Function Overview
- ALL
- Web Application Firewall
- Cloud Mode
- Cloud Mode - CNAME Access
- Cloud Mode - Load Balancer Access
- Dedicated Mode
- Support Non-Standard Ports
- WAF Engine Detection Mechanism
- Basic Web Protection
- Bot Rules
- CC Attack Protection
- Precise Protection
- Configure Blacklist and Whitelist
- Geolocation Access Control
- Threat Intelligence Access Control
- Web Tamper Protection
- Anti-Crawler
- Information Leakage Prevention
- Global Protection Whitelist
- Data Mask
- Scanning Protection
- Configure Known Attack Source
- Reference Tables
- Configure PCI DSS/3DS Certification Check and TLS
- HTTP/2
- Response Body Length in Logs (Bytes)
- Forwarding Request and Response Header Fields
- Modifying the Alarm Page
- Stopping WAF from Inserting Cookie Fields
- IPv6 Protection
- Load Balancing Algorithms
- Cookie Security Attributes
- Verification Code
- Custom Log Trace ID
- Traffic Identifiers for Known Attack Sources
- Connection Timeout
- Connection Protection
- JA3/JA4 Fingerprint Tag
- Domain Management
- Protection Event Logs
- Certificate Management
- Alarm Notification
-
Web Application Firewall
-
Web Application Firewall (WAF) keeps web services stable and secure. It examines all HTTP and HTTPS requests to detect and block the following attacks: Structured Query Language (SQL) injection, cross-site scripting (XSS), web shells, command and code injections, file inclusion, sensitive file access, third-party vulnerability exploits, Challenge Collapsar (CC) attacks, malicious crawlers, and cross-site request forgery (CSRF).
After buying a WAF instance, you need to add your website domain to the WAF instance on the WAF console. All public network traffic destined for your website then goes to WAF first. WAF identifies and filters out the illegitimate traffic, and routes only the legitimate traffic to your origin server. This keeps your origin servers secure.WAF supports two deployment modes: Cloud Mode and Dedicated Mode.
Available in all regions.
-
-
Cloud Mode
-
Cloud mode is a cloud-based WAF deployment method. In this mode, Huawei Cloud WAF cluster resources are shared with all users. With this mode, you do not need to deploy any hardware or maintain the software. It is ready for use out of the box, highly available, and auto-scalable. You can select yearly/monthly or pay-per-using billing.
- With cloud mode, you can select CNAME or Load balancer access to connect your website to WAF.
- The cloud mode supports Yearly/Monthly (prepaid) billing. There are four WAF editions available: Starter, Standard, Professional, and Enterprise.
- If the quota of domain names, QPS, bandwidth, or IP address blacklist and whitelist rules in the in-use edition (Standard, Professional, or Enterprise) cannot meet service requirements, you can buy domain name expansion packages, QPS expansion packages, or rule extension packages to increase the quota.
Available in all regions.
-
Expansion Package
-
If the edition is Standard, Professional, or Enterprise, you can buy domain name expansion packages, QPS expansion packages, or rule extension packages to increase the quota.
- Domain name Expansion Package: A domain package offers 10 domains.
- Bandwidth Expansion Package: A QPS expansion package can protect up to 20 Mbit/s of traffic for origin servers on Huawei Cloud or 50 Mbit/s for servers not on Huawei Cloud; or 1,000 Queries per Second (QPS). Each HTTP Get request is a query.
- Rule Expansion Package: A rule expansion packages can only be used to increate the quota of IP address blacklist and whitelist protection rules. One rule expansion package supports up to 10 IP address blacklist and whitelist protection rules.
Available in all regions.
- Domain name Expansion Package: A domain package offers 10 domains.
-
-
-
Cloud Mode - CNAME Access
-
In this mode, DNS resolves the protected domain name to the CNAME record of the WAF cluster. WAF identifies and filters out malicious traffic and returns normal traffic to the origin server through back-to-source IP addresses.
With this mode, you can protect web services deployed on Huawei Cloud, non-Huawei Cloud, and on-premises servers. The protected objects are domain names.
Available in all regions.
