Updated on 2024-12-18 GMT+08:00
Blocking Network Attacks
CFW provides attack defense to help you detect common network attacks.
Adjusting the IPS Protection Mode to Block Network Attacks
- Log in to the management console.
- Click in the upper left corner of the management console and select a region or project.
- In the navigation pane on the left, click and choose . The Dashboard page will be displayed.
- (Optional) Switch firewall instance: Select a firewall from the drop-down list in the upper left corner of the page.
- In the navigation pane, choose .
- Select a proper protection mode.
- Observe: Attacks are detected and recorded in logs but are not intercepted.
- Intercept: Attacks and abnormal IP address access are automatically intercepted.
- Intercept mode - loose: The protection granularity is coarse. In this mode, only attacks with high threat and high certainty are blocked.
- Intercept mode - moderate: The protection granularity is medium. This mode meets protection requirements in most scenarios.
- Intercept mode - strict: The protection granularity is fine-grained, and all attack requests are intercepted.
- You are advised to use the observe mode for a period of time before using the intercept mode. For details about how to view attack event logs, see Attack Event Logs.
- If packets are incorrectly blocked by a defense rule, you can modify the action of the rule in the basic defense rule library. For details, see IPS Rule Management.
Enabling Sensitive Directory Scan Defense
- Log in to the management console.
- Click in the upper left corner of the management console and select a region or project.
- In the navigation pane on the left, click and choose . The Dashboard page will be displayed.
- (Optional) Switch firewall instance: Select a firewall from the drop-down list in the upper left corner of the page.
- In the navigation pane, choose .
- Click Advanced. In the Sensitive Directory Scan Defense area, click to enable protection.
- Action:
- Observe: If the firewall detects a sensitive directory scanning attack, it only records the attack in Attack Event Logs.
- Block session: If the firewall detects a sensitive directory scan attack, it blocks the current session.
- Block IP: If CFW detects a sensitive directory scan attack, it blocks the attack IP address for a period of time.
- Duration: If Action is set to Block IP, you can set the blocking duration. The value range is 60s to 3,600s.
- Threshold: CFW performs the specified action if the scan frequency of a sensitive directory reaches this threshold.
- Action:
Enabling Reverse Shell Defense
- Log in to the management console.
- Click in the upper left corner of the management console and select a region or project.
- In the navigation pane on the left, click and choose . The Dashboard page will be displayed.
- (Optional) Switch firewall instance: Select a firewall from the drop-down list in the upper left corner of the page.
- In the navigation pane, choose .
- Click Advanced. In the Reverse Shell Defense module, click to enable defense.
- Action:
- Observe: If the firewall detects a reverse shell attack, it only records the attack in Attack Event Logs.
- Block session: If the firewall detects a reverse shell attack, it blocks the current session.
- Block IP: If CFW detects a reverse shell attack, it blocks the attack IP address for a period of time.
- Duration: If Action is set to Block IP, you can set the blocking duration. The value range is 60s to 3,600s.
- Mode:
- Conservative: coarse-grained protection. If a single session is attacked for four times, observation or interception is triggered. It ensures that no false positives are reported.
- Sensitive: fine-grained protection. If a single session is attacked for two times, observation or interception is triggered. It ensures that attacks can be detected and handled.
- Action:
Follow-up Operations
For details about the protection overview, see Viewing Attack Defense Information on the Dashboard. For details about logs, see Attack Event Logs.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot