Definition |
Web Application Firewall (WAF) keeps web services stable and secure. It examines all HTTP and HTTPS requests to detect and block the following attacks: Structured Query Language (SQL) injection, cross-site scripting (XSS), web shells, command and code injections, file inclusion, sensitive file access, third-party vulnerability exploits, Challenge Collapsar (CC) attacks, malicious crawlers, and cross-site request forgery (CSRF). |
Cloud Firewall (CFW) is a next-generation cloud-native firewall. It protects the Internet border and VPC border on the cloud by real-time intrusion detection and prevention, global unified access control, full traffic analysis, log audit, and tracing. It employs AI for intelligent defense, and can be elastically scaled to meet changing business needs, helping you easily handle security threats. CFW is a basic service that provides network security protection for user services on the cloud. |
Protection mechanism |
WAF works as a reverse proxy between the client and the origin server. All website access requests are forwarded to WAF first. WAF detects and filters out malicious attack traffic, and returns normal traffic to the origin server to ensure that the origin server is secure, stable, and available. |
CFW can implement refined control over all traffic, including Internet border protection, cross-VPC and NAT traffic, to prevent intrusions, penetration attacks, and unauthorized connections to the outside. |
Deployment mode |
WAF can be deployed in cloud mode, ELB mode, and dedicated mode.
|
Protection for Internet border and VPC border |
Protection objects |
- Cloud mode - CNAME access: Domain names
- Dedicated mode and cloud load balancer access mode: domain names or IP addresses
|
Elastic IP Address (EIP) |
Functions |
WAF identifies and blocks a wide range of suspicious attacks, such as Structure Query Language (SQL) injections, cross-site scripting (XSS) attacks, web shell upload, command or code injections, file inclusion, unauthorized sensitive file access, third-party vulnerability exploits, Challenge Collapsar (CC) attacks, malicious crawlers, and cross-site request forgery (CSRF). |
- Asset management and intrusion defense: CFW detects and defends against intrusions into cloud assets that are accessible over the Internet in real time.
- Access control: You can control access at Internet borders.
- Traffic Analysis and log audit: CFW controls, analyzes, and visualizes VPC traffic, audits logs, and traces traffic sources.
|