{"id":24718,"date":"2024-06-07T00:00:04","date_gmt":"2024-06-06T16:00:04","guid":{"rendered":"https:\/\/beyond-shenzhen.cn\/?post_type=blog&#038;p=24718"},"modified":"2026-04-08T16:28:31","modified_gmt":"2026-04-08T08:28:31","slug":"alibaba-cloud-waf","status":"publish","type":"blog","link":"https:\/\/beyond-shenzhen.cn\/en\/blog\/alibaba-cloud-waf\/","title":{"rendered":"\u3010SaaS\u3011Alibaba Cloud WAF Features\u3010Security\u3011"},"content":{"rendered":"<p>In this post, we will outline the features and functions of &#8220;Alibaba Cloud WAF,&#8221; a WAF service provided by Alibaba Cloud.<\/p>\n<p>* Information is current as of September 2021.<\/p>\n<p>&nbsp;<\/p>\n<h2>Alibaba Cloud Security History<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/beyond-shenzhen.cn\/wp-content\/uploads\/2024\/06\/AlibabaCloud_\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3.png\" alt=\"\" \/><\/p>\n<p>Alibaba Cloud is dedicated to developing security products aimed at protecting its infrastructure from a wide range of external cyber attacks.<\/p>\n<p>One of these products, Alibaba Cloud WAF (Web Application Firewall), is a security service built on over 10 years of security expertise. It is designed to defend against internet attacks and features an advanced defense mechanism that leverages big data capabilities.<\/p>\n<p>&nbsp;<\/p>\n<h2>Alibaba Cloud WAF Service Overview<\/h2>\n<p>Alibaba Cloud WAF can be implemented not only on Alibaba Cloud but also in on-premises environments, VPS (Virtual Private Servers), and infrastructure environments provided by other cloud platforms\u2014simply by switching DNS.<\/p>\n<p>As such, it is not restricted by the infrastructure environment in which it is deployed.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/beyond-shenzhen.cn\/wp-content\/uploads\/2024\/06\/AlibabaCloudWAF_\u7279\u5fb4.png\" alt=\"\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>Key Features of Alibaba Cloud WAF<\/h3>\n<table style=\"border-collapse: collapse; width: 100%; height: 208px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 29.9389%; height: 23px; background-color: #138995;\"><span style=\"color: #ffffff;\">Category<\/span><\/td>\n<td style=\"width: 30.6393%; height: 23px; background-color: #138995;\"><span style=\"color: #ffffff;\">Feature<\/span><\/td>\n<td style=\"width: 39.4217%; height: 23px; background-color: #138995;\"><span style=\"color: #ffffff;\">Overview<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 29.9389%; height: 93px; background-color: #f3f3f3;\" rowspan=\"3\">Web Application Protection<\/td>\n<td style=\"width: 30.6393%; height: 23px;\">Zero-day Attack Defense<\/td>\n<td style=\"width: 39.4217%; height: 23px;\">Enables prompt risk mitigation by dynamically updating defense rules within 24 hours.\u3002<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 30.6393%; height: 23px;\">Website Protection<\/td>\n<td style=\"width: 39.4217%; height: 23px;\">Protects sites from intruders by using DNS to reroute traffic.<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"width: 30.6393%; height: 47px;\">OWASP Attack Defense<\/td>\n<td style=\"width: 39.4217%; height: 47px;\">Provides various defense policies and isolation features to accurately identify and block known attacks, such as SQL injection.<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 29.9389%; height: 46px; background-color: #f3f3f3;\" rowspan=\"2\">Site Access Control<\/td>\n<td style=\"width: 30.6393%; height: 23px;\">Add HTTPS Functionality<\/td>\n<td style=\"width: 39.4217%; height: 23px;\">Adds HTTPS capabilities to a site simply by uploading the private key file.<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 30.6393%; height: 23px;\">Access Control<\/td>\n<td style=\"width: 39.4217%; height: 23px;\">Identifies and blocks information-gathering activities required for intrusions through multi-layered protection.<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 29.9389%; height: 46px; background-color: #f3f3f3;\" rowspan=\"2\">High-Precision Traffic Analysis<\/td>\n<td style=\"width: 30.6393%; height: 23px;\">Accurate Malicious Access Identification<\/td>\n<td style=\"width: 39.4217%; height: 23px;\">Accurately identifies malicious access, such as bots, and performs an evaluation when blocking.<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 30.6393%; height: 23px;\">Custom Policies<\/td>\n<td style=\"width: 39.4217%; height: 23px;\">Allows for the flexible modification and application of defense rules as needed.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2>Alibaba Cloud WAF Features (by Edition)<\/h2>\n<p>Alibaba Cloud WAF offers four editions to choose from, depending on processing capacity, defense capabilities, and specific use cases.<\/p>\n<p>This allows for flexible scaling; for instance, you can start small with the Pro Edition and upgrade as your web traffic grows, adapting to your specific needs and situation.