All Products
Search
Document Center

Edge Security Acceleration:Configure basic web protection

Last Updated:Mar 03, 2026

Basic web protection uses a built-in rule group to defend your web applications against common web attacks, including SQL injection, cross-site scripting (XSS), web shell attacks, command injection, backdoor attacks, unauthorized file access, path traversal, and common vulnerability exploits.

Prerequisites

Default rule group

Basic web protection provides a built-in default rule group named Default_WafGroup_Rule. This rule group is enabled by default for all domain names added to WAF, with the action set to Block.

When WAF detects that a request matches a rule in this group, WAF blocks the request and returns a block page (an error response page) to the client.

Best practice: The first time that you configure a rule, you can set the Action parameter to Monitor to check the protection performance of the rule and whether legitimate requests are blocked. Then, you can determine whether to set the Action parameter to Block based on the check results.
Default rules

Protected attack types

The built-in rule group protects against the following types of attacks:

Attack typeDescription
SQL injectionAttempts to execute malicious SQL statements through user input fields.
Cross-site scripting (XSS)Injection of malicious scripts into web pages viewed by other users.
Web shell attacksUpload or execution of unauthorized server-side scripts that provide remote access.
Command injectionExecution of arbitrary system commands through vulnerable application interfaces.
Backdoor attacksDetection of backdoor programs that provide unauthorized access to the server.
Unauthorized file accessRequests for files that should not be publicly accessible.
Path traversalAttempts to access files outside the intended directory by using sequences such as ../.
Common vulnerability exploitsAttacks that target known vulnerabilities in web applications and frameworks.

Create a basic web protection policy

  1. Log on to the DCDN console.

  2. In the left-side navigation pane, choose WAF > Protection Policies.

  3. On the Protection Policies page, click Create Policy.

  4. On the Create Policy page, configure the following parameters.

    SectionParameterDescription
    Policy InformationPolicy TypeSelect Basic Web Protection.
    Policy NameEnter a name for the policy. The name can be up to 64 characters in length and can contain letters, digits, and underscores (_).
    Make DefaultTurn on this switch to set the current policy as the default policy for basic web protection. You can specify only one default policy per policy type. After you specify a default policy, you cannot change the default policy. If a default policy has already been specified for the current policy type, this switch is unavailable.
    Rule InformationRule Group TypeSelect the type of rule group: Default uses the built-in rule group provided by Alibaba Cloud Security. Custom uses a custom rule group that you configure.
    RuleSelect the action to perform when a request matches the rules: Block blocks the matching request and returns a block page to the client. Monitor does not block the request that matches the rule.
    Protected Domain NamesProtected Domain NamesSelect the domain names to associate with this policy. A domain name can be associated with only one basic web protection policy at a time. If a domain name is already associated with another basic web protection policy, the domain name is moved to the current policy.
  5. Click Create Policy.

The policy is enabled by default after creation.

Manage basic web protection policies

After you create a basic web protection policy, you can click Modify to modify the rule that is configured for the policy or click Delete to delete the rule in the Actions column on the Protection Policies page. For example, you can click Modify to change the value of the Action parameter from Block to Monitor.

Manage basic web protection policies

Related API operations