-
-
Cloud Mode - Load Balancer Access
-
In this mode, WAF is integrated into the Elastic Load Balance (ELB) gateway through SDKs. After detecting and filtering malicious attack traffic, WAF synchronizes detection result to ELB. ELB then determines whether to forward client requests to the origin server based on the detection result it received.
With this mode, you can protect web services deployed on Huawei Cloud. The protected objects can be domain names, public IP addresses, and private IP addresses.
- The cloud load balancer access mode supports only dedicated load balancers with Specifications set to Application load balancing (HTTP/HTTPS).
- To enable the Cloud Mode - Load balancer access, you need to buy the Standard, Professional, or Enterprise edition and then submit a service ticket.
- If Cloud Mode - CNAME access and Cloud Mode - Load balancer access are in use, they can share the domain name, QPS, and rule expansion package quotas.
Available in the following regions: CN North-Beijing4, CN North-Ulanqab1, CN East-Shanghai1, CN South-Guangzhou, CN North-Beijing2, CN Southwest-Guiyang1, CN East-Shanghai2, CN East-Qingdao, CN South-Shenzhen, CN-Hong Kong, AP-Singapore, AF-Johannesburg, TR-Istanbul, and ME-Riyadh.
-
-
Dedicated Mode
-
The dedicated mode is an advanced deployment method. You have completely isolated and independently deployed protection nodes. Your WAF instance performance will be unaffected by attacks targeting other users' workloads in the cloud. This deployment method provides dedicated resources, robust custom protection, high availability, and disaster recovery.
- The dedicated mode supports pay-per-use (postpaid) billing.
- The dedicated mode supports Dedicated Mode access.
In dedicated mode, after a website is connected to WAF, the website traffic is sent to WAF through the ELB load balancer. WAF blocks abnormal requests and forwards normal requests to the origin server through the back-to-source IP address of the dedicated WAF engine.
- The dedicated mode has been discontinued in some regions. For details, see Notice on Web Application Firewall (Dedicated Mode) Discontinued.
Available in CN North-Beijing4, CN East-Shanghai1, CN South-Guangzhou, CN South-Shenzhen, CN Southwest-Guiyang1, CN-Hong Kong, AP-Bangkok, AP-Singapore, LA-Sao Paulo1, LA-Santiago, AF-Johannesburg and TR-Istanbul regions.
-
-
Support Non-Standard Ports
-
In addition to standard ports 80 and 443, WAF also supports non-standard ports.
Available in all regions.
-
-
WAF Engine Detection Mechanism
-
The built-in protection rules of WAF help you defend against common web application attacks, including XSS attacks, SQL injection, crawlers, and web shells. In addition, you can flexibly configure protection rules based on your website protection requirements.
Available in all regions.
-
-
Basic Web Protection
-
With an extensive preset reputation database, WAF defends against Open Web Application Security Project (OWASP) top 10 threats, malicious scanners, IP addresses, web shells, and other threats.
- All-around protection: WAF detects and blocks such threats as SQL injection, XSS, file inclusion, directory traversal attacks, sensitive file access, command and code injections, web shells, backdoors, malicious HTTP requests, and third-party vulnerability exploits.
- Precise identification: WAF uses built-in semantic analysis engine and regex engine and supports configuring of blacklist/whitelist rules, which reduces false positives.
WAF supports anti-escape and automatic restoration of common codes, which improves the capability of recognizing deformation web attacks.
WAF can decode a wide range of code types, including url_encode, Unicode, XML, C-OCT, hexadecimal, HTML escape, and base64 code, case confusion, JavaScript, shell, and PHP concatenation confusion.
Available in all regions.
-
-
Bot Rules
-
WAF can accurately identify and manage bot behavior in website traffic, effectively reducing risks such as data leakage and performance deterioration caused by bot attacks.
Available in all regions.
-
-
CC Attack Protection
-
You can customize your Challenge Collapsar (CC) attack rules to restrict access to a specific URL on your website based on a unique IP address, cookie, or Referer field. WAF identifies and mitigates CC attacks based on the protection rules you configured. For example, you can configure the following rule: If a user whose cookie ID is name accesses the /admin* page under your domain name for more than 10 times within 60 seconds, the user is forbidden to access the target website for 600 seconds.
