Which Protection Levels Can Be Set for Basic Web Protection?
- Default rule set (loose): Only requests with obvious attack characteristics are blocked.
If a large number of false alarms are reported, the loose one is recommended.
- Default rule set (medium) (default): meets web protection requirements in most scenarios.
If basic web protection is enabled, the protection level is medium by default.
- Default rule set (strict): At this level, WAF provides the finest granular protection and can block attacks with complex bypass features, such as Jolokia cyber attacks, common gateway interface (CGI) vulnerability detection, and Druid SQL injection attacks.
To let WAF defend against more attacks but make minimum effect on normal requests, observe your workloads for a period of time first. Then, configure a global protection whitelist rule and select the tight level.
For details about basic web protection, see Configuring Basic Web Protection Rules.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot