This document will guide you through the process of leveraging programmable rules in ADS to customize your protection capabilities. Unlike static solutions, the programmable defense allows you to create custom rules and policies that respond to attacks in real time, providing more precise and effective protection. NSFOCUS ADS has incorporated...
Category: Knowledge Base
Enable Two-Factor Authentication (2FA) with Email Verification on NTA
This article provides instructions on configuring and using email verification with password authentication to implement two-factor authentication (2FA) on NTA. The NTA version used in this article is V4.5R90F05. The email verification feature is unavailable if your device runs an earlier version. To use this feature, you must upgrade NTA...
Introduction to NTA Auto-learning Function
The implementation of DDoS attack alerting relies on setting alert thresholds. Setting the threshold too high may result in false negatives, while setting it too low may lead to a high number of false positives. Therefore, it is crucial to establish appropriate thresholds. NTA provides automatically learn, record, and analyze...
NTA Model Limitation for Upgrade to Version 4.5R90F05
The models that support upgrading to V4.5R90F05 are NX3-HD2100/HD2200/HD3000 /vNTA. Due to hardware device limitations (including but not limited to memory, data disk size, etc.) used in the NTA NX3-1000E/2000E model, upgrading the system to V4.5R90F05 is highly likely to result in the system not functioning properly. Therefore, upgrading the...
NTP Reflection Protection in ADS
An NTP amplification attack is a reflection-based volumetric distributed denial-of-service (DDoS) attack in which an attacker exploits a Network Time Protocol (NTP) server functionality to overwhelm a targeted network or server with an amplified amount of UDP traffic, rendering the target and its surrounding infrastructure inaccessible to regular traffic. An...
API Security Events Classification
The risk levels of API security events for NSFOCUS WAF version 6080 are categorized as follows: :Low Risk Events :Medium Risk Events :High Risk Events API Security Event Types: Event TypeDescriptionAbuseAttacks covered include JavaScript-related, account takeover, and CSRF.Sensitive Data ExposureAttacks covered include sensitive information leakage, anti-crawling, information leakage prevention, and...