{"id":17052,"date":"2021-08-11T13:11:46","date_gmt":"2021-08-11T05:11:46","guid":{"rendered":"https:\/\/www.microfusion.cloud\/cloud-solution\/alibaba-cloud\/alibaba-cloud-web-application-firewall\/"},"modified":"2022-09-01T10:31:36","modified_gmt":"2022-09-01T02:31:36","slug":"waf","status":"publish","type":"cloud_solution","link":"https:\/\/www.microfusion.cloud\/en\/cloud-solution\/alibaba-cloud\/waf\/","title":{"rendered":"Web Application Firewall (WAF)"},"content":{"rendered":"<div class=\"block block-image-text margin-large\" id=\"overview\">\n                <div class=\"row align-items-lg-center margin-bottom\">\n            <div class=\"col-lg-5\" data-fos=\"fade-up\" data-fos-lg-delay=\"\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"760\" height=\"507\" src=\"https:\/\/media.microfusion.cloud\/wp-content\/uploads\/2021\/08\/Alibaba-Cloud-Web-application-firewall-B.jpeg\" class=\"attachment-medium_large size-medium_large\" alt=\"\" srcset=\"https:\/\/media.microfusion.cloud\/wp-content\/uploads\/2021\/08\/Alibaba-Cloud-Web-application-firewall-B.jpeg 760w, https:\/\/media.microfusion.cloud\/wp-content\/uploads\/2021\/08\/Alibaba-Cloud-Web-application-firewall-B-300x200.jpeg 300w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/>            <\/div>\n            <div class=\"col-lg-5 offset-lg-1\" data-fos=\"fade-up\" data-fos-lg-delay=\"100\">\n                <div class=\"image-text-content\">\n                                            <h2 class=\"block-heading text-left\">A protection shield to ensure your services never shuts down<\/h2>\n                                        <div class=\"article-content text-left\">\n                        <p>General firewalls, as it turns out, can only defend against attacks at the fourth layer, the transmission layer. However, packet attacks on Layer 7, the application layer, can leave the enterprise\u2019s backend data open to theft and cause the site to shut down. For comprehensive protection, what is required is WAF! Protect your website&#8217;s backend data, control abnormal connection access, and even resist application-layer packet attacks\u2014Microfusion&#8217;s WAF solution handles it all, ensuring that website services are not interrupted.<\/p>\n                    <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n\n<\/div>\n<\/div>\n<div class=\"block block-features padding-large\" id=\"features\">\n    <div class=\"container\">\n        <div class=\"row justify-content-center\" data-fos=\"fade-up\">\n            <div class=\"col-lg-10 col-xl-8\">\n                                    <h2 class=\"block-heading text-justify\">Enterprise Web Application Firewalls (WAF) help you prevent intrusion of malicious traffic<\/h2>\n                                                    <div class=\"description text-justify\">\n                        <p>WAF, a Web Application Firewall, is like your website doorman\u2014any visitor must be vetted before being allowed entrance to prevent intrusion of malicious traffic. And by preventing SQL injection, it can resist common attacks to ensure the security and availability of the website. WAF can effectively identify malicious characteristics within web traffic. After cleaning and filtering traffic, it will return normal and secure traffic to the original site to avoid problems such as malicious intrusion and service abnormalities. Microfusion can help enterprises check HTTP traffic through the six features of WAF and &#8220;website monitoring\u201d mode. If traffic is found to be abnormal, it can be immediately eliminated, while normal traffic can enter.<\/p>\n                    <\/div>\n                            <\/div>\n        <\/div>\n        <div class=\"row justify-content-center\">\n                            <div class=\"col-lg-10\">\n                    <div class=\"accordion-list row\">\n                                                    <div class=\"col-md-6\">\n                                <div class=\"accordion-card\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" data-fos=\"fade-up\">\n    <div class=\"accordion-card-header active\">\n        <h3 class=\"h5\" itemprop=\"name\">Enjoy robust defense in just five minutes<\/h3>\n    <\/div>\n    <div class=\"accordion-card-content\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" style=\"display:block;\">\n        <div class=\"article-content\" itemprop=\"text\">\n            <p class=\"p1\">No need to install software; no need to reconfigure the website\u2014you just need to modify the DNS records to protect your website from potential cyberattacks.<\/p>\n        <\/div>\n    <\/div>\n<\/div><div class=\"accordion-card\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" data-fos=\"fade-up\">\n    <div class=\"accordion-card-header \">\n        <h3 class=\"h5\" itemprop=\"name\">Super-robust defense! The misjudgment rate is less than 1\/100,000<\/h3>\n    <\/div>\n    <div class=\"accordion-card-content\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" >\n        <div class=\"article-content\" itemprop=\"text\">\n            <p>Nearly a thousand built-in safety protection rules, with constant updates on the regulations each week. I. Through big data platform analysis, the overall misjudgment rate is controlled within 1\/100,000.<\/p>\n        <\/div>\n    <\/div>\n<\/div><div class=\"accordion-card\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" data-fos=\"fade-up\">\n    <div class=\"accordion-card-header \">\n        <h3 class=\"h5\" itemprop=\"name\">Precise defense, proper diagnosis and treatment, supports most application scenarios<\/h3>\n    <\/div>\n    <div class=\"accordion-card-content\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" >\n        <div class=\"article-content\" itemprop=\"text\">\n            <p>With precision defense, quickly filter malicious traffic, such as: Protecting the management backend, blocking malicious IPs, and whitelisting specific URLs. Supports a variety of common HTTP protocols, decodes common encodings, and has detection capabilities in complex environments; it is thus suitable for all cloud users.