• Web Application Firewall

waf
  1. Help Center
  2. Web Application Firewall
  3. User Guide
  4. Introduction
  5. Accessing and Using WAF
  6. Related Services

Related Services

This section describes the relationship between WAF and other cloud services.

CTS

Cloud Trace Service (CTS) provides records of operations on WAF. With CTS, you can query, audit, and backtrack these operations. For details, see the Cloud Trace Service User Guide.

Table 1 WAF operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Creating a WAF instance

instance

createInstance

Deleting a WAF instance

instance

deleteInstance

Modifying a WAF instance

instance

modifyInstance

Modifying the protection status of a WAF instance

instance

modifyProtectStatus

Modifying the connection status of a WAF instance

instance

modifyAccessStatus

Creating a policy

policy

createPolicy

Applying a policy

policy

applyToPolicy

Modifying a policy

policy

modifyPolicy

Deleting a policy

policy

deletePolicy

Modifying alarm notification settings

alertNoticeConfig

modifyAlertNoticeConfig

Uploading a certificate

certificate

createCertificate

Changing the name of a certificate

certificate

modifyCertificate

Deleting a certificate

certificate

deleteCertificate

Adding a CC attack protection rule

policy

createCc

Modifying a CC attack protection rule

policy

modifyCc

Deleting a CC attack protection rule

policy

deleteCc

Adding a precise protection rule

policy

createCustom

Modifying a precise protection rule

policy

modifyCustom

Deleting a precise protection rule

policy

deleteCustom

Adding a blacklist or whitelist rule

policy

createWhiteblackip

Modifying a blacklist or whitelist rule

policy

modifyWhiteblackip

Deleting a blacklist or whitelist rule

policy

deleteWhiteblackip

Adding a web tamper protection rule

policy

createAntitamper

Updating a web tamper protection rule

policy

refreshAntitamper

Deleting a web tamper protection rule

policy

deleteAntitamper

Adding a false alarm masking rule

policy

createIgnore

Deleting a false alarm masking rule

policy

deleteIgnore

Adding a data masking rule

policy

createPrivacy

Modifying a data masking rule

policy

modifyPrivacy

Deleting a data masking rule

policy

deletePrivacy

IAM

Identity and Access Management (IAM) provides the permission management function for WAF. Only users granted WAF Administrator permissions can use WAF. To obtain the permissions, contact users who have the Security Administrator permissions. For details, see the Identity and Access Management User Guide.