The protection policies supported by WAF are described below.
WAF can defend against common web attacks, such as SQL injection, XSS, webshells, and Trojans in HTTP upload channels. Once these functions are enabled, protection takes effect immediately.
Flexible rate limiting policies can be set based on the IP addresses, cookies, or Referer field, mitigating CC attacks.
Common HTTP fields can be combined to customize protection policies, such as CSRF protection. With user-defined rules, WAF can accurately detect malicious requests and protect sensitive information in websites.
Blacklist or whitelist rules allow you to block or allow specific IP addresses or address ranges, improving defense accuracy.
Cache configuration is performed on static webpages. When a user accesses a webpage, the system returns a cached page to the user and randomly checks whether the page has been tampered with.
This function ignores certain attack detection rules for specific requests.
Data masking prevents such data as passwords from being displayed in event logs.