<\/p>\n        <\/div>\n    <\/div>\n<\/div>                            <\/div>\n                                                    <div class=\"col-md-6\">\n                                <div class=\"accordion-card\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" data-fos=\"fade-up\">\n    <div class=\"accordion-card-header \">\n        <h3 class=\"h5\" itemprop=\"name\">Enriches the database and establishes credibility for the website<\/h3>\n    <\/div>\n    <div class=\"accordion-card-content\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" >\n        <div class=\"article-content\" itemprop=\"text\">\n            <p>Security analysis is performed on billions of pieces of data every day; extraction rules are synchronized to all users for collaborative defense. Constantly adds to the malicious IP database and malicious sample database through the big data analysis, and establishes credibility for the website. One billion times per day of data traffic is analyzed for security; information is extracted and synchronized to users for collaborative defense. With ever-expanding data, the number of samples in the database is expanded and robust website credibility is established.<\/p>\n        <\/div>\n    <\/div>\n<\/div><div class=\"accordion-card\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" data-fos=\"fade-up\">\n    <div class=\"accordion-card-header \">\n        <h3 class=\"h5\" itemprop=\"name\">Detect attacks within milliseconds, and use the most immediate protection<\/h3>\n    <\/div>\n    <div class=\"accordion-card-content\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" >\n        <div class=\"article-content\" itemprop=\"text\">\n            <p>Attacks are detected and protection takes effect within one millisecond. New protection rules can be synchronized globally within one minute, covering the security risks reported in OWASP Top 10.<\/p>\n        <\/div>\n    <\/div>\n<\/div><div class=\"accordion-card\" itemscope itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\" data-fos=\"fade-up\">\n    <div class=\"accordion-card-header \">\n        <h3 class=\"h5\" itemprop=\"name\">High reliability, high availability<\/h3>\n    <\/div>\n    <div class=\"accordion-card-content\" itemscope itemprop=\"acceptedAnswer\" itemtype=\"https:\/\/schema.org\/Answer\" >\n        <div class=\"article-content\" itemprop=\"text\">\n            <p>Fully automatic detection means no need for manual intervention. THe WAF automatically responds with real-time protection and attack strategies through its rich database. The cleaning service has an availability of up to 99.99%, allowing users to avoid service interruptions.<\/p>\n        <\/div>\n    <\/div>\n<\/div>                            <\/div>\n                                            <\/div>\n                <\/div>\n                    <\/div>\n    <\/div>\n<\/div>\n<div class=\"container\">\n    <div class=\"article-content\">\n\n<div class=\"block block-image-text margin-large\" id=\"architecture\">\n            <div class=\"row justify-content-center\">\n            <div class=\"col-lg-10 text-center\">\n                <h2 class=\"block-heading\" data-fos=\"fade-up\">How it works<\/h2>\n            <\/div>\n        <\/div>\n                <div class=\"row align-items-lg-center margin-bottom\">\n            <div class=\"col-lg-5\" data-fos=\"fade-up\" data-fos-lg-delay=\"\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"348\" src=\"https:\/\/media.microfusion.cloud\/wp-content\/uploads\/2021\/08\/210806053-%E9%98%BF%E9%87%8C%E9%9B%B2-WAF-1-768x348.jpg\" class=\"attachment-medium_large size-medium_large\" alt=\"Alibaba Cloud-WAF Achitecture\" srcset=\"https:\/\/media.microfusion.cloud\/wp-content\/uploads\/2021\/08\/210806053-%E9%98%BF%E9%87%8C%E9%9B%B2-WAF-1-768x348.jpg 768w, https:\/\/media.microfusion.cloud\/wp-content\/uploads\/2021\/08\/210806053-%E9%98%BF%E9%87%8C%E9%9B%B2-WAF-1-300x136.jpg 300w, https:\/\/media.microfusion.cloud\/wp-content\/uploads\/2021\/08\/210806053-%E9%98%BF%E9%87%8C%E9%9B%B2-WAF-1-1024x464.jpg 1024w, https:\/\/media.microfusion.cloud\/wp-content\/uploads\/2021\/08\/210806053-%E9%98%BF%E9%87%8C%E9%9B%B2-WAF-1.jpg 1309w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>            <\/div>\n            <div class=\"col-lg-5 offset-lg-1\" data-fos=\"fade-up\" data-fos-lg-delay=\"100\">\n                <div class=\"image-text-content\">\n                                        <div class=\"article-content text-left\">\n                        <p>In this scenario, the user accesses the website service through the URL. WAF analysis and judgment is performed within to avoid malicious attacks. Normal connection behavior is directed to the original site backend; malicious behavior is filtered and blocked.<\/p>\n                    <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>","protected":false},"excerpt":{"rendered":"<p>Effectively identify malicious characteristics in web traffic; ensure the safety and availability of your website.<\/p>\n","protected":false},"author":20,"featured_media":16650,"parent":16902,"menu_order":0,"template":"","class_list":["post-17052","cloud_solution","type-cloud_solution","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.microfusion.cloud\/en\/wp-json\/wp\/v2\/cloud_solution\/17052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microfusion.cloud\/en\/wp-json\/wp\/v2\/cloud_solution"}],"about":[{"href":"https:\/\/www.microfusion.cloud\/en\/wp-json\/wp\/v2\/types\/cloud_solution"}],"author":[{"embeddable":true,"href":"https:\/\/www.microfusion.cloud\/en\/wp-json\/wp\/v2\/users\/20"}],"up":[{"embeddable":true,"href":"https:\/\/www.microfusion.cloud\/en\/wp-json\/wp\/v2\/cloud_solution\/16902"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microfusion.cloud\/en\/wp-json\/wp\/v2\/media\/16650"}],"wp:attachment":[{"href":"https:\/\/www.microfusion.cloud\/en\/wp-json\/wp\/v2\/media?parent=17052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}