<\/p>\n<table style=\"border-collapse: collapse; width: 115.032%; height: 772px;\">\n<tbody>\n<tr style=\"height: 47px;\">\n<td style=\"width: 24.000%; height: 47px; background-color: #138995;\"><span style=\"color: #ffffff;\">Category<\/span><\/td>\n<td style=\"width: 26.000%; height: 47px; background-color: #138995;\"><span style=\"color: #ffffff;\">Overview<\/span><\/td>\n<td style=\"width: 13.4895%; height: 47px; background-color: #138995;\"><span style=\"color: #ffffff;\">Pro Edition<\/span><\/td>\n<td style=\"width: 12.6931%; height: 47px; background-color: #138995;\"><span style=\"color: #ffffff;\">Business Edition<\/span><\/td>\n<td style=\"width: 12.4591%; height: 47px; background-color: #138995;\"><span style=\"color: #ffffff;\">Enterprise Edition<\/span><\/td>\n<td style=\"width: 41.3583%; height: 47px; background-color: #138995;\"><span style=\"color: #ffffff;\">Exclusive Edition<\/span><br \/>\n<span style=\"color: #ffffff;\">(submit tickets to purchase)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Peak Request Rate<\/td>\n<td style=\"width: 26%; height: 23px;\">&#8211;<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">2,000 QPS<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">5,000 QPS<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">10,000 + QPS<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">5,000 QPS<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 46px; background-color: #f3f3f3;\" rowspan=\"2\">Maximum Bandwidth<\/td>\n<td style=\"width: 26%; height: 23px;\">If the origin server is deployed on Alibaba Cloud<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">50 Mbit \/ s<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">100 Mbit \/ s<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u00a0200 Mbit \/ s<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">100 Mbit \/ s<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 26%; height: 23px;\">If the origin server is not deployed on Alibaba Cloud<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">10 Mbit \/ s<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">30 Mbit \/ s<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">50 Mbit \/ s<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">30 Mbit \/ s<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 12px; background-color: #f3f3f3;\">Max Domains (Standard Support)<\/td>\n<td style=\"width: 26%; height: 12px;\">&#8211;<\/td>\n<td style=\"width: 13.4895%; height: 12px;\">1<\/td>\n<td style=\"width: 12.6931%; height: 12px;\">1<\/td>\n<td style=\"width: 12.4591%; height: 12px;\">1<\/td>\n<td style=\"width: 41.3583%; height: 12px;\">1,000<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Max Subdomains (Standard Support)<\/td>\n<td style=\"width: 26%; height: 23px;\">Supports wildcard domains<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">10<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">10<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">10<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">1,000<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">HTTPS Protection<\/td>\n<td style=\"width: 26%; height: 23px;\">Implement with just a few clicks<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">HTTP\/2 Protection<\/td>\n<td style=\"width: 26%; height: 23px;\">Protect websites using HTTP\/2<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Non-standard Port Protection<\/td>\n<td style=\"width: 26%; height: 23px;\">Protect ports other than 80, 8080, 443, and 8443<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Intelligent Load Balancing<\/td>\n<td style=\"width: 26%; height: 23px;\">Multi-SLB connection, auto DR, low-latency routing<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Dedicated IP Address<\/td>\n<td style=\"width: 26%; height: 23px;\">Provides dedicated IPs for specific domains<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Dedicated Cluster<\/td>\n<td style=\"width: 26%; height: 23px;\">Protection from SQL injection and XSS attacks<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Protection Rule Engine<\/td>\n<td style=\"width: 26%; height: 23px;\">Protection against common web attacks<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Web Zero-day Vulnerability Protection<\/td>\n<td style=\"width: 26%; height: 23px;\">Automatic rule updates<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Custom Protection Rule Groups<\/td>\n<td style=\"width: 26%; height: 23px;\">Customization of protection rule groups<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Big Data Deep Learning Engine<\/td>\n<td style=\"width: 26%; height: 23px;\">Detects web zero-day vulnerabilities<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Whitelist Security Model<\/td>\n<td style=\"width: 26%; height: 23px;\">Proactive defense based on traffic learning<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Website Anti-Defacement<\/td>\n<td style=\"width: 26%; height: 23px;\">Prevents tampering via web page locking<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Data Leakage Prevention<\/td>\n<td style=\"width: 26%; height: 23px;\">Protection against leakage of personal information (IDs, phone numbers, etc.)