WAF
Mitigating DDOS attacks, easily creating custom rules, protecting your website and reducing the risk of malicious attacks and data leakage
Overview
Today request : Display the
total number
of requests todayMalicious request : Displays the number of
intercepted malicious requests
Traffic filtering request chart : Graph showing
all traffic requests
andfiltered requests
Real-time QPS : Displays the number of
requests per second
Block type (today) : Displays the types of
malicious requests intercepted
todayInterception map (today) : Displays the IP address of intercepted malicious requests, number of attacks, IP attribution and create a
map display
Number of isolated Trojans : Displays intercepted malicious requests by isolated
Unprotected website : Displays
unprotected
websitesPossibly incorrect CC protection rule : Displays
CC rules
that may beincorrect
Today's Block report : Click to view today’s
interception report
WebSite
Intercept access from known malicious IPs of aaPanel : Enable or disable blocking of
known malicious IPs
based on aaPanelSite/Modify : Display the name of the website. Click to manage the
protection management
of asingle site
.Total interceptions : Displays the total number of
malicious requests intercepted
by this site. Click to view the interceptiondetails type
.Fake spider : When enabled, requests from
fake search engines
will be intercepted.Using CDN : If the website uses CDN (
reverse proxy, Cloudflare etc.
), pleaseenable
it.Intelligent cc defense : Automatically adjust blocking rules based on website
load conditions
andhistorical access
conditions.CC defense : Enable or disable CC defense. It is not recommended to disable it. After disabling it, a large number of malicious access requests will
not be intercepted
.Status : Turn website protection
on
oroff
Log : View the interception log of this website and view the
interception details
. Add mistakenly intercepted requests toWhite URL
Blockade
Interception record : View and manage
all interception records
. Based on theinterception details
, Can add them to theIP blacklist
orURL whitelist
.IP blocking record : View and manage the IP addresses intercepted by WAF. According to the
interception details
, canWhite URL
,Block IP
,Unblock IP
Rule hit record : View the
rule records
of IP address hits
Black/White list
IP whitelist : Add IP to the whitelist.
IPs
added to this list willnot be blocked
. This is thehighest priority rule
.IP blacklist : Add IP to the blacklist.
IPs
added to this list willblock all requests
.
- UA whitelist : Add UA to the whitelist.
User-Agent
added to this list willnot be intercepted
.
UA blacklist : Add UA to the blacklist.
User-Agent
added to this list willintercept all requests
.URL whitelist : Add URLs to the whitelist.
URLs
added to this list willnot be blocked
.URL blacklist : Add URL to the blacklist.
URLs
added to this list willintercept all requests
.
Region
- Add Region Restriction : Add a
region
tointercept
orallow
access requests
Custom rules
- Add custom interception
Add custom interception rules to intercept
or allow access requests
based on the following rules:
- Client lP address
- Country
- IP range
- Method
- URl(Without parameters)
- URl(With parameters)
- URl parameter name
- URl param
- Request header
- User Agent
- Referer
- Request header name
Attack Map
An attack map based on IP geographical location statistics
Report
IP Report : View and manage
IP interception
. Can permanently block or release this IP according to theaccess details
of the IP.URI Report : View and manage
URI interception
. Can permanently block or release this URI according to theaccess details
of the URI.Search : Search the
interception log
of the website, Can searchIP
,URI
,URL
,Time
Global
Manage the global configuration of WAF. Please see the instructions
for modification.
Inheritance: The global setting will automatically inherit the default value in the site configuration
Priority:
IP whitelist
> IP blacklist > UA whitelist > UA blacklist > URL keyword interception > URL CC defense > URL whitelist > URL blacklist > Non-browser > User-Agent > CC defense > Cookie > URI filter > URL parameter > POST > Website custom defense
Simulated attack : Simulate attack to
check whether WAF is effective
Export : Export WAF configuration
Import : Import WAF configuration
Restore default config : Will restore the default configuration of WAF and
delete all configurations
added by users.CC defense : Defense against CC attacks, please adjust the specific defense parameters in the
site configuration
Request defense : Malicious request blocking threshold.