The All WAF instances function is supported for CC attack protection rules. This function allows WAF to count requests to all your WAF instances for rate limiting. By default, requests to each WAF instance are counted for triggering a CC attack rule. If you enable this, WAF will count requests to all your WAF instances for triggering this rule.
- With Cloud Mode - CNAME mode, this function is supported in the following regions: CN North-Beijing1, CN North-Beijing4, CN South-Guangzhou, CN East-Shanghai1, and CN East-Shanghai2.
- If you are using the dedicated mode, you can submit a service ticket.
-
-
Precise Protection
-
With precise protection rules, WAF allows you to customize combinations of HTTP headers, cookies, URLs, request parameters, and client IP addresses, improving protection accuracy. Precise protection rules can be used in hotlinking prevention and website management background protection.
Available in all regions.
-
-
Configure Blacklist and Whitelist
-
This function allows you to blacklist or whitelist IP addresses or an IP address range to improve defense accuracy.
Available in all regions.
-
Blacklist and Whitelist IP Address Groups
-
You can use an IP address to manage IP addresses and IP address ranges. With an IP address group, you can quickly add IP addresses or IP address ranges to a blacklist or whitelist rule.
Available in the following regions: CN North-Beijing1, CN North-Beijing2, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, CN Southwest-Guiyang1, CN-Hong Kong, AP-Singapore, AP-Bangkok, LA-Santiago, AP-Jakarta, TR-Istanbul, and CN North-Ulanqab1
-
-
-
Geolocation Access Control
-
These rules allow you to customize access control for IP addresses forwarded from/to specified countries and provinces.
Available in all regions.
-
-
Threat Intelligence Access Control
-
Access is controlled based on the IP address library of an Internet Data Center (IDC)..
Available in all regions.
-
-
Web Tamper Protection
-
You can configure cache for static web pages. When a user accesses a web page, the system returns a cached page to the user and randomly checks whether the page is tampered with.
Available in all regions.
-
-
Anti-Crawler
-
Dynamically analyze website service models and accurately identify crawler behavior based on data risk control and bot identification systems, such as JS Challenge.
Available in CN North-Beijing1, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, CN Southwest-Guiyang1, CN-Hong Kong and AP-Bangkok regions.
-
-
Information Leakage Prevention
-
Prevents disclosure of sensitive information (such as ID numbers, phone numbers, and email addresses) , and response code interception: intercepts the specified HTTP status codes.
Available in all regions.
-
-
Global Protection Whitelist
-
If you select All protection for Ignore WAF Protection, all WAF rules do not take effect, and WAF allows all request traffic to the domain names in the rule.
If you select Basic Web Protection for Ignore WAF Protection, you can ignore basic web protection by rule ID, attack type, or all built-in rules. For example, if XSS check is not required for a URL, you can whitelist XSS rule.
Available in all regions.
-
-
Data Mask
-
Data masking prevents such data as passwords from being displayed in event logs.
Available in all regions.
-
-
Scanning Protection
-
The scanning protection module identifies scanning behaviors and scanner features to prevent attackers or scanners from scanning websites at scale.
Available in all regions.
-
-
Configure Known Attack Source
-
If WAF blocks a malicious request by IP address, Cookie, or Params, you can configure a known attack source rule to let WAF automatically block all requests from the attack source for a blocking duration set in the known attack source rule.
After a known attack source rule is added, you need to select the rule in basic web protection, precise protection, or blacklist and whitelist protection for the rule to take effect.Available in all regions.
-
-
Reference Tables
-
You can use a reference table to batch configure protection objects for the following types: Paths, User Agent, IP, Params, Cookie, Referer, and Header.
You can use reference tables for CC attack, precise access, and anti-crawler protection rules.
Available in all regions.
-
-
Configure PCI DSS/3DS Certification Check and TLS
-
When Client Protocol for a website to be protected is set to HTTPS, you can use WAF to set the minimum TLS version and cipher suite (a set of cryptographic algorithms) for the website. All requests using a TLS version earlier than the minimum TLS version cannot access the protected website so that your service is secured.