<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">HTTP Flood Protection<\/td>\n<td style=\"width: 26%; height: 23px;\">Defense against attacks in preventive and emergency modes<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Blacklist (IP \/ CIDR)<\/td>\n<td style=\"width: 26%; height: 23px;\">Blocks access from specific IPs\/CIDRs<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Scan Protection<\/td>\n<td style=\"width: 26%; height: 23px;\">Collaborative defense against web attacks and scanning tools<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Scan Protection (Custom Rules)<\/td>\n<td style=\"width: 26%; height: 23px;\">Custom blocking of high-frequency attacks and path traversal<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Custom Protection Policies (Basic Fields)<\/td>\n<td style=\"width: 26%; height: 23px;\">ACL control based on IP, URL, Referer, User-Agent, and parameters<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Custom Protection Policies (Detailed Fields)<\/td>\n<td style=\"width: 26%; height: 23px;\">ACL control based on Cookie, Content-Type, Header, and HTTP-Method<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Rate Limiting (IP \/ Session)<\/td>\n<td style=\"width: 26%; height: 23px;\">Customize HTTP flood protection rules with matching conditions<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Rate Limiting (IP \/ Session \/ Custom Fields)<\/td>\n<td style=\"width: 26%; height: 23px;\">More advanced rate limiting policies<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Data Risk Management<\/td>\n<td style=\"width: 26%; height: 23px;\">Protects critical services such as registration, login, and forums<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Allowed Crawler Whitelist<\/td>\n<td style=\"width: 26%; height: 23px;\">Grants access to authorized crawlers like Baidu, Bing, and Google<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Bot Threat Intelligence<\/td>\n<td style=\"width: 26%; height: 23px;\">Provides intelligence on malicious crawlers, data center IPs, etc.<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">App Protection<\/td>\n<td style=\"width: 26%; height: 23px;\">Secure connections and bot prevention for native apps<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">Account Security<\/td>\n<td style=\"width: 26%; height: 23px;\">Protection against dictionary attacks, brute force, SMS flooding, etc.<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 24%; height: 23px; background-color: #f3f3f3;\">WAF Log Service<\/td>\n<td style=\"width: 26%; height: 23px;\">Log collection\/storage, real-time queries, and online reports<\/td>\n<td style=\"width: 13.4895%; height: 23px;\">\u00d7<\/td>\n<td style=\"width: 12.6931%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 12.4591%; height: 23px;\">\u3007<\/td>\n<td style=\"width: 41.3583%; height: 23px;\">\u3007<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2>Summary<\/h2>\n<p>Alibaba Cloud WAF is a SaaS-based WAF service.<\/p>\n<p>It can be used on cloud platforms other than Alibaba Cloud and can also be deployed in on-premises environments, offering a high degree of versatility.<\/p>\n<h3>Related Services<\/h3>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 50%; background-color: #138995;\"><span style=\"color: #ffffff;\">Managed Cloud Services<\/span><\/td>\n<td style=\"width: 50%;\"><a href=\"https:\/\/beyond-shenzhen.cn\/en\/service\/server\" target=\"_blank\" rel=\"noopener\">https:\/\/beyond-shenzhen.cn\/en\/service\/server<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><a class=\"border-circle-inline\" href=\"https:\/\/beyond-shenzhen.cn\/contact\" target=\"_blank\" rel=\"noopener\">For Website Development and Managed Cloud Services<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this post, we will outline the features and functions of &#8220;Alibaba Cloud WAF,&#8221; a WAF service provided by Alibaba Cloud. * Information is current as of September 2021. &nbsp; Alibaba Cloud Security History Alibaba Cloud is dedicated to developing security products aimed at protecting its infrastructure from a wide range of external cyber attacks. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":24513,"template":"","meta":{"_acf_changed":false,"_locale":"en_US","_original_post":"https:\/\/beyond-shenzhen.cn\/?p=742"},"tags":[],"blogcat":[12],"class_list":["post-24718","blog","type-blog","status-publish","has-post-thumbnail","hentry","blogcat-it-web","en-US"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/beyond-shenzhen.cn\/wp-json\/wp\/v2\/blog\/24718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beyond-shenzhen.cn\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/beyond-shenzhen.cn\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/beyond-shenzhen.cn\/wp-json\/wp\/v2\/users\/3"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beyond-shenzhen.cn\/wp-json\/wp\/v2\/media\/24513"}],"wp:attachment":[{"href":"https:\/\/beyond-shenzhen.cn\/wp-json\/wp\/v2\/media?parent=24718"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beyond-shenzhen.cn\/wp-json\/wp\/v2\/tags?post=24718"},{"taxonomy":"blogcat","embeddable":true,"href":"https:\/\/beyond-shenzhen.cn\/wp-json\/wp\/v2\/blogcat?post=24718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}