
vii
Figure 1-34 Header access control........................................................................................................................... 22
Figure 1-35 Header access control configuration.................................................................................................... 22
Figure 1-36 File scan protection.............................................................................................................................. 22
Figure 1-37 File scan protection configuration........................................................................................................ 23
Figure 1-38 Password crack protection ................................................................................................................... 23
Figure 1-39 Password crack protection ................................................................................................................... 23
Figure 1-40 CC attack protection ............................................................................................................................ 23
Figure 1-41 CC attack protection configuration...................................................................................................... 24
Figure 1-42 Weak password protection................................................................................................................... 24
Figure 1-43 Weak password protection configuration............................................................................................. 24
Figure 1-44 Cookie hidden...................................................................................................................................... 25
Figure 1-45 Cookie configuration ........................................................................................................................... 25
Figure 1-46 Website passive learn........................................................................................................................... 25
Figure 1-47 Database protection.............................................................................................................................. 26
Figure 1-48 Database protection configuration ....................................................................................................... 26
Figure 1-49 Anti-virus protection............................................................................................................................ 26
Figure 1-50 Blacklist cooperation ........................................................................................................................... 27
Figure 1-51 Blacklist configuration......................................................................................................................... 27
Figure 1-52 IPv6 blacklist configuration................................................................................................................. 27
Figure 1-53 Blacklist query..................................................................................................................................... 27
Figure 1-54 Blacklist log query............................................................................................................................... 28
Figure 1-55 Webpage tampering protection............................................................................................................ 28
Figure 1-56 Server information configuration......................................................................................................... 28
Figure 1-57 Webpage tampering log....................................................................................................................... 29
Figure 1-58 Detailed signature ................................................................................................................................ 30
Figure 1-59 Customized signature........................................................................................................................... 30
Figure 1-60 Signature whitelist ............................................................................................................................... 31
Figure 1-61 Agent field configuration..................................................................................................................... 31
Figure2-1 Latest log................................................................................................................................................. 32
Figure2-2 Log query and delete............................................................................................................................... 32
Figure2-3 Web audit configuration.......................................................................................................................... 33
Figure2-4 Web audit log.......................................................................................................................................... 33
Figure2-5 File update log......................................................................................................................................... 33
Figure3-1 High availability...................................................................................................................................... 34
Figure3-2 VRRP configuration................................................................................................................................ 34
Figure3-3 Monitoring .............................................................................................................................................. 36
Figure3-4 BFD option ............................................................................................................................................. 37
Figure3-5 Hot standby............................................................................................................................................. 37
Figure3-6 Manual synchronization.......................................................................................................................... 37