WAF allows you to enable PCI DSS and PCI 3DS certification checks. After PCI DSS or PCI 3DS certification check is enabled, the minimum TLS version is automatically set to TLS v1.2 to meet the PCI DSS and PCI 3DS certification requirements.Available in CN North-Beijing1, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, AP-Bangkok, AP-Singapore, and AF-Johannesburg regions.
-
-
HTTP/2
-
If your website is accessible over the HTTP/2 protocol, enable HTTP/2 in WAF. The HTTP/2 protocol can be used only for access between the client and WAF on the condition that at least one origin server has HTTPS used for Client Protocol.
Available in CN North-Beijing1, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, LA-Mexico City2.
-
-
Response Body Length in Logs (Bytes)
-
- You need to submit a service ticket to enable this function. WAF will log the response body within the length you configure in protection events.
Available in all regions.
-
-
Forwarding Request and Response Header Fields
-
If you enable and configure request and response header forwarding, WAF will insert fields you specify into the header field of requests and responses, and forwards the requests to your origin server, and the responses to the client. This helps you distinguish requests from different sources and better analyze website operating status.
This function is only supported for cloud mode CNAME access and dedicated mode.
Available in all regions.
-
-
Modifying the Alarm Page
-
WAF returns a default response page to visitors it blocks. You can also configure a Custom or Redirection page. WAF will return this page to blocked visitors.
Cloud Mode - Load balancer does not support the Redirection template.
Available in all regions.
-
-
Stopping WAF from Inserting Cookie Fields
-
WAF allows you to stop WAF from inserting the HWWAFSESTIME and HWWAFSESID fields into cookies. However, you should exercise caution when enabling this function. If WAF does not insert the HWWAFSESTIME and HWWAFSESID fields into cookies, CC attack protection rules (verification code), known attack source rules, and dynamic anti-crawler rules will be unable to work.
This function is only supported for cloud mode CNAME access and dedicated mode.
Available in all regions.
-
-
IPv6 Protection
-
You can enable IPv6 protection if needed. If IPv6 protection is enabled, WAF assigns an IPv6 access address to your domain name. WAF adds IPv6 address resolution to CNAME record sets by default. All IPv6 access requests are first forwarded to WAF. WAF detects and filters out malicious traffic and returns legitimate traffic to the origin server. This can keep origin servers secure, stable, and available.
-
-
Load Balancing Algorithms
-
If you configure one or more origin server addresses, you can use a load balancing algorithm to distribute traffic across these origin servers. WAF supports the following algorithms:
- Origin server IP hash: Requests from the same IP address are routed to the same backend server.
- Weighted round robin: Requests are distributed across backend servers in turn based on the weight you assign to each server.
- Session hash: Requests with the same session tag are routed to the same origin server. To enable this algorithm, configure traffic identifiers for known attack sources, or Session hash algorithm cannot take effect.
Available in CN North-Beijing1, CN North-Beijing2, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, CN-Hong Kong and AP-Bangkok regions.
-
-
Cookie Security Attributes
-
If you set Client Protocol to HTTPS, you can enable Cookie Security Attributes. If you enable this, the HttpOnly and Secure attributes of cookies will be set to true.
Cookies are inserted by back-end web servers and can be implemented through framework configuration or set-cookie. Secure and HttpOnly in cookies help defend against attacks, such as XSS attacks to obtain cookies, and help defend against cookie hijacking.
This function is only supported for cloud mode CNAME access and dedicated mode.
Available in all regions.
-
-
Verification Code
-
You need to submit a service ticket enable this function. If you enable this function, you can set Protective Action to Verification code and specify a response code displayed on the verification page when configuring the protection rule.
Available in all regions.
-
-
Custom Log Trace ID
-
You can configure a custom extended log field and record a specific header field in requests or responses to the custom_traceid field in logs.
This function is only supported for cloud mode CNAME access and dedicated mode.
Available in all regions.
