Configuration Guidance
Configuring Basic Web Protection Rules
Configuring a CC Attack Protection Rule
Configuring a Precise Protection Rule
Adding a Reference Table
Configuring an IP Address Blacklist or Whitelist Rule
Configuring a Geolocation Access Control Rule
Configuring a Web Tamper Protection Rule
Enabling Anti-Crawler Protection
Configuring an Information Leakage Prevention Rule
Configuring a False Alarm Masking Rule
Configuring a Data Masking Rule