Dedicated Mode
- Connecting a Domain Name to a Dedicated WAF Instance
- Querying the List of Domain Names Connected to Dedicated WAF Instances
- Modifying the Configuration of a Domain Name Connected to a Dedicated WAF Instance
- Querying the Domain Name Configuration in Dedicated Mode
- Deleting a Domain Name from a Dedicated WAF Instance
- Modifying the Protection Status of a Domain Name Connected to a Dedicated WAF Instance
- Dashboard
- Querying the Protected Domain Names
- Querying Features Available in a Site
-
Managing Websites Protected by Cloud WAF
- Querying Domain Names Protected by Cloud WAF
- Adding a Domain Name to Cloud WAF
- Modifying the Protection Status for a Domain Name
- Obtaining Domain Name Route Information in Cloud Mode
- Querying a Domain Name Protected by Cloud WAF by ID
- Updating a Domain Name Protected by Cloud WAF
- Removing a Domain Name from Cloud WAF
- Appendix
- Change History
-
API Reference (Ankara Region)
- Before You Start
- API Overview
- API Calling
-
APIs
-
Managing Websites Protected by Dedicated WAF Engines
- Querying Domain Names Protected by Dedicated WAF Engines
- Adding a Domain Name to a Dedicated WAF Instance
- Modifying a Domain Name Protected by a Dedicated WAF Instance
- Querying Domain Name Settings in Dedicated Mode
- Deleting a Domain Name from a Dedicated WAF Instance
- Modifying the Protection Status of a Domain Name in Dedicated Mode
- Policy Management
-
Rule Management
- Changing the Status of a Rule
- Querying Global Protection Whitelist (Formerly False Alarm Masking) Rules
- Creating a Global Protection Whitelist (Formerly False Alarm Masking) Rule
- Deleting a Global Protection Whitelist (Formerly False Alarm Masking) Rule
- Querying the Blacklist and Whitelist Rule List
- Creating a Blacklist/Whitelist Rule
- Updating a Blacklist or Whitelist Protection Rule
- Deleting a Blacklist or Whitelist Rule
- Querying a Data Masking Rule
- Creating a Data Masking Rule
- Updating a Data Masking Rule
- Deleting a Data Masking Rule
- Querying the List of Geolocation Access Control Rules
- Creating a Geolocation Access Control Rule
- Updating a Geolocation Access Control Rule
- Deleting a Geolocation Access Control Rule
- Querying the List of Web Tamper Protection Rules
- Creating a Web Tamper Protection Rule
- Deleting a Web Tamper Protection Rule
- Querying the Reference Table List
- Creating a Reference Table
- Modifying a Reference Table
- Deleting a Reference Table
- Certificate Management
- Event Management
- Querying the Domain Name of a Tenant
-
Managing Websites Protected by Dedicated WAF Engines
- Appendix
- Change History
-
API Reference (ME-Abu Dhabi Region)
- Before You Start
- API Calling
-
APIs
-
Managing Websites Protected by Dedicated WAF Engines
- Querying Domain Names Protected by Dedicated WAF Engines
- Adding a Domain Name to a Dedicated WAF Instance
- Modifying a Domain Name Protected by a Dedicated WAF Instance
- Querying Domain Name Settings in Dedicated Mode
- Deleting a Domain Name from a Dedicated WAF Instance
- Modifying the Protection Status of a Domain Name in Dedicated Mode
- Policy Management
-
Rule Management
- Changing the Status of a Rule
- Querying Global Protection Whitelist (Formerly False Alarm Masking) Rules
- Creating a Global Protection Whitelist (Formerly False Alarm Masking) Rule
- Deleting a Global Protection Whitelist (Formerly False Alarm Masking) Rule
- Querying the Blacklist and Whitelist Rule List
- Creating a Blacklist/Whitelist Rule
- Updating a Blacklist or Whitelist Protection Rule
- Deleting a Blacklist or Whitelist Rule
- Querying a Data Masking Rule
- Creating a Data Masking Rule
- Updating a Data Masking Rule
- Deleting a Data Masking Rule
- Querying the List of Geolocation Access Control Rules
- Creating a Geolocation Access Control Rule
- Updating a Geolocation Access Control Rule
- Deleting a Geolocation Access Control Rule
- Querying the List of Web Tamper Protection Rules
