Enabling Basic Web Protection
This section describes how to enable basic web protection.
Basic web protection defends against common web attacks, such as SQL injection, XSS attacks, remote buffer overflow attacks, file inclusion, Bash vulnerability exploits, remote command execution, directory traversal, sensitive file access, and command and code injections, and detects web shells, robots (search engine, scanner, and script tool), and other crawlers.
Prerequisites
- Login credentials have been obtained.
- The domain name to be protected has been created.
Procedure
- Log in to the management console.
- Click in the upper left corner of the management console and select a region or project.
- Click Service List at the top of the page. Choose . In the navigation pane on the left, choose Domains.
- Locate the row that contains the desired domain name. In the Operation column, click Configure Policy.
- In the Basic Web Protection area, specify Status and Mode by referring to Table 1. After the configuration completes, in the upper right corner of the Protection Status list, click Save. In the displayed dialog box, click Yes to save the settings. If you do not want to save the settings, click Cancel.
- In the Basic Web Protection configuration area, click Advanced Settings. Enable the protection type that best fits your needs.
If you do not click Save after changing Status and Mode in Step 5, a Warning dialog box is displayed when you click Advanced Settings.
- Click Yes to cancel the previous settings.
- Click No and then Save to save the settings.
Table 2 Protection types Type
Description
General Check
Defends against attacks, such as SQL injection, XSS, remote overflow vulnerability, file inclusion, Bash vulnerabilities, remote command execution, directory traversal, sensitive file access, and command/code injection.
Webshell Detection
Defends against web shells from the upload interface.
Search Engine
Uses web crawlers such as Googlebot and Baiduspider to find pages for search engines.
Scanner
Scans for vulnerabilities, viruses, and performs other types of web scans, such as OpenVAS and Nmap.
Script Tool
Executes automatic tasks and program scripts, such as HttpClient, OkHttp, and Python programs.
NOTE:If your application uses scripts such as HttpClient, OkHttp, and Python, disable Script Tool. Otherwise, WAF will identify such script tools as crawlers and block the application.
Other
Crawlers for other purposes, such as site monitoring, access proxy, and web page analysis.
- Set the protection level.
In the upper part of the page, select a protection level: Low, Medium, or High. The default value is Medium.
Table 3 Protection levels Protection Level
Description
Low
WAF only blocks the requests with obvious attack signatures.
If a large number of false alarms are reported, Low is recommended.
Medium
The default level is Medium, which meets a majority of web protection requirements.
High
WAF blocks the requests with no attack signature but have specific attack patterns.
High is recommended if you want to block SQL injection, XSS, and command injection attacks.
- Set the protection type.
By default, General Check and Scanner are enabled. You can click to enable other protection types.
- Click Save in the upper right of the page to save the settings. Otherwise, click Cancel.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot