Illegal Download Protection

June 1, 2023 | NSFOCUS

When a client downloads a file from a server, NSFOCUS WAF performs protection based on the file type, file size or MIME type. If the download file matches an illegal download restriction policy, NSFOCUS WAF allows or blocks the download based on the corresponding action specified in the policy, and logs the event. On the […]

Configuring TCP Flood Protection on NSFOCUS WAF

May 16, 2023 | NSFOCUS

According to the working principle of TCP/IP, only a certain amount of TCP/IP connections are allowed. Attackers exploit this to launch TCP flood attacks, which are divided into two types: An attacker sends too many SYN packets to a target server for processing, exhausting the server’s resources and making the server unresponsive to legitimate traffic. […]

Configuring Network-Layer Access Control on NSFOCUS WAF

May 2, 2023 | NSFOCUS

The network-layer access control function mainly controls the network layer and transport layer. It is a firewall function. NSFOCUS WAF incorporates this function to enable users to configure network-layer access controls on WAF. This function is available only when NSFOCUS WAF is deployed in in-path or out-of-path mode, but unavailable when the device is in […]

NSFOCUS WAF Syslog Introduction

March 3, 2023 | NSFOCUS

In computing, syslog is a standard for message logging.  It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, indicating the type of system generating the message, and is assigned a severity level. Computer system […]

Introduction to NSFOCUS WAF REST API

February 17, 2023 | NSFOCUS

WAF REST API is known as the secondary development interface, and can be called by third-party platforms/software for adding, deleting, modifying, and querying WAF as wells its site, policy, and other configurations. Basic Conventions Format conventions: WAF REST API requests and responses are in JSON format: The attribute (primary key) name and character string of […]

NSFOCUS WAF Website Certificate Generation Method

January 13, 2023 | NSFOCUS

To protect HTTPS websites, the certificate used by these websites needs to be uploaded to NSFOCUS WAF. These certificates may be in different formats, such as .pfx, .crt, and .pem. NSFOCUS WAF, however, supports .cer certificates only. Therefore, the customer needs to extract the certificate information and private key from the original certificate file and […]

Introduction to NSFOCUS WAF Web Decoding Function

December 22, 2022 | Adeline Zhang

WAF web decoding function can decode base64-encoded data. After that, WAF performs attack detection by identifying attack signatures and provides prevention. The web decoding function is configured per website. Web Decoding Configuration Step 1. Choose Security Management > Website Protection, select a website group, click Web Decoding, and then click Create in the upper-right corner […]

NSFOCUS WAF IP Reputation Introduction

November 24, 2022 | Adeline Zhang

NSFOCUS WAF obtains IP Reputation Data Feed from NSFOCUS Threat Intelligence (NTI). NSFOCUS WAF IP Reputation can get the list of IP addresses that have earned a negative reputation through involvement in suspicious activity, including phishing attacks, spam, botnets, DDoS attacks, APT attacks, and more. NSFOCUS WAF will filter high-risk IP addresses from IP Reputation […]

NSFOCUS WAF Secure Data Transfer

October 13, 2022 | Adeline Zhang

NSFOCUS WAF secures data transmission by restricting domain names, URLs, and request methods, and it can improve transmission security by converting ordinary HTTP requests into HTTPS requests forcibly. Configuration precondition: Configure HTTP and HTTPS sites and ensure that both HTTP and HTTPS sites can be accessed. Configuration method: Step 1: Click Security Management > Website […]

XSS Attack Protection

September 30, 2022 | Adeline Zhang

Cross-Site Scripting (XSS) attacks are a type of injection in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to […]