The protection rules supported by WAF are described below.
WAF can defend against common web attacks, such as SQL injection, XSS, web shells, and Trojans in HTTP upload channels. Once these functions are enabled, protection takes effect immediately.
Flexible rate limiting policies can be set based on the IP addresses, cookies, or Referer field, mitigating CC attacks.
Common HTTP fields can be combined to customize protection policies, such as CSRF protection. With user-defined rules, WAF can accurately detect malicious requests and protect sensitive information in websites.
Blacklist or whitelist rules allow you to block or allow specific IP addresses or address ranges, improving defense accuracy.
Geolocation access control rules allow you to customize access control based on the source IP addresses.
Cache configuration is performed on static web pages. When a user accesses a web page, the system returns a cached page to the user and randomly checks whether the page is tampered with.
This function dynamically analyzes website service models and accurately identifies crawler behavior based on data risk control and bot identification systems, such as JS Challenge.
This function ignores certain attack detection rules for specific requests.
Data masking prevents such data as passwords from being displayed in event logs.
WAF prevents user's sensitive information on web pages from being disclosed, such as ID numbers, phone numbers, and email addresses.