- Creating a Web Tamper Protection Rule
- Deleting a Web Tamper Protection Rule
- Querying the Reference Table List
- Creating a Reference Table
- Modifying a Reference Table
- Deleting a Reference Table
- Certificate Management
- Event Management
- Querying the Domain Name of a Tenant
-
Managing Websites Protected by Dedicated WAF Engines
- Querying Domain Names Protected by Dedicated WAF Engines
- Adding a Domain Name to a Dedicated WAF Instance
- Modifying a Domain Name Protected by a Dedicated WAF Instance
- Querying Domain Name Settings in Dedicated Mode
- Deleting a Domain Name from a Dedicated WAF Instance
- Modifying the Protection Status of a Domain Name in Dedicated Mode
- Policy Management
-
Rule Management
- Changing the Status of a Rule
- Querying Global Protection Whitelist (Formerly False Alarm Masking) Rules
- Creating a Global Protection Whitelist (Formerly False Alarm Masking) Rule
- Deleting a Global Protection Whitelist (Formerly False Alarm Masking) Rule
- Querying the Blacklist and Whitelist Rule List
- Creating a Blacklist/Whitelist Rule
- Updating a Blacklist or Whitelist Protection Rule
- Deleting a Blacklist or Whitelist Rule
- Querying a Data Masking Rule
- Creating a Data Masking Rule
- Updating a Data Masking Rule
- Deleting a Data Masking Rule
- Querying the List of Geolocation Access Control Rules
- Creating a Geolocation Access Control Rule
- Updating a Geolocation Access Control Rule
- Deleting a Geolocation Access Control Rule
- Querying the List of Web Tamper Protection Rules
- Creating a Web Tamper Protection Rule
- Deleting a Web Tamper Protection Rule
- Querying the Reference Table List
- Creating a Reference Table
- Modifying a Reference Table
- Deleting a Reference Table
- Certificate Management
- Event Management
- Querying the Domain Name of a Tenant
-
Protected Website Management in Cloud Mode
- This API is used to query the list of domain names protected in cloud mode.
- Adding a Domain Name to the Cloud WAF
- Querying Details About a Domain Name by Domain Name ID in Cloud Mode
- Updating Configurations of Domain Names Protected with Cloud WAF
- Deleting a Domain Name from the Cloud WAF
- Changing Protection Status of a Domain Name
- Dedicated Instance Management
-
Managing Websites Protected by Dedicated WAF Engines
- Querying Domain Names Protected by Dedicated WAF Engines
- Adding a Domain Name to a Dedicated WAF Instance
- Modifying a Domain Name Protected by a Dedicated WAF Instance
- Querying Domain Name Settings in Dedicated Mode
- Deleting a Domain Name from a Dedicated WAF Instance
- Modifying the Protection Status of a Domain Name in Dedicated Mode
- Policy Management
-
Rule Management
- Changing the Status of a Rule
- Querying False Alarm Masking Rules
- Creating a Global Protection Whitelist (Formerly False Alarm Masking) Rule
- Deleting a False Alarm Masking Rule
- Querying the Blacklist and Whitelist Rule List
- Creating a Blacklist/Whitelist Rule
- Updating a Blacklist or Whitelist Protection Rule
- Deleting a Blacklist or Whitelist Rule
- Querying a Data Masking Rule
- Creating a Data Masking Rule
- Updating a Data Masking Rule
- Deleting a Data Masking Rule
- Querying the List of Geolocation Access Control Rules
- Creating a Geolocation Access Control Rule
- Updating a Geolocation Access Control Rule
- Deleting a Geolocation Access Control Rule
- Querying the List of Web Tamper Protection Rules
- Creating a Web Tamper Protection Rule
- Deleting a Web Tamper Protection Rule
- Querying the Reference Table List
- Creating a Reference Table
- Modifying a Reference Table
- Deleting a Reference Table
- Certificate Management
- Dashboard
- Event Management
- Querying the Domain Name of a Tenant
-
Managing Websites Protected by Dedicated WAF Engines
- Appendix
- Change History
-
User Guide (Paris)
- General Reference
Show all
Function Overview
- ALL
- Web Application Firewall
- Cloud Mode
- Cloud Mode - CNAME Access
