ADS

Preparation for ADS Diversion

March 22, 2024 | NSFOCUS

This article summarizes the preparation configuration of ADS diversion. The specific configuration details may vary depending on the information of the ADS on the client side, router information, and ADS version. The configuration content and order can be referenced from this article. 1. Before configuring diversion, it is necessary to configure IP address information on […]

Preliminary Troubleshooting for Cloud Authentication Failure in ADS, NTA and ADSM

February 1, 2024 | NSFOCUS

If the virtual product uses cloud authentication, it needs to communicate with the cloud authentication center periodically every day to complete the authentication and ensure availability. You can confirm the authorization mode by checking the Authorization Mode of the license. For example, in the image below, NTA uses cloud authorization. If the product fails to […]

ADS Attack Traffic Statistics Graph

January 12, 2024 | NSFOCUS

In the 24-Hour Traffic graph under Logs -> Logs Analysis > Attack Traffic Statistics of ADS, you will find the graph displaying three lines: ALL_RX_MAX (represented by the red line), ALL_RX (represented by the green line), and ALL_TX (represented by the blue line). The explanation of each line is: It’s important to note that the […]

Troubleshooting for NTA and ADS Automatic Diversion

January 5, 2024 | NSFOCUS

When NTA detects abnormal traffic, it can notify ADS to divert the traffic. ADS sends route diversion notifications to the router, redirecting the traffic to ADS for cleaning. Based on this scenario, this article will summarize troubleshooting directions when traffic is not successfully diverted to ADS. 1. Check whether automatic diversion is triggered. You can […]

HTTP/2 Protection in ADS R90F03

October 20, 2023 | NSFOCUS

Function Description For HTTPS application layer protection, ADS establishes a TLS connection with a client in replace of the server, and then authenticates the client through the application-layer protocol HTTP. If the client properly responds to the HTTP packet from ADS, ADS deems this client reliable and will add it to the trust list so […]

Automated and Manual Backup Procedures for ADS, ADSM and NTA

October 6, 2023 | NSFOCUS

Configuration backup is important in many scenarios: Next, we will provide a step-by-step guide on performing configuration backup individually for ADS, ADSM, and NTA. ADS ADS supports one-click export of the current configuration. Click Export on ADS System > Local Settings > Configuration File Management to download configuration files directly: Pay attention to the following […]

Introduction to ADS’s HTTP Keyword Checking Policy

August 29, 2023 | NSFOCUS

HTTP Keyword Checking is a process by which ADS controls HTTP traffic through the ADS device. In addition, ADS takes a specific action (Accept, Drop, Disconnect, Add to blacklist, Add to whitelist, or Limit rate) as configured on passing packets whose source IP address and specific fields match the HTTP Keyword Checking rule. HTTP Keyword […]

Blacklist Function Optimization on ADS R90F03

August 11, 2023 | NSFOCUS

ADS R90F03 refactors the blacklist function. You can configure group-specific blacklist rules, and blacklists of different groups take effect independently. Besides, you can use a global blacklist to make related rules and blocked addresses take effect for all groups. Blacklist Introduction on ADS The blacklist function in ADS before R90F03 has the following features: ADS […]

“Save” and “Apply” Buttons on ADS Configuration Page

August 3, 2023 | NSFOCUS

When working with the ADS, it is important to understand the role of the “Apply ” and “Save” buttons located in the upper-right corner of the configuration pages. Apply: Clicking the “Apply” button will apply and enforce the configuration changes, making them effective in the RAM of the ADS. These changes will take effect immediately […]

Description of ADS Attack Logs: SYN Flood Logs (Part 1)

July 20, 2023 | NSFOCUS

Introduction to SYN Flood A three-way handshake is required to establish a TCP connection. First, the client sends a TCP SYN packet to the server. The server responds to the client request with an SYN-ACK packet. Then the server waits and expects an ACK packet from the client. At this time, the connection is in […]