Troubleshooting Common Errors During NTA HA Configuration

An HA switchover is initiated when: A manual switchover is performed. The slave NTA does not receive any keepalive packet from the master NTA within the specified period. The master NTA engine works improperly. The link of the VRRP group interface is down. The master NTA interface is down. The...

Troubleshooting of Failure to Import a License into NSFOCUS ADS

After ADS is installed, you must import a license before using it. License types vary a bit for hardware devices and virtual devices: Hardware device: License types include Trial, Temporary Sales, and Perpetual. Virtual device (vADS): License types include Trial, Temporary Sales, Perpetual, and Subscription. ADS will provide limited functions...

New Feature – Upgrade of Detection Rules via the Cloud in NTA V4.5R90F04

Function Description This function will be available in NTA V4.5R90F04 in Q2 2023. NTA allows online upgrades of the DDoS detection rule library for automatic protection. This function can meet most of the current customization requirements by providing the latest detection rules against new types of DDoS attacks. Configuration Procedure...

NSFOCUS WAF Syslog Introduction

In computing, syslog is a standard for message logging.  It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, indicating the type of system generating the message, and is assigned...

Introduction to NSFOCUS WAF REST API

WAF REST API is known as the secondary development interface, and can be called by third-party platforms/software for adding, deleting, modifying, and querying WAF as wells its site, policy, and other configurations. Basic Conventions Format conventions: WAF REST API requests and responses are in JSON format: The attribute (primary key)...

NIPS V5.6R10 Policy Matching Mechanism

The NIPS policy matching mechanism is blocking first. That is, when traffic is matched against all policies, if one policy is matched whose action is set to block, traffic is blocked. When configuring IPS policies, it is recommended that they should not be overlapped. For example, security zones should not...

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.