Static file protection : CC protection by default will
not protect
: JS, CSS, GiF, JPG, JPEG, PNG, thesestatic files
, if it is not brushed image traffic is not recommended to always open.Malicious IP Sharing Program : Join the Malicious IP Sharing Program to gain access to the "Fortress Malicious IP Library"
URL CC defense : URL defense CC rule, priority is
higher than URL whitelist
URL enhancement mode : Setting up a URL validation rule independently
Machine verification whitelist : Use when you need to
not validate certain pages
when enabling human authenticationNon-browser interception : Can defend
against crawler attacks
andnon-browser access
. Currently, it will be applied to all websites. If the website hasCDN enabled
, it is recommendednot to enable
it (there is a cache false alarm)HTTP request filtering : HTTP request type filtering/request header filtering/semantic analysis switch
URL request type interception : Set URL interception request type separately
API interface defense : When some interfaces are in the
whitelist
, one of them needs to be used under CC defenseSpider pond : By default, all major
search engine spiders are allowed
to crawlSQL injection defense : Detect
malicious SQL statements
andprevent malicious tampering
of the database due to SQL injectionNote: If the content published on your website contains SQL statements (such as
database-related
tutorial articles), enabling this defense may cause the publication of related content to be blockedXSS Defense : Detect
XSS syntax
to prevent web pages from being maliciously tampered with,user information
leaked, andpermissions stolen
Note: If the content published on your website contains tutorials on malicious use of
javascript
, enabling this defense may result in the publication of related content being blockedCommand Execution Interception : Determine and block the
execution
ofpotentially dangerous commands
through the syntax model, effectively preventing hackers from invading the server through the websiteWeak password defense : Real-time detection of
weak password login
andinterception
Sensitive information detection : Intercept sensitive
information
inerror messages
, includingSQL errors
,PHP errors
, etc.Malicious file upload defense : Detect
malicious file uploads
, prevent Trojans from being uploaded, and prevent server permissions from being lostNote: If you upload a file with the keyword php in the file name, enabling this defense may result in the IP being blocked
Malicious Download Defense : Detect
malicious downloads
andprevent backup files
,source code
, and other critical data from being downloadedNote: If you need to download backup files from a website, and if the compressed file contains the website name, enabling this defense may cause the download file to be intercepted. You can download it through the panel
Custom rule interception : Detect
php code
execution, detectdirectory
detection, detectSSRF
detection, andcustom
detectionNote: The current rules can be edited, and the default is that both GET/POST request methods will take effect.
Malicious crawler defense : Detect
malicious crawlers
and prevent malicious crawlers from accessing the websiteNote: If your website needs to be included in the search engine, be sure not to add the search engine features
Malicious Cookie Defense : Detect whether the cookie contains malicious code,
SQL injection
,XSS attack
Malicious Scanner Defense: Detect malicious scanners, prevent all kinds of scanners,
Trojan
connection tools, and access to thewebsite
.Note: If your website is undergoing
security testing
, it may be blocked.Directory Scan Defense : Prevent directory/file scanning, and perform statistical interception through the
404
status code of the access.Note: If your webpage has many
404
images, it may cause access to be blockedTrojan detection : Webshell inspection is
performed
through real-time accessfiles
. The results are on the isolation box page. It is recommended not to turn off this function.Note: If your normal files are pulled into the isolation box, please add white in the isolation box.
Logging : The
default
firewall only records HTTP intercepteddata packets
within1M
. If you need to record larger data packets, turn on this function.Sensitive text replacement :
Replace
the set sensitivetext
. If the Baota website acceleration is installed, this function will be invalid.URL keyword interception : Intercept
keywords
from URLBanned words :
Banned words
orphrases
in text
Feedback or Suggestions
If you encounter problems or suggestions during use, please contact us through the following methods:
- (Please describe in
detail
or providescreenshots
)
- Forum: https://www.aapanel.com/forum
- Email: [email protected]