Protection module | Description | Default protection template | Configuration suggestion |
Core protection rule | Defends against common web application attacks based on a built-in
protection rule set.
The common web application attacks include SQL injection, cross-site scripting (XSS), code execution, webshell upload, and command injection. | A default protection template is provided, and the template uses the protection rule set provided by WAF. By default, the protection template is enabled, and the Block action is specified. Important By default, the core protection rule module is enabled for all protected objects that are newly added to WAF. The module automatically blocks attack requests. | We recommend that you retain the default configuration. If specific protection rules in the protection rule set block normal requests, you can configure a protection rule for the whitelist module based on the specified protection rules to prevent false positives. For more information, see Configure protection rules for the whitelist module to allow specific requests. |
Rule group Note The rule group feature has been upgraded and iterated to the engine configuration feature. For more information, see [Announcement]. | Defends against attacks based on a group of protection rules. You can configure a custom rule group or use the default rule group. You can associate a rule group with a protection template of the core protection rule module to protect your website from common web application attacks. | A default rule group is provided. | To enable a custom rule group, you must create a protection template and configure protection rules for the template. |
Whitelist | Allows requests that have specific characteristics to bypass the checks of all or specified protection modules. You can configure the characteristics of the requests based on your business requirements. | A default protection template is provided, but no protection rules are pre-defined in the default protection template. By default, the protection template is enabled. | If you want WAF to allow requests that have specific characteristics, you can create protection rules in the default protection template of the whitelist module. |
HTTP flood protection | Mitigates HTTP flood attacks based on built-in common HTTP flood protection algorithms. You can also configure throttling for HTTP flood protection in the custom rule module. | A default protection template is provided, but no protection rules are pre-defined in the default protection template. By default, the protection template is enabled. Note The default protection template is supported only in subscription WAF instances that run the Pro, Enterprise, or Ultimate edition. | To enable a custom protection rule, you must create a protection template and configure the protection rule in the template. |
Scan protection | Identifies the scanning behaviors and characteristics of scanners to prevent attackers or scanners from scanning your websites. This helps reduce the risk of intrusions into web services and blocks unwanted scanning traffic. | A default protection template is provided, but no protection rules are pre-defined in the default protection template. By default, the protection template is enabled. Note The default protection template is supported only in subscription WAF instances that run the Pro, Enterprise, or Ultimate edition. | To enable a custom protection rule, you must create a protection template and configure the protection rule in the template. |
IP address blacklist | Blocks requests from specified IPv4 addresses, IPv6 addresses, or CIDR blocks. You can specify the IP addresses or CIDR blocks based on your business requirements. | No default protection template is provided. By default, this protection module is disabled. | To enable this protection module, you must create a protection template and configure protection rules for the template. |
Custom rule | Blocks requests, verifies requests, or records logs based on the characteristics of HTTP requests or a set of custom characteristics that you specify. When you configure a protection rule, you can turn on Rate Limiting. If a statistical object, such as an IP address or a session, matches the specified condition, the statistical object is added to the blacklist. During the specified period of time, WAF performs the specified action on all requests from the statistical object. |
Custom response | Allows you to configure custom block pages that WAF returns to clients when the requests of the clients are blocked by WAF. You can specify a custom status code, response header, and response body. |
Region blacklist | Allows you to block client IP addresses from specific regions with a few clicks. |
Website tamper-proofing | Locks specific web pages to prevent content tampering. When a locked web page receives a request, a pre-defined cached page is returned. |
Data leakage prevention | Filters abnormal returned content and masks sensitive information, such as ID card numbers, phone numbers, bank card numbers, and sensitive words. |
Bot management for basic protection | Identifies Layer 4 and Layer 7 bot traffic by using fingerprinting techniques. |
Bot management for website protection | Identifies bot traffic based on the characteristics of clients, traffic, behaviors, and intelligence, and blocks malicious traffic to prevent unwanted bandwidth consumption, data crawling, spam user registration, malicious orders, malicious voting, and abuse of APIs. |
Bot management for app protection |
Major event protection | Ensures the security of major events within a specific time range and provides precise protection for your services. | No default protection template is provided. By default, this protection module is disabled. | To enable this protection module, you must create a protection template and configure protection rules for the template. |
API security | Sorts the API assets of services that are protected by WAF and detects API risks, such as unauthorized access to APIs, exposure of sensitive data, and exposure of internal APIs. This protection module provides reports on API exception events, suggestions for handling detected risks, and references for API lifecycle management. | N/A. |
Traffic spike throttling | Allows you to limit the number of requests to specific servers by specifying a QPS or percentage limit and filters for traffic from selected regions. | No default protection template is provided. By default, this protection module is disabled. | To enable this protection module, you must create a protection template and configure protection rules for the template. |