Item | SaaS | Cloud Native |
Applicable Scenario | Suitable for all users (Tencent Cloud users or local IDC users), domain access is achieved through DNS resolution scheduling. | Tencent Cloud users who are already using or planning to use Layer-7 load balancing (CLB), Cloud Native Gateway, or SCF; users leveraging APISIX or other application gateway services seeking to integrate WAF protection capabilities. |
Core strengths | Wide applicability, covering both Tencent Cloud users and non-Tencent Cloud users. | Seamless access with millisecond-level latency; domain access to WAF does not require modifying existing network architecture. Decoupling website traffic forwarding from security protection ensures stable and reliable business traffic forwarding. Supports multi-region access. |
How to choose | If users have websites both on Tencent Cloud and on-premises that require protection, or if Layer-7 load balancing is not used on Tencent Cloud, SaaS WAF is recommended. If webpage tampering prevention and data leakage prevention are needed, only SaaS-based WAF can be used. | Tencent Cloud users who are already using or planning to use Layer-7 load balancing (CLB), Cloud Native Gateway, or SCF, and require Web security protection, BOT traffic management, Cybersecurity Classified Protection Compliance Service, or website security operations, are recommended to adopt Cloud Native WAF. |
Selecting Region | SaaS WAF requires selecting the region during purchase. | Cloud Native WAF does not require selecting a region during purchase. During console configuration, it will be associated with the supported regions of Cloud Load Balancer (CLB). |

Access Type | Integration Steps |
Cloud Native CLB domain configuration | By configuring the domain name and Layer-7 CLB (listener) resources in the WAF console's domain access settings, bypass threat detection and cleansing are performed on HTTP/HTTPS traffic passing through the Cloud Native instance listener, achieving decoupling of business forwarding and security protection. |
Cloud Native CLB instance configuration | By enabling Layer-7 CLB (instance) access to WAF in the object access section of the WAF console, bypass threat detection and cleansing are performed on HTTP/HTTPS traffic passing through the Cloud Native instance, achieving separation of business forwarding and security protection. |
Cloud Native Gateway and SCF domain configuration | By enabling WAF protection through the API Gateway console (refer to the API Gateway product documentation) and SCF console, and configuring the domain name in the WAF console's domain access settings, bypass threat detection and cleansing are performed on HTTP/HTTPS traffic passing through the Cloud Native Gateway and SCF gateway, achieving separation of business forwarding and security protection. |
Cloud Native Gateway instance object configuration | By enabling WAF protection through the API Gateway console (refer to the API Gateway product documentation) and enabling Cloud Native Gateway (instance) access to WAF in the WAF console's object access section, bypass threat detection and cleansing are performed on HTTP/HTTPS traffic passing through the Cloud Native Gateway instance, achieving separation of business forwarding and security protection. |



Apakah halaman ini membantu?
Anda juga dapat Menghubungi Penjualan atau Mengirimkan Tiket untuk meminta bantuan.
masukan