- Cloud Mode - Load Balancer Access
- Dedicated Mode
- Support Non-Standard Ports
- WAF Engine Detection Mechanism
- Basic Web Protection
- Bot Rules
- CC Attack Protection
- Precise Protection
- Configure Blacklist and Whitelist
- Geolocation Access Control
- Threat Intelligence Access Control
- Web Tamper Protection
- Anti-Crawler
- Information Leakage Prevention
- Global Protection Whitelist
- Data Mask
- Scanning Protection
- Configure Known Attack Source
- Reference Tables
- Configure PCI DSS/3DS Certification Check and TLS
- HTTP/2
- Response Body Length in Logs (Bytes)
- Forwarding Request and Response Header Fields
- Modifying the Alarm Page
- Stopping WAF from Inserting Cookie Fields
- IPv6 Protection
- Load Balancing Algorithms
- Cookie Security Attributes
- Verification Code
- Custom Log Trace ID
- Traffic Identifiers for Known Attack Sources
- Connection Timeout
- Connection Protection
- JA3/JA4 Fingerprint Tag
- Domain Management
- Protection Event Logs
- Certificate Management
- Alarm Notification
-
Web Application Firewall
-
Web Application Firewall (WAF) keeps web services stable and secure. It examines all HTTP and HTTPS requests to detect and block the following attacks: Structured Query Language (SQL) injection, cross-site scripting (XSS), web shells, command and code injections, file inclusion, sensitive file access, third-party vulnerability exploits, Challenge Collapsar (CC) attacks, malicious crawlers, and cross-site request forgery (CSRF).
After buying a WAF instance, you need to add your website domain to the WAF instance on the WAF console. All public network traffic destined for your website then goes to WAF first. WAF identifies and filters out the illegitimate traffic, and routes only the legitimate traffic to your origin server. This keeps your origin servers secure.WAF supports two deployment modes: Cloud Mode and Dedicated Mode.
Available in all regions.
-
-
Cloud Mode
-
Cloud mode is a cloud-based WAF deployment method. In this mode, Huawei Cloud WAF cluster resources are shared with all users. With this mode, you do not need to deploy any hardware or maintain the software. It is ready for use out of the box, highly available, and auto-scalable. You can select yearly/monthly or pay-per-using billing.
- With cloud mode, you can select CNAME or Load balancer access to connect your website to WAF.
- The cloud mode supports Yearly/Monthly (prepaid) billing. There are four WAF editions available: Starter, Standard, Professional, and Enterprise.
- If the quota of domain names, QPS, bandwidth, or IP address blacklist and whitelist rules in the in-use edition (Standard, Professional, or Enterprise) cannot meet service requirements, you can buy domain name expansion packages, QPS expansion packages, or rule extension packages to increase the quota.
Available in all regions.
-
Expansion Package
-
If the edition is Standard, Professional, or Enterprise, you can buy domain name expansion packages, QPS expansion packages, or rule extension packages to increase the quota.
- Domain name Expansion Package: A domain package offers 10 domains.
- Bandwidth Expansion Package: A QPS expansion package can protect up to 20 Mbit/s of traffic for origin servers on Huawei Cloud or 50 Mbit/s for servers not on Huawei Cloud; or 1,000 Queries per Second (QPS). Each HTTP Get request is a query.
- Rule Expansion Package: A rule expansion packages can only be used to increate the quota of IP address blacklist and whitelist protection rules. One rule expansion package supports up to 10 IP address blacklist and whitelist protection rules.
Available in all regions.
- Domain name Expansion Package: A domain package offers 10 domains.
-
-
-
Cloud Mode - CNAME Access
-
In this mode, DNS resolves the protected domain name to the CNAME record of the WAF cluster. WAF identifies and filters out malicious traffic and returns normal traffic to the origin server through back-to-source IP addresses.
