Available Specifications/Editions
Available Specifications/Editions
Standard
10 (Supports one top-level domain name.)
2,000 QPS
WAF-to-Server connections: 6,000 per domain name
Supported
Supported
Supported
Supported
Supported
Not supported
Not supported
Not supported
Not supported
Professional
50 (Supports five top-level domain names.)
5,000 QPS
WAF-to-Server connections: 6,000 per domain name
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Why Huawei Cloud WAF?
Precise and Efficient Threat Detection in All Common Security and O&M Scenarios
WAF uses rule and AI dual engines and integrates our latest security rules and best security practices.
WAF can detect OWASP top 10 threats, decode 10+ types of code, and it uses a Huawei-patented technique that prevents threats from bypassing security controls, improving the detection rate by 40%.
WAF enables precise protection with customizable enterprise-grade protection policies, including custom alarm pages, composite rules for CC attack prevention, and IP address blacklists.
Privacy Data Protection and Storage of All Logs
You can anonymize your sensitive data, such as accounts and passwords, in attack logs.
You can also configure the minimum TLS version and cipher suite to make your services compliant with PCI-DSS certification.
You can authorize WAF to use Log Tank Service (LTS) to store as many logs as you need, including access, attack, and request logs.
Compliance Assistance
WAF makes it easier for you to meet compliance requirements such as PCI DSS certification.
WAF provides protection for IPv6 traffic to help meet the compliance requirements of governments and enterprises.
0-Day Vulnerabilities Patched Fast
A 24/7 professional security operation team is equipped, making it possible to fix emergency 0-day vulnerabilities within as little as 2 hours.
WAF uses virtual patches on the cloud so that 0-day vulnerabilities can be fixed in a timely manner and without any manual intervention.
WAF responds to and contains risks quickly with presets protection rules so that your web services will get protected all the time even before the third-party vendors fix vulnerabilities.
Three Typical Deployments for Web Service Security and Stability
Documentation
More Services
More Services
Anti-DDoS Service (AAD)
Divert attack traffic to high-defense IP addresses
Cloud Firewall (CFW)
Control traffic and prevent intrusions
Host Security Service (HSS)
Manage assets, prevent intrusions, and eliminate vulnerabilities