tencent cloud

Web Application Firewall

Release Notes and Announcements
Release Notes
Product Announcement
Security Advisory
Product Introduction
Overview
Product Category
Strengths
Scenarios
Plans and Editions
Supported Regions
Basic Concepts
Getting Started
Getting Started
FAQs for Beginners
Operation Guide
Overview
Connection Management
Security Operations
Protection Policies
Service Settings
사례 튜토리얼
WAF CCP Overview
Bot Management
API Security
Integration
Protection Configuration
FAQS
Product Consultation
Connection
Usage
Permissions
Sandbox Isolation Status
WAF 정책
개인 정보 보호 정책
데이터 처리 및 보안 계약

Cloud-Native Instance Object Access

PDF
포커스 모드
폰트 크기
마지막 업데이트 시간: 2024-09-05 11:10:40
If your Web business has enabled Cloud Load Balancer (CLB), you can integrate precision domain name protection in the WAF instance or enable cloud-native object policy protection. This document guides you on how to enable the default protection for CLB instance objects.
Note:
Object access is supported only in the Enterprise Edition and later. Upgrade the WAF instance package edition to the Enterprise Edition to access cloud-native protection objects.

Background

Cloud-native object access supports integration based on cloud-native instance objects (CLB, cloud-native gateways, APISIX gateways, etc.) or other hybrid cloud cluster objects accessed through application gateway SDKs. After integration, a default basic security protection policy set is automatically generated based on cloud-native instance ID objects or hybrid cloud cluster ID objects. This provides default protection for Web traffic without configured domain name access and allows customer-defined management of the corresponding protection policies.
The relevant protection activation sequence is as follows:   


Configuration Instructions

1. Log in to the WAF console, and choose Asset Center > Connection Management > Instances in the left sidebar.
2. On the object access page, view all instance information for CLB or cloud-native gateways.
After the current account is authorized, the system will automatically synchronize discovered instances of CLB or cloud-native gateways within 5 minutes. If the accessed instances of CLB or cloud-native gateways are not listed, you can click Sync assets to synchronize updated assets.
If some web traffic of the current CLB or cloud-native gateway instance has been accessed through an exact domain name, you can view it through the WAF instance ID/name column. For web traffic already protected by an exact domain name, the protection policy of the exact domain name is matched first. If there is no such policy or if it is not hit, the protection policy based on the CLB instance object will automatically take effect.

3. Enable WAF protection.
3.1 Select the instance of the CLB or cloud-native gateway with enabled WAF protection, and click

in the WAF switch column.

3.2 In the confirmation popup for enabling, click OK to enable WAF protection.
Note:
After it is enabled, WAF will protect the traffic passing through the CLB listener, intercept attack behaviors, and record attack logs.
If you only have one CLB-type WAF instance, you can directly enable WAF protection with one click.
If you have multiple CLB-type WAF instances, first bind the corresponding WAF instance to the CLB instance in the WAF instance ID/name column, and then enable WAF protection with one click.
4. Disable WAF protection.
4.1 Select the instance of the CLB or cloud-native gateway with enabled WAF protection, and click

in the WAF switch column.
4.2 In the confirmation popup for disabling, click OK to disable WAF protection.
Note:
After it is disabled, WAF will no longer protect the traffic passing through the CLB listener, and all WAF features will become ineffective.
5. Enable the Bot Traffic Analysis switch.
5.1 Select the instance of the CLB or cloud-native gateway with enabled WAF protection, and click

in the bot switch column.

5.2 In the confirmation popup for enabling, click OK to enable bot protection.
Note:
To enable bot traffic management, you need to purchase the instance's bot traffic management feature corresponding to WAF.
Only CLB object types support enabling the bot traffic switch.
6. Enable the API Security Switch.
6.1 Select the instance of the CLB or cloud-native gateway with enabled WAF protection, and click

in the API Security Switch column.

6.2 In the confirmation popup for enabling, click OK to enable API security protection.
Note:
To enable API Security, you need to purchase the instance's API security feature corresponding to WAF.
Only CLB object types support enabling the API Security Switch.


도움말 및 지원

문제 해결에 도움이 되었나요?

피드백