Introduction to NSFOCUS WAF Web Decoding Function

December 22, 2022 | Adeline Zhang

WAF web decoding function can decode base64-encoded data. After that, WAF performs attack detection by identifying attack signatures and provides prevention. The web decoding function is configured per website. Web Decoding Configuration Step 1. Choose Security Management > Website Protection, select a website group, click Web Decoding, and then click Create in the upper-right corner […]

New Feature – Protection Group-Specific NTI of ADS V4.5R90F04

December 9, 2022 | Adeline Zhang

Function Description This function will be released on ADS Version 4.5R90F04 in Q1 2023. The group-specific NTI is supported in ADS V4.5R90F04 as a supplement to the existing protection method.Before using this function, choose Advanced > NTI > NTI Configuration and set Enable to Yes. The group-specific NTI policy supports Traffic Control by Dst IP […]

New Feature – Protection Group-Specific ACL Rules in ADS R90F04

December 2, 2022 | Adeline Zhang

Function Description This function will be released on ADS Version 4.5R90F04 in Q1 2023. As global ACL rules may not be suitable for some scenarios, ADS R90F04 supports custom access control rules for a protection group for more refined control. The underlying implementation of ACL rules in ADS R90F04 is refactored, significantly improving the performance. […]

NSFOCUS WAF IP Reputation Introduction

November 24, 2022 | Adeline Zhang

NSFOCUS WAF obtains IP Reputation Data Feed from NSFOCUS Threat Intelligence (NTI). NSFOCUS WAF IP Reputation can get the list of IP addresses that have earned a negative reputation through involvement in suspicious activity, including phishing attacks, spam, botnets, DDoS attacks, APT attacks, and more. NSFOCUS WAF will filter high-risk IP addresses from IP Reputation […]

Detection of Constituent Proportions of Outbound Traffic for DDoS Attacks

November 15, 2022 | Adeline Zhang

Function Description​ This function will be released on NTA Version 4.5R90F04 in Q1 2023. In the earlier versions, the NTA identifies outbound DDoS attacks by traffic thresholds set for region IP addresses. Some customers with small-traffic businesses hope the NTA can detect constituent proportions of outbound traffic for DDoS attacks. If the outbound traffic of […]

Introduction of RESTful APIs for NIPS Version 5610 and 5611

October 28, 2022 | Adeline Zhang

A RESTful API means that API works in REST standard. RESTful API requires the front end to send requests in one predefined format, so the server only needs to use one unified interface to process. NSFOCUS NIPS can use RESTful API to get the device information or change settings. API tools need to be authorized […]

NSFOCUS WAF Secure Data Transfer

October 13, 2022 | Adeline Zhang

NSFOCUS WAF secures data transmission by restricting domain names, URLs, and request methods, and it can improve transmission security by converting ordinary HTTP requests into HTTPS requests forcibly. Configuration precondition: Configure HTTP and HTTPS sites and ensure that both HTTP and HTTPS sites can be accessed. Configuration method: Step 1: Click Security Management > Website […]

Introduction to Web APIs of NTA

October 6, 2022 | Adeline Zhang

The Web API of NTA provides an interface for configuring regions or IP groups. Data can be obtained with a GET request and added, removed, or modified with a POST request, facilitating the query and configuration of NTA by O&M personnel. All API POST requests will be recorded in the NTA audit log. Instructions for […]

XSS Attack Protection

September 30, 2022 | Adeline Zhang

Cross-Site Scripting (XSS) attacks are a type of injection in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to […]

Description of the Server Name Indication Feature on NSFOCUS WAF

September 22, 2022 | Adeline Zhang

The early SSLv2 was designed based on the classic public key infrastructure. By default, a server or an IP address could provide only one service so that the server could know which certificate to serve during the SSL handshake. The widespread use of virtual hosts leads to the situation where multiple domain names are mapped […]

Search