检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Delete or modify the rule: Click Delete or Modify in the Operation column of the rule. Verify the protection effect: Clear the browser cache and access http://www.example.com using IP addresses in Huawei Cloud IP address library.
If you no longer need an address group, disassociate it from the blacklist or whitelist rules and click Delete in the Operation column to delete it. Address groups you add in this step will be synchronized to the Address Groups page.
How Long Will CNAME Records Be Retained After I Delete a Domain Name from WAF? What Are the Precautions for Configuring Multiple Server Addresses for Backend Servers? Does WAF Support Wildcard Domain Names? Does WAF Protect Chinese Domain Names?
To delete a certificate, locate the row of the certificate and click More > Delete in the Operation column. To update a certificate, locate the row of the certificate and click More > Update in the Operation column.
Delete or modify the rule: Click Delete or Modify in the Operation column of the rule. Configure a JavaScript-based anti-crawler rule by referring to Table 3. Two protective actions are provided: Protect all requests and Protect specified requests.
Billing termination If you no longer need a cloud service resource, you can unsubscribe from or delete it to stop the billing. For details, see Billing Termination. Cost management When WAF is used, the major cost is resource costs.
You can delete dedicated instance you no longer need to avoid unnecessary fee. Configure the Balance Alert function on the Billing Center > Overview page.
If IPv6 protection is not needed, edit the server configuration and delete IPv6 configuration from the origin server first. For details, see Editing Server Information. Enabling WAF IPv6 Protection Log in to the WAF console.
To delete a notification, locate the row containing the notification and click Delete in the Operation column. To modify a notification, locate the row containing the notification and click Modify in the Operation column.
Delete or modify the rule: Click Delete or Modify in the Operation column of the rule. Verify the protection effect: Clear the browser cache and access the http://www.example.com/admin page. If the sensitive information on the page is masked, the rule takes effect.
rules CC attack protection rules Precise protection rules Blacklist and whitelist rules Geolocation access control rules Web tamper protection rules JavaScript anti-crawler protection Information leakage prevention rules Data masking rules Go to the page displaying the hit rule and delete
Delete or modify the rule: Click Delete or Modify in the Operation column of the rule. Verify the protection effect: Clear the browser cache. Then, use an IP address from Shanghai to access the http://www.example.com page.
Delete or modify the rule: Click Delete or Modify in the Operation column of the rule. Verify the protection effect: Access the http://www.example.com/admin page. The initial page is displayed. Simulate the attack to tamper with the http://www.example.com/admin web page.
Delete or modify the rule: Click Delete or Modify in the Operation column of the rule. Verify the protection effect: Clear the browser cache and access the http://www.example.com page for 20 times within 60 seconds.
SQL keywords: union, Select, from, as, asc, desc, order by, sort, and, or, load, delete, update, execute, count, top, between, declare, distinct, distinctrow, sleep, waitfor, delay, having, sysdate, when, dba_user, case, delay, and the like Special characters: ',; () Mathematical
Locate the website for which error code 523 is returned, retain one configuration, and delete the website from redundant WAF instances. For details, see Deleting a Website from WAF.
Delete or modify the rule: Click Delete or Modify in the Operation column of the rule. One-Click Unblocking a Known Attack Source Rule Log in to the WAF console. Click in the upper left corner and select a region or project.
Delete the rule: To delete a rule you no longer need, click Delete in the Operation column of the rule. Modify or copy the rule: Click More > Modify or More > Copy in the Operation column of the target rule, respectively.
Then, click Disable or Delete in the Operation column of the target rule.
Delete or modify the rule: Click Delete or Modify in the Operation column of the rule. Verify the protection effect: Simulate an XSS attack. On the Events page, check the protection logs. Parent Topic: Configuring Protection Rules