This section describes how to enable basic web protection.
Basic web protection defends against common web attacks, such as SQL injection, XSS attacks, remote buffer overflow attacks, file inclusion, Bash vulnerability exploits, remote command execution, directory traversal, sensitive file access, and command and code injections, and detects web shells, robots (search engine, scanner, and script tool), and other crawlers.
In the upper part of the domain name list, click Quota details to view the domain name quota.
If you do not click Save after changing Status and Mode in Step 5, a Warning dialog box is displayed when you click Advanced Settings.
Type |
Description |
---|---|
General Check |
Defends against attacks, such as SQL injection, XSS, remote overflow vulnerability, file inclusion, Bash vulnerabilities, remote command execution, directory traversal, sensitive file access, and command/code injection. |
Webshell Detection |
Defends against web shells from the upload interface. |
Search Engine |
Uses web crawlers such as Googlebot and Baiduspider to find pages for search engines. |
Scanner |
Scans for vulnerabilities, viruses, and performs other types of web scans, such as OpenVAS and Nmap. |
Script Tool |
Executes automatic tasks and program scripts, such as HttpClient, OkHttp, and Python programs. NOTE:
If your application uses scripts such as HttpClient, OkHttp, and Python, disable Script Tool. Otherwise, WAF will identify such script tools as crawlers and block the application. |
Other |
Crawlers for other purposes, such as site monitoring, access proxy, and web page analysis. |
In the upper part of the page, select a protection level: Low, Medium, or High. The default value is Medium.
Protection Level |
Description |
---|---|
Low |
WAF only blocks the requests with obvious attack signatures. If a large number of false alarms are reported, Low is recommended. |
Medium |
The default level is Medium, which meets a majority of web protection requirements. |
High |
WAF blocks the requests with no attack signature but have specific attack patterns. High is recommended if you want to block SQL injection, XSS, and command injection attacks. |
By default, General Check and Scanner are enabled. You can click to enable other protection types.