With this mode, you can protect web services deployed on Huawei Cloud, non-Huawei Cloud, and on-premises servers. The protected objects are domain names.
Available in all regions.
-
-
Cloud Mode - Load Balancer Access
-
In this mode, WAF is integrated into the Elastic Load Balance (ELB) gateway through SDKs. After detecting and filtering malicious attack traffic, WAF synchronizes detection result to ELB. ELB then determines whether to forward client requests to the origin server based on the detection result it received.
With this mode, you can protect web services deployed on Huawei Cloud. The protected objects can be domain names, public IP addresses, and private IP addresses.
- The cloud load balancer access mode supports only dedicated load balancers with Specifications set to Application load balancing (HTTP/HTTPS).
- To enable the Cloud Mode - Load balancer access, you need to buy the Standard, Professional, or Enterprise edition and then submit a service ticket.
- If Cloud Mode - CNAME access and Cloud Mode - Load balancer access are in use, they can share the domain name, QPS, and rule expansion package quotas.
Available in the following regions: CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN South-Guangzhou, CN North-Beijing2, CN Southwest-Guiyang1, CN East-Shanghai2, CN East-Qingdao, CN South-Shenzhen, CN-Hong Kong, AP-Singapore, AF-Johannesburg, TR-Istanbul, and ME-Riyadh.
-
-
Dedicated Mode
-
The dedicated mode is an advanced deployment method. You have completely isolated and independently deployed protection nodes. Your WAF instance performance will be unaffected by attacks targeting other users' workloads in the cloud. This deployment method provides dedicated resources, robust custom protection, high availability, and disaster recovery.
- The dedicated mode supports pay-per-use (postpaid) billing.
- The dedicated mode supports Dedicated Mode access.
In dedicated mode, after a website is connected to WAF, the website traffic is sent to WAF through the ELB load balancer. WAF blocks abnormal requests and forwards normal requests to the origin server through the back-to-source IP address of the dedicated WAF engine.
- The dedicated mode has been discontinued in some regions. For details, see Notice on Web Application Firewall (Dedicated Mode) Discontinued.
Available in CN North-Beijing4, CN East-Shanghai1, CN South-Guangzhou, CN South-Shenzhen, CN Southwest-Guiyang1, CN-Hong Kong, AP-Bangkok, AP-Singapore, LA-Sao Paulo1, LA-Santiago, AF-Johannesburg and TR-Istanbul regions.
-
-
Support Non-Standard Ports
-
In addition to standard ports 80 and 443, WAF also supports non-standard ports.
Available in all regions.
-
-
WAF Engine Detection Mechanism
-
The built-in protection rules of WAF help you defend against common web application attacks, including XSS attacks, SQL injection, crawlers, and web shells. In addition, you can flexibly configure protection rules based on your website protection requirements.
Available in all regions.
-
-
Basic Web Protection
-
With an extensive preset reputation database, WAF defends against Open Web Application Security Project (OWASP) top 10 threats, malicious scanners, IP addresses, web shells, and other threats.
- All-around protection: WAF detects and blocks such threats as SQL injection, XSS, file inclusion, directory traversal attacks, sensitive file access, command and code injections, web shells, backdoors, malicious HTTP requests, and third-party vulnerability exploits.
- Precise identification: WAF uses built-in semantic analysis engine and regex engine and supports configuring of blacklist/whitelist rules, which reduces false positives.
WAF supports anti-escape and automatic restoration of common codes, which improves the capability of recognizing deformation web attacks.
WAF can decode a wide range of code types, including url_encode, Unicode, XML, C-OCT, hexadecimal, HTML escape, and base64 code, case confusion, JavaScript, shell, and PHP concatenation confusion.
Available in all regions.
-
-
Bot Rules
-
WAF can accurately identify and manage bot behavior in website traffic, effectively reducing risks such as data leakage and performance deterioration caused by bot attacks.
Available in all regions.