-
-
Traffic Identifiers for Known Attack Sources
-
You can use WAF to add custom headers, for example, $request_id, to track requests. WAF can follow your configurations to insert additional fields into the request header field and forward the requests to origin servers. Note that the key value of a custom header field cannot be the same as any native Nginx fields.
Available in all regions.
-
-
Connection Timeout
-
If you want to set a timeout duration for each request between your WAF instance and origin server, enable Timeout Settings and specify WAF-to-Server connection timeout (s), Read timeout (s), and Write timeout (s). This function cannot be disabled once it is enabled.
- WAF-to-Server Connection Timeout: timeout for WAF and the origin server to establish a TCP connection.
- Write Timeout: Timeout set for WAF to send a request to the origin server. If the origin server does not receive a request within the specified write timeout, the connection times out.
- Read Timeout: Timeout set for WAF to read responses from the origin server. If WAF does not receive any response from the origin server within the specified read timeout, the connection times out.
Available in CN North-Beijing1, CN North-Beijing2, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, CN Southwest-Guiyang1, AP-Jakarta, CN-Hong Kong and AP-Singapore regions
-
-
Connection Protection
-
If a large number of 502 Bad Gateway and 504 Gateway Timeout errors are detected, you can enable WAF breakdown protection and connection protection to let WAF suspend your website and protect your origin servers from being crashed. When the 502/504 error requests and pending URL requests reach the thresholds you configure, WAF enables corresponding protection for your website.
Available in CN North-Beijing1, CN North-Beijing2, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen.
-
-
JA3/JA4 Fingerprint Tag
-
By analyzing TLS handshake metadata, it generates unique fingerprints to distinguish different client applications. With dedicated mode, if a layer-7 reverse proxy (for example, ELB) is deployed in front of WAF and its fingerprint is transferred to WAF with the header field, you can configure the JA3/JA4 fingerprint tags for the domain name protected by WAF. Then, the fingerprints along with tags will be transferred to WAF. WAF processes requests based on the TLS fingerprint (JA3) and TLS fingerprint (JA4) configured in the precise protection rule. This can mitigate JA3/JA4 fingerprinting attacks.
Available in all regions.
-
-
Domain Management
-
Editing Server Information
You can modify server information, including Client Protocol, Server Protocol, Server Address, and Server Port.
-
Deleting a Protected Domain
You can delete a protected website that you do not want to protect any more. Deletion takes effect within one minute. Note that deleted domain names cannot be recovered. You should exercise caution when deleting a protected website.
Available in all regions.
-
-
Protection Event Logs
-
On the Dashboard page, you can view event logs, including attack and request statistics, event distribution, top 10 attacked domain names, top 10 attack source IP addresses, and top 10 attacked URLs in a specified time frame, such as yesterday, today, past 3 days, past 7 days, or past 30 days.
On the Events page, you can view the event data of all protected domain names in the last 30 days.Available in all regions.
-
Enable LTS for WAF Logging
-
After you authorize WAF to access Log Tank Service (LTS), you can use the WAF logs recorded by LTS to quickly and efficiently perform real-time decisive analysis, device O&M management, and service trend analysis.
Available in CN North-Beijing1, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, CN Southwest-Guiyang1, AP-Bangkok, CN-Hong Kong, LA-Santiago, AF-Johannesburg, TR-Istanbul, CN North-Ulanqab1 and AP-Singapore regions.
-
-
-
Certificate Management
-
Creating a Certificate
If HTTPS is selected for Client Protocol when you add a website to WAF, you need to associate a certificate with the website.
You can create a certificate and upload it to WAF. Then you can directly select the uploaded certificate for the protected website. -
Deleting a Certificate
You can delete an expired or invalid certificate.
Available in Available in CN North-Beijing1, CN North-Beijing4, CN East-Shanghai1, CN East-Shanghai2, CN South-Guangzhou, CN South-Shenzhen, AP-Bangkok, AP-Singapore, and AF-Johannesburg regions.
-
-
Alarm Notification
-
After you enable the notification function in WAF, alarm information will be sent to you as configured once your domain name is attacked.
Available in all regions.
-
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot