NSFOCUS WAF New UI Showcase: Brand New Policy and Template Management Workflow

April 15, 2025
Three-Tier Protection Rules • Basic Protection: Pre-configured, general and popular security rules for out-of-box deployment.• Optional/Advanced Protection: Advanced rules, customized for specific Web/API applications for optimum protection. Basic Protection HTTP Protocol Verification Server Plug-in Crawler Web General Illegal Upload Information Disclosure Semantic Engine Scan Protection Optional Protection HTTP Access Control Sensitive Information Filter Smart Engine […]
NSFOCUS WAF New UI Walkthrough: Site Configuration

April 9, 2025
Basic Information Functional Configuration Manage Advanced Features in One Page Security Settings Key Benefits
New UI for NSFOCUS WAF V6.0R09F00 – Experience a Smoother Site Management

April 3, 2025
NSFOCUS understands that the Security Operations team is facing increasing threats to their web applications and workloads are rising accordingly, a simple yet easy-to-use WAF has become more important than ever for effective Security Operations. The upcoming NSFOCUS Web Application Firewall (WAF) V6.0R09F00 (hereafter called as 6090) not only comprehensively reconstructs the architecture but also […]
Key Events of 2024 for NSFOCUS WAF

January 8, 2025
Summarizing the past, embracing the future. Let’s take a recap at the key events of NSFOCUS WAF in 2024. Market Recognition Market share: From 2019 to 2023, NSFOCUS WAF has been ranked 1st in China’s WAF hardware market share. March 2024: Recognized by Forrester, a leading market research company, for our outstanding Bot Management capabilities. […]
NSFOCUS WAF Security Reports
February 8, 2024
NSFOCUS WAF security reports are divided into classification-specific alert reports and period-specific alert reports. You can acquire reports based on query conditions, such as websites, event types, statistic collection periods, and statistic collection time. 1. Generation procedure: Logs & Reports > Security Reports > Classification-Specific Alert Report or Period-Specific Alert Report > Choose the query […]
Introduction to NSFOCUS WAF SNMP
December 22, 2023
Simple Network Management Protocol (SNMP) is an application-layer protocol that transmits management data between network devices. SNMP belongs to the Transmission Control Protocol/Internet Protocol (TCP/IP) family and is one of the most widely used network protocols for managing and monitoring network components across a variety of industries. The majority of network components come with an […]
NSFOCUS WAF Running Modes
November 7, 2023
NSFOCUS WAF supports multiple running modes. You can modify the running mode based on the network topology. Deployment Topology Deployment Topology can be set to In-Path, Out-of-Path, Reverse Proxy, Mirroring or Plugin-enabled. Mode Configuration Mode Configuration can be set to one of the following values (modes vary with deployment topologies): Emergency Mode After entering the […]
Introduction to WAF Exception Policy
October 27, 2023
Exception policies are supplements or restrictions to configured basic or advanced protection policies. On the Exception Policy page, you can create, edit, delete, and duplicate exception policies. You can also create and edit exception policies on the Website Protection page. Configuration procedure: Choose Security Management > Policy Management > Exception Policy, click Create in the […]
Introduction to NSFOCUS WAF Apply Rule Database
September 11, 2023
In the versions before 6.0.7.3.61634, after users upgrade the NSFOCUS WAF Rule Database, they have to add the new rules one by one to the website’s policy based on the rule name or the rule number manually to apply the new policies. To improve user experience, the NSFOCUS WAF version 6.0.7.3.61634 has optimized this functionality. […]
Path Traversal Attack Protection
August 18, 2023
A path traversal attack, or directory traversal, aims to access files and directories stored outside the web root folder. When the server does not check the user input strictly, by manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary […]