S WAF protects your web applications from common vulnerabilities and attacks. Our managed rulesets block SQL injection, cross-site scripting (XSS), and other OWASP Top 10 threats.
请求 → WAF 检测 → 规则匹配
│
┌──────────┴──────────┐
│ │
匹配成功 未匹配
│ │
执行相应操作 → 源服务器
| category | Protective function |
|---|---|
| SQL injection | Query pattern detection |
| XSS | Script injection interception |
| LFI/RFI | Files contain protection |
| RCE | Command injection interception |
{
"waf": {
"mode": "detection",
"log_matches": true
}
}
{
"waf": {
"mode": "prevention",
"block_action": "block"
}
}
| level | Description |
|---|---|
| low | Fewer false positives |
| Medium | Balanced configuration (recommended) |
| High | Strict testing |
{
"rule": {
"name": "禁止访问管理后台",
"expression": "http.request.uri.path contains \"/admin\"",
"action": "block"
}
}
Skip WAF detection for a specific path:
{
"exceptions": {
"paths": ["/api/webhook", "/health"]
}
}
curl -X GET https://api.Sudun.com/v1/domains/{domain}/waf \
-H "Authorization: Bearer YOUR_API_KEY"
curl -X PUT https://api.Sudun.com/v1/domains/{domain}/waf \
-H "Authorization: Bearer YOUR_API_KEY" \
-d '{"mode": "prevention"}'
Need help? Please contact support@Sudun.com