• Home
Home
Anti-DDoS CDNStatic & dynamic acceleration, edge scrubbingAnti-DDoS IP forwardingL4 forwarding with protected IPsSDK game shieldClient SDK for gaming workloadsAnti-DDoS serversDedicated compute with high availabilityLearn more
Gaming solutionLow latency + protectionFinancial solutionCompliance & scrubbingLive streaming solutionPush/pull at the edgeBlockchain solutionWeb3 infra protectionExplore
DocumentationAPIs & onboardingHelp centerFAQs & ticketsBlog & newsUpdates & best practicesGlobal speed testMulti-region performance checksTag cloudTopic map across the siteOpen docs
AboutMission & visionCareersHiringPartnersEcosystemContactSales & supportContact us

Documentation

  • Introduction
Docs/Security Protection/WAF Configuration

WAF Configuration

速盾网络 Team
Docs

Tags

  • DDoS Prevention��

On this page

No outline

Share

𝕏fin

Enterprise CDN & acceleration with AI-driven monitoring and full-spectrum, real-time DDoS/CC protection. Trusted by tens of thousands of companies for fast, secure, and reliable content delivery and DDoS mitigation.

Product

  • Anti-DDoS CDN
  • Anti-DDoS IP forwarding
  • SDK game shield
  • Anti-DDoS servers

Solutions

  • Gaming solution
  • Financial solution
  • Live streaming solution
  • Blockchain solution

Resources

  • Documentation
  • Help center
  • Blog & news
  • Global speed test

Company

  • About
  • Careers
  • Partners
  • Contact

© 2026-2028 sudun.com 保留所有权利

  • Privacy
  • Terms
  • Cookies

S WAF protects your web applications from common vulnerabilities and attacks. Our managed rulesets block SQL injection, cross-site scripting (XSS), and other OWASP Top 10 threats.

How WAF works

code
请求 → WAF 检测 → 规则匹配
                     │
          ┌──────────┴──────────┐
          │                     │
     匹配成功              未匹配
          │                     │
    执行相应操作         → 源服务器

Hosted rule set

OWASP Core Rule Set

categoryProtective function
SQL injectionQuery pattern detection
XSSScript injection interception
LFI/RFIFiles contain protection
RCECommand injection interception

WAF mode

Detection mode

json
{
  "waf": {
    "mode": "detection",
    "log_matches": true
  }
}

Protection mode

json
{
  "waf": {
    "mode": "prevention",
    "block_action": "block"
  }
}

Sensitivity level

levelDescription
lowFewer false positives
MediumBalanced configuration (recommended)
HighStrict testing

Custom rules

json
{
  "rule": {
    "name": "禁止访问管理后台",
    "expression": "http.request.uri.path contains \"/admin\"",
    "action": "block"
  }
}

Exception configuration

Skip WAF detection for a specific path:

json
{
  "exceptions": {
    "paths": ["/api/webhook", "/health"]
  }
}

API Reference

Get WAF settings

bash
curl -X GET https://api.Sudun.com/v1/domains/{domain}/waf \
  -H "Authorization: Bearer YOUR_API_KEY"

Update WAF mode

bash
curl -X PUT https://api.Sudun.com/v1/domains/{domain}/waf \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -d '{"mode": "prevention"}'

Need help? Please contact support@Sudun.com