-
-
CC Attack Protection
-
You can customize your Challenge Collapsar (CC) attack rules to restrict access to a specific URL on your website based on a unique IP address, cookie, or Referer field. WAF identifies and mitigates CC attacks based on the protection rules you configured. For example, you can configure the following rule: If a user whose cookie ID is name accesses the /admin* page under your domain name for more than 10 times within 60 seconds, the user is forbidden to access the target website for 600 seconds.
The All WAF instances function is supported for CC attack protection rules. This function allows WAF to count requests to all your WAF instances for rate limiting. By default, requests to each WAF instance are counted for triggering a CC attack rule. If you enable this, WAF will count requests to all your WAF instances for triggering this rule.
- With Cloud Mode - CNAME mode, this function is supported in the following regions: CN North-Beijing1, CN North-Beijing4, CN South-Guangzhou, CN East-Shanghai1, and CN East-Shanghai2.
- If you are using the dedicated mode, you can submit a service ticket.
-
-
Precise Protection
-
With precise protection rules, WAF allows you to customize combinations of HTTP headers, cookies, URLs, request parameters, and client IP addresses, improving protection accuracy. Precise protection rules can be used in hotlinking prevention and website management background protection.
Available in all regions.
-
-
Configure Blacklist and Whitelist
-
This function allows you to blacklist or whitelist IP addresses or an IP address range to improve defense accuracy.
Available in all regions.
-
Blacklist and Whitelist IP Address Groups
-
You can use an IP address to manage IP addresses and IP address ranges. With an IP address group, you can quickly add IP addresses or IP address ranges to a blacklist or whitelist rule.
Available in the following regions: CN North-Beijing1, CN North-Beijing2, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, CN Southwest-Guiyang1, CN-Hong Kong, AP-Singapore, AP-Bangkok, LA-Santiago, AP-Jakarta, TR-Istanbul, and CN North-Ulanqab1
-
-
-
Geolocation Access Control
-
These rules allow you to customize access control for IP addresses forwarded from/to specified countries and provinces.
Available in all regions.
-
-
Threat Intelligence Access Control
-
Access is controlled based on the IP address library of an Internet Data Center (IDC)..
Available in all regions.
-
-
Web Tamper Protection
-
You can configure cache for static web pages. When a user accesses a web page, the system returns a cached page to the user and randomly checks whether the page is tampered with.
Available in all regions.
-
-
Anti-Crawler
-
Dynamically analyze website service models and accurately identify crawler behavior based on data risk control and bot identification systems, such as JS Challenge.
Available in CN North-Beijing1, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, CN Southwest-Guiyang1, CN-Hong Kong and AP-Bangkok regions.
-
-
Information Leakage Prevention
-
Prevents disclosure of sensitive information (such as ID numbers, phone numbers, and email addresses) , and response code interception: intercepts the specified HTTP status codes.
Available in all regions.
-
-
Global Protection Whitelist
-
If you select All protection for Ignore WAF Protection, all WAF rules do not take effect, and WAF allows all request traffic to the domain names in the rule.
If you select Basic Web Protection for Ignore WAF Protection, you can ignore basic web protection by rule ID, attack type, or all built-in rules. For example, if XSS check is not required for a URL, you can whitelist XSS rule.
Available in all regions.
-
-
Data Mask
-
Data masking prevents such data as passwords from being displayed in event logs.
Available in all regions.
-
-
Scanning Protection
-
The scanning protection module identifies scanning behaviors and scanner features to prevent attackers or scanners from scanning websites at scale.
Available in all regions.
-
-
Configure Known Attack Source
-
If WAF blocks a malicious request by IP address, Cookie, or Params, you can configure a known attack source rule to let WAF automatically block all requests from the attack source for a blocking duration set in the known attack source rule.
After a known attack source rule is added, you need to select the rule in basic web protection, precise protection, or blacklist and whitelist protection for the rule to take effect.Available in all regions.
-
-
Reference Tables
-
You can use a reference table to batch configure protection objects for the following types: Paths, User Agent, IP, Params, Cookie, Referer, and Header.
You can use reference tables for CC attack, precise access, and anti-crawler protection rules.
Available in all regions.
