WAF HTTP Access Control Feature Overview and Configuration Examples

December 2, 2024 | NSFOCUS

In the process of using WAF, when we need to detect elements like hostname, URL path, HTTP request methods, and IP blacklists, we can utilize the HTTP Access Control function to meet these requirements. This article provides a detailed guide on using WAF’s HTTP Access Control feature and highlights relevant considerations. 1. HTTP Access Control […]

Introduction to TI Capability on NSFOCUS ADS

November 12, 2024 | NSFOCUS

NSFOCUS ADS integrates NSFOCUS Threat Intelligence (NTI) capability to block IP addresses with high threat levels and risks. To ensure data reliability, ADS allows the daily update of intelligence data and offers optional update time periods. ADS also provides an exception IP function to filter IPs in NTI. IPs in exception IP no longer go […]

WAF License Import

August 30, 2024 | NSFOCUS

WAF licenses are classified into two types: 1. Trial-use license After a trial-use license expires: 2. Paid license After a paid license expires, the system can still provide protection functions, but the system upgrade cannot be conducted. The step of importing a license: Click System Management -> System Tools -> License -> Click Browse to […]

WAF Cloud Authentication Issue Troubleshooting

August 22, 2024 | NSFOCUS

If the virtual product uses cloud authentication, it needs to communicate with the cloud authentication center periodically every day to complete the authentication and ensure availability. You can confirm the authorization mode under System Management -> System Tools -> License -> Authorized by. For example, in the image below, the device uses cloud authorization. If […]

Log in to the ADSM Portal using Region User

August 15, 2024 | NSFOCUS

This article will introduce how to use Region User to log into Portal on ADSM and achieve permission control among different accounts. Due to different versions, the screenshots in this article may be inconsistent with the webpage of your device, but the functions can still be used as a reference. Why Use Region User? In […]

Use ADS Programmable Rules to Customize Protection Capabilities

July 26, 2024 | NSFOCUS

This document will guide you through the process of leveraging programmable rules in ADS to customize your protection capabilities. Unlike static solutions, the programmable defense allows you to create custom rules and policies that respond to attacks in real time, providing more precise and effective protection. NSFOCUS ADS has incorporated this functionality in its F05 […]

Enable Two-Factor Authentication (2FA) with Email Verification on NTA

July 12, 2024 | NSFOCUS

This article provides instructions on configuring and using email verification with password authentication to implement two-factor authentication (2FA) on NTA. The NTA version used in this article is V4.5R90F05. The email verification feature is unavailable if your device runs an earlier version. To use this feature, you must upgrade NTA to V4.5R90F05. Prerequisites To use […]

Introduction to NTA Auto-learning Function

June 28, 2024 | NSFOCUS

The implementation of DDoS attack alerting relies on setting alert thresholds. Setting the threshold too high may result in false negatives, while setting it too low may lead to a high number of false positives. Therefore, it is crucial to establish appropriate thresholds. NTA provides automatically learn, record, and analyze network traffic from the IP […]

NTA Model Limitation for Upgrade to Version 4.5R90F05

June 14, 2024 | NSFOCUS

The models that support upgrading to V4.5R90F05 are NX3-HD2100/HD2200/HD3000 /vNTA. Due to hardware device limitations (including but not limited to memory, data disk size, etc.) used in the NTA NX3-1000E/2000E model, upgrading the system to V4.5R90F05 is highly likely to result in the system not functioning properly. Therefore, upgrading the software version to V4.5R90F05 is […]

NTP Reflection Protection in ADS

June 5, 2024 | NSFOCUS

An NTP amplification attack is a reflection-based volumetric distributed denial-of-service (DDoS) attack in which an attacker exploits a Network Time Protocol (NTP) server functionality to overwhelm a targeted network or server with an amplified amount of UDP traffic, rendering the target and its surrounding infrastructure inaccessible to regular traffic. An NTP amplification attack can be […]

Search