Introduction of RESTful APIs for NIPS Version 5610 and 5611

October 28, 2022 | Adeline Zhang

A RESTful API means that API works in REST standard. RESTful API requires the front end to send requests in one predefined format, so the server only needs to use one unified interface to process. NSFOCUS NIPS can use RESTful API to get the device information or change settings. API tools need to be authorized […]

NSFOCUS WAF Secure Data Transfer

October 13, 2022 | Adeline Zhang

NSFOCUS WAF secures data transmission by restricting domain names, URLs, and request methods, and it can improve transmission security by converting ordinary HTTP requests into HTTPS requests forcibly. Configuration precondition: Configure HTTP and HTTPS sites and ensure that both HTTP and HTTPS sites can be accessed. Configuration method: Step 1: Click Security Management > Website […]

Introduction to Web APIs of NTA

October 6, 2022 | Adeline Zhang

The Web API of NTA provides an interface for configuring regions or IP groups. Data can be obtained with a GET request and added, removed, or modified with a POST request, facilitating the query and configuration of NTA by O&M personnel. All API POST requests will be recorded in the NTA audit log. Instructions for […]

XSS Attack Protection

September 30, 2022 | Adeline Zhang

Cross-Site Scripting (XSS) attacks are a type of injection in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to […]

Description of the Server Name Indication Feature on NSFOCUS WAF

September 22, 2022 | Adeline Zhang

The early SSLv2 was designed based on the classic public key infrastructure. By default, a server or an IP address could provide only one service so that the server could know which certificate to serve during the SSL handshake. The widespread use of virtual hosts leads to the situation where multiple domain names are mapped […]

Configuring Collaboration Between NTA and ADS

September 15, 2022 | Adeline Zhang

This document describes how to configure collaboration between ADS and NTA. NTA offers network monitoring and DDoS attack detection. If a DDoS attack is detected, NTA starts collaboration with ADS according to pre-defined rules to notify ADS. Then ADS starts the traffic diversion mechanism to divert suspicious traffic from the router or switch to ADS. […]

Viewing BGP Status of ADS and Troubleshooting

September 14, 2022 | Adeline Zhang

Viewing the BGP neighbor status of ADS Choose Diversion & Injection > Diversion Route > BGP Route. In the Route Daemon list, click the Neighbor Status button in the Operation column to view the status of a specified BGP route, as shown in the screenshot below. The displayed page shows the information of BGP neighbors. […]

Configuring Collaboration Between ADS M and NTA

September 1, 2022 | Adeline Zhang

ADS M can manage NTAs, including checking NTA running status, time synchronization, dispatching IP group configuration of a region, displaying traffic information of NTAs, and receiving logs uploaded from NTAs. The steps to configure the collaboration between ADS M and NTA are as follows: Configuring NTA Step 1: Choose Administration > Third-Party Interface > Management […]

Description of NIPS Discarding Jumbo Frames in MPLS Traffic by Default

August 25, 2022 | Adeline Zhang

When there is MPLS traffic in the network, there may be jumbo frames whose layer 2 packet including the CRC code has a length greater than 1518 bytes. The NIPS network interface card directly discards these jumbo frames by default, causing network failure. Perform the following check on the client side: 1. Test the client-side […]

Introduction to Web APIs of ADS

August 18, 2022 | Adeline Zhang

O&M personnel can quickly and easily perform operations such as information query and diversion configuration through web APIs. If web APIs of ADS are to be used by the management platform, mutual authentication between the management platform and ADS must be performed first to ensure security. The procedure is as follows: Step 1:Choose System > […]

Search