After you add web services to Web Application Firewall (WAF) 3.0, you can configure engine settings and manage rule libraries to protect the web services from common web application attacks, such as SQL injection attacks, cross-site scripting (XSS) attacks, code executions, webshell uploads, and command injection attacks. This topic describes how to configure the basic protection rule module.
On November 7, 2024 (UTC+8), the basic protection rule module was upgraded. For more information, see Upgrade the basic protection rule module in WAF 3.0. This topic describes the new version of the basic protection rule module. If you use the old version, you can configure the module by following the instructions provided in Configure protection rules and rule groups for the basic protection rule module.
Overview
Each protection template of the basic protection rule module uses an independent detection engine. Various protection rules are incorporated into different detection modules based on business experience. Different detection modules identify different types of attacks. The following figure shows the relationships among protection templates, detection engines, detection modules, and protection rules.
Protection in public cloud scenarios | Protection in hybrid cloud scenarios |
Features
Decoding
The basic protection rule module supports multiple decoding formats.
The module can parse data in various formats to improve detection accuracy. The data formats include JSON, XML, and Multipart.
The module can identify data that is encoded to bypass WAF. This improves the detection rate of attacks. The encoding formats include Unicode encoding and HTML entity encoding.
Intelligent whitelist engine
To reduce the risks of false positives, WAF performs intelligent learning based on historical service traffic and identifies protection rules that may cause false positives. Then, WAF adds the URLs that are incorrectly blocked to the intelligent whitelist.
Custom protection rules in hybrid cloud scenarios
Custom protection rules take effect only for protected objects that are generated when you add services to WAF in hybrid cloud mode. This type of protected object is referred to as hybrid cloud protected objects. For more information about how to create a custom protection rule and add the rule to a protection template, see Manage rule libraries.
Prerequisites
A WAF 3.0 instance is purchased. If you want to apply custom protection rules to hybrid cloud protected objects, you must purchase a subscription WAF instance that runs the Enterprise or Ultimate edition. For more information, see Purchase a subscription WAF 3.0 instance and Purchase a pay-as-you-go WAF 3.0 instance.
Web services are added to WAF 3.0 as protected objects. For more information, see Configure protected objects and protected object groups.
Create a protection template
Log on to the WAF 3.0 console. In the top navigation bar, select the resource group and region of the WAF instance. You can select Chinese Mainland or Outside Chinese Mainland for the region. In the left-side navigation pane, choose . On the page that appears, find the Basic Protection Rule section and click Create Template.
In the Create Template - Basic Protection Rule panel, configure the parameters and click OK.
Step 1: Template Information
Step
Parameter
Description
Template Information
Template Name
Specify a name for the template. The name can contain letters, digits, periods (.), underscores (_), and hyphens (-).
Save as Default Template
Specify whether to set the template as the default template for the protection module. If you turn on Save as Default Template, you do not need to configure settings in the Configure Effective Scope step. A default template is applied to all protected objects and protected object groups to which no custom protection templates are applied. You can specify only one default template for a protection module. You can specify a default template only when you create a template.
Step 2: Engine Configuration
Step
Parameter
Description
Engine Configuration
Automatic Update of Detection Engine
By default, the switch is turned on. In this case, rules that are added to or removed from the default rule library of the Alibaba Cloud security team are automatically synchronized to the current detection engine.
Configure Engine
System protection rules: WAF provides four levels of system protection rules based on the built-in detection modules of Alibaba Cloud Security. The rule levels are Super Strict, Strict, Medium, and Loose. By default, rules at the Super Strict and Strict levels are disabled, and rules at the Medium and Loose levels are enabled.
NoteFor more information about the supported detection modules, see Detection module descriptions.
You can configure the following parameters of a rule:
Action: Specify the action that you want WAF to perform on the requests that match the rule.
Block: blocks a request that matches the rule and returns a block page to the client that initiates the request.
NoteBy default, WAF returns a preconfigured block page. You can use the custom response feature to configure a custom block page. For more information, see Configure protection rules for the custom response module to configure custom block pages.
Monitor: records a request that matches the rule in a log and does not block the request. You can query the logs of requests that match the rule and analyze the protection performance. For example, you can query logs to check whether normal requests are blocked.
ImportantYou can query logs only if the Simple Log Service for WAF feature is enabled. For more information, see Enable or disable the Simple Log Service for WAF feature.
If you select Monitor, you can perform a dry run on the rule to check whether the rule blocks normal requests. If the rule passes the dry run, you can set the Action parameter to Block.
NoteOn the Security Reports page, you can query the details of matched rules in Monitor or Block mode. For more information, see Security reports.
Status: Turn on or turn off the switch. If a rule is disabled, WAF does not match requests against the rule.
Adaptive Engine
Intelligent Whitelist Engine: By default, the switch is turned off.
Protection rules of the whitelist module that are automatically created are displayed in the AutoTemplate protection template in the Whitelist section of the Basic Web Protection page. For more information, see Configure protection rules for the whitelist module to allow specific requests.
NoteOnly pay-as-you-go WAF instances and subscription WAF instances that run the Enterprise or Ultimate edition support this feature.
Step 3: Configure Effective Scope
Select items to which you want to apply the template on the Protected Objects and Protected Object Group tabs.
You can apply only one protection template of the basic protection rule module to a protected object or a protected object group. For more information about how to add protected objects and create protected object groups, see Configure protected objects and protected object groups.
View a protection template
After you create a protection template, you can click the icon to the left of the template name to view the engine information of the template. You can also click Configure Engine in the Actions column to open the Configure Engine panel. In this panel, you can view the action and status information of the protection rules in the template.
Modify a protection template
Enable and disable a protection template
After you create a protection template, you can turn on or turn off the switch in the Status column to enable or disable the template.
Edit a protection template
Find the protection template that you want to manage and click Edit in the Actions column. After you modify the settings, click OK.
For protection in hybrid cloud scenarios, you can configure the following parameters for a custom protection rule in the Configure Engine panel:
Action: Specify the action that you want WAF to perform on the requests that match the rule. Valid values: Monitor and Block.
Status: Turn on or turn off the switch. By default, the switch is turned off. If you turn on the switch, the setting takes effect only on the current protection template.
Delete a protection template
You can delete a protection template that you no longer require. Before you delete a protection template, make sure that the template is not associated with protected objects. To delete a protection template, find the template and click Delete in the Actions column. In the message that appears, click OK.
After a protection template is deleted, the system automatically applies the default template to the protected objects that are previously associated with the deleted protection template.
If you delete a default template and the template is associated with protected objects, the protected objects are no longer protected by the basic protection rule module.
View hit records
On the Basic Protection Rule tab of the Security Reports page, you can view the protection details of specific protection rules. For more information, see Basic protection rule module. You cannot search for a protection rule of the basic protection rule module by rule ID on the Basic Web Protection page. For more information about how to view the details of protection rules, see Manage rule libraries.
If a protection rule blocks normal traffic, you can create a protection rule of the whitelist module based on the rule to reduce false positives. For more information, see Configure protection rules for the whitelist module to allow specific requests.
Related descriptions and references
Detection module descriptions
Detection modules can identify and block different types of web attacks based on the protection rules of the modules.
References
For more information about the protected objects, protection modules, and protection process of WAF 3.0, see Protection configuration overview.
For more information about how to create a protection template by calling an API operation, see CreateDefenseTemplate.
For more information about how to create a protection rule by calling an API operation, see CreateDefenseRule.