-
-
Configure PCI DSS/3DS Certification Check and TLS
-
When Client Protocol for a website to be protected is set to HTTPS, you can use WAF to set the minimum TLS version and cipher suite (a set of cryptographic algorithms) for the website. All requests using a TLS version earlier than the minimum TLS version cannot access the protected website so that your service is secured.
WAF allows you to enable PCI DSS and PCI 3DS certification checks. After PCI DSS or PCI 3DS certification check is enabled, the minimum TLS version is automatically set to TLS v1.2 to meet the PCI DSS and PCI 3DS certification requirements.Available in CN North-Beijing1, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, AP-Bangkok, AP-Singapore, and AF-Johannesburg regions.
-
-
HTTP/2
-
If your website is accessible over the HTTP/2 protocol, enable HTTP/2 in WAF. The HTTP/2 protocol can be used only for access between the client and WAF on the condition that at least one origin server has HTTPS used for Client Protocol.
Available in CN North-Beijing1, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, LA-Mexico City2.
-
-
Response Body Length in Logs (Bytes)
-
- You need to submit a service ticket to enable this function. WAF will log the response body within the length you configure in protection events.
Available in all regions.
-
-
Forwarding Request and Response Header Fields
-
If you enable and configure request and response header forwarding, WAF will insert fields you specify into the header field of requests and responses, and forwards the requests to your origin server, and the responses to the client. This helps you distinguish requests from different sources and better analyze website operating status.
This function is only supported for cloud mode CNAME access and dedicated mode.
Available in all regions.
-
-
Modifying the Alarm Page
-
WAF returns a default response page to visitors it blocks. You can also configure a Custom or Redirection page. WAF will return this page to blocked visitors.
Cloud Mode - Load balancer does not support the Redirection template.
Available in all regions.
-
-
Stopping WAF from Inserting Cookie Fields
-
WAF allows you to stop WAF from inserting the HWWAFSESTIME and HWWAFSESID fields into cookies. However, you should exercise caution when enabling this function. If WAF does not insert the HWWAFSESTIME and HWWAFSESID fields into cookies, CC attack protection rules (verification code), known attack source rules, and dynamic anti-crawler rules will be unable to work.
This function is only supported for cloud mode CNAME access and dedicated mode.
Available in all regions.
-
-
IPv6 Protection
-
You can enable IPv6 protection if needed. If IPv6 protection is enabled, WAF assigns an IPv6 access address to your domain name. WAF adds IPv6 address resolution to CNAME record sets by default. All IPv6 access requests are first forwarded to WAF. WAF detects and filters out malicious traffic and returns legitimate traffic to the origin server. This can keep origin servers secure, stable, and available.
-
-
Load Balancing Algorithms
-
If you configure one or more origin server addresses, you can use a load balancing algorithm to distribute traffic across these origin servers. WAF supports the following algorithms:
- Origin server IP hash: Requests from the same IP address are routed to the same backend server.
- Weighted round robin: Requests are distributed across backend servers in turn based on the weight you assign to each server.
- Session hash: Requests with the same session tag are routed to the same origin server. To enable this algorithm, configure traffic identifiers for known attack sources, or Session hash algorithm cannot take effect.
Available in CN North-Beijing1, CN North-Beijing2, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, CN-Hong Kong and AP-Bangkok regions.
-
-
Cookie Security Attributes
-
If you set Client Protocol to HTTPS, you can enable Cookie Security Attributes. If you enable this, the HttpOnly and Secure attributes of cookies will be set to true.
Cookies are inserted by back-end web servers and can be implemented through framework configuration or set-cookie. Secure and HttpOnly in cookies help defend against attacks, such as XSS attacks to obtain cookies, and help defend against cookie hijacking.
This function is only supported for cloud mode CNAME access and dedicated mode.
Available in all regions.
-
-
Verification Code
-
You need to submit a service ticket enable this function. If you enable this function, you can set Protective Action to Verification code and specify a response code displayed on the verification page when configuring the protection rule.
Available in all regions.
-
-
Custom Log Trace ID
-
You can configure a custom extended log field and record a specific header field in requests or responses to the custom_traceid field in logs.
