WAF

What is WAF?

Web Application Firewall (WAF) monitors, filters, or blocks the traffic to and from a web application. A WAF inspects every HTML, HTTPS, SOAP, and XML-RPC data packet. This firewall enables preventing attacks such as cross-site scripting (XSS), SQL injection, session hijacking, and buffer overflows through customizable web security rules.

Enable WAF, including OWASP rules and definitions

  • Drupal Exclusion Rules Request - these rules disable CRS on a set of well-known parameter fields that are often the source of false positives or false alarms of the CRS. This includes the session cookie, the password fields and article/node bodies.

  • Wordpress Exclusion Rules Request - these exclusions remedy false positives in a default WordPress install.

  • IP Reputation Request - these rules deal with detecting traffic from IPs that have previously been involved in malicious activity, either on our local site or globally.

  • Method Enforcement Request - this rule detects HTTP Request Method Anomalies.

  • DdoS Protection Request - these rules will attempt to detect some level 7 DoS (Denial of Service) attacks against your server.

  • Scanner Detection Request - these rules are concentrated around detecting security tools and scanners.

  • Protocol Enforcement Request - these rules center around detecting requests that either violate HTTP or represent a request that no modern browser would generate, for instance missing a user-agent.

  • Protocol Attack Request - these rules focus on specific attacks against the HTTP protocol itself such as HTTP Request Smuggling and Response Splitting.

  • Application Attack LFI Request - these rules attempt to detect when a user is trying to include a file that would be local to the webserver that they should not have access to. Exploiting this type of attack can lead to the web application or server being compromised.

  • Application Attack RFI Request - these rules attempt to detect when a user is trying to include a remote resource into the web application that will be executed. Exploiting this type of attack can lead to the web application or server being compromised.

  • Application Attack RCE Request - this rule detects Unix command injections and protects against Remote Code Execution

  • Application Attack PHP Request - this rule detects PHP open tags "<?" and "<?php". Also detects "[php]", "[/php]" and "[\php]" tags used by some applications to indicate PHP dynamic content.

  • Application Attack XSS Request - these rules are intended to prevent all cross-site scripting (XSS) attacks in your CDN resources and the CDN Accelerator.

  • Application Attack Sqli Request - these rules protect against common initial SQL injection attacks where attackers insert quote characters to the existing normal payload to see how the database responds.

  • Application Attack Session Fixation Request - these rules focus around providing protection against Session Fixation attacks.

  • Blocking Evaluation Request - these rules provide the anomaly based blocking for a given request.

  • Data Leakages Response - these rules provide protection against data leakages that may occur generally.

  • Data Leakages SQL Response - these rules provide protection against data leakages that may occur from backend SQL servers. Often these are indicative of SQL injection issues being present.

  • Data Leakages Java Response - these rules provide protection against data leakages that may occur because of Java.

  • Data Leakages PHP Response - these rules provide protection against data leakages that may occur because of PHP.

  • Data Leakages IIS Response - these rules provide protection against data leakages that may occur because of Microsoft IIS.

  • Blocking Evaluation Response - these rules provide the anomaly based blocking for a given response.

  • Correlation Response - these rules facilitate the gathering of data about successful and unsuccessful attacks on the server.

LightCDN all right reserved,powered by Gitbook Updated Time: 2022-11-03

results matching ""

    No results matching ""