This function is only supported for cloud mode CNAME access and dedicated mode.
Available in all regions.
-
-
Traffic Identifiers for Known Attack Sources
-
You can use WAF to add custom headers, for example, $request_id, to track requests. WAF can follow your configurations to insert additional fields into the request header field and forward the requests to origin servers. Note that the key value of a custom header field cannot be the same as any native Nginx fields.
Available in all regions.
-
-
Connection Timeout
-
If you want to set a timeout duration for each request between your WAF instance and origin server, enable Timeout Settings and specify WAF-to-Server connection timeout (s), Read timeout (s), and Write timeout (s). This function cannot be disabled once it is enabled.
- WAF-to-Server Connection Timeout: timeout for WAF and the origin server to establish a TCP connection.
- Write Timeout: Timeout set for WAF to send a request to the origin server. If the origin server does not receive a request within the specified write timeout, the connection times out.
- Read Timeout: Timeout set for WAF to read responses from the origin server. If WAF does not receive any response from the origin server within the specified read timeout, the connection times out.
Available in CN North-Beijing1, CN North-Beijing2, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, CN Southwest-Guiyang1, AP-Jakarta, CN-Hong Kong and AP-Singapore regions
-
-
Connection Protection
-
If a large number of 502 Bad Gateway and 504 Gateway Timeout errors are detected, you can enable WAF breakdown protection and connection protection to let WAF suspend your website and protect your origin servers from being crashed. When the 502/504 error requests and pending URL requests reach the thresholds you configure, WAF enables corresponding protection for your website.
Available in CN North-Beijing1, CN North-Beijing2, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen.
-
-
JA3/JA4 Fingerprint Tag
-
By analyzing TLS handshake metadata, it generates unique fingerprints to distinguish different client applications. With dedicated mode, if a layer-7 reverse proxy (for example, ELB) is deployed in front of WAF and its fingerprint is transferred to WAF with the header field, you can configure the JA3/JA4 fingerprint tags for the domain name protected by WAF. Then, the fingerprints along with tags will be transferred to WAF. WAF processes requests based on the TLS fingerprint (JA3) and TLS fingerprint (JA4) configured in the precise protection rule. This can mitigate JA3/JA4 fingerprinting attacks.
Available in all regions.
-
-
Domain Management
-
Editing Server Information
You can modify server information, including Client Protocol, Server Protocol, Server Address, and Server Port.
-
Deleting a Protected Domain
You can delete a protected website that you do not want to protect any more. Deletion takes effect within one minute. Note that deleted domain names cannot be recovered. You should exercise caution when deleting a protected website.
Available in all regions.
-
-
Protection Event Logs
-
On the Dashboard page, you can view event logs, including attack and request statistics, event distribution, top 10 attacked domain names, top 10 attack source IP addresses, and top 10 attacked URLs in a specified time frame, such as yesterday, today, past 3 days, past 7 days, or past 30 days.
On the Events page, you can view the event data of all protected domain names in the last 30 days.Available in all regions.
-
Enable LTS for WAF Logging
-
After you authorize WAF to access Log Tank Service (LTS), you can use the WAF logs recorded by LTS to quickly and efficiently perform real-time decisive analysis, device O&M management, and service trend analysis.
Available in CN North-Beijing1, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, CN Southwest-Guiyang1, AP-Bangkok, CN-Hong Kong, LA-Santiago, AF-Johannesburg, TR-Istanbul, CN North-Ulanqab1 and AP-Singapore regions.
-
-
-
Certificate Management
-
Creating a Certificate
If HTTPS is selected for Client Protocol when you add a website to WAF, you need to associate a certificate with the website.
You can create a certificate and upload it to WAF. Then you can directly select the uploaded certificate for the protected website. -
Deleting a Certificate
You can delete an expired or invalid certificate.
Available in Available in CN North-Beijing1, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, AP-Bangkok, AP-Singapore, and AF-Johannesburg regions.
-
-
Alarm Notification
-
After you enable the notification function in WAF, alarm information will be sent to you as configured once your domain name is attacked.
Available in all regions.
-
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot