All Products
Search
Document Center

Edge Security Acceleration:WAF overview

Last Updated:Dec 19, 2025

ESA combines edge Web Application Firewall (WAF) capabilities with rule-based features to provide fine-grained filtering and management of origin traffic.

What is WAF

A WAF filters and monitors HTTP protects your web applications by filtering and monitoring HTTP traffic between them and the internet. It identifies and blocks traffic with malicious signatures, allowing only clean, safe traffic to reach your servers. This helps prevent malicious intrusions that can degrade performance or cause service disruptions.

ESA delivers WAF protection across its 3,200 global points of presence (POPs), safeguarding your services and data security worldwide.

Important

Requests blocked by WAF rules are not billed and do not consume your plan's quota.

Feature overview

Configuration

Description

Enable smart rate limiting

Powered by the Edge Security Acceleration (ESA) AI engine, the smart rate limiting feature simplifies the rate limiting setup for security-conscious entry-level users. When you activate smart rate limiting and select a protection level, ESA establishes a baseline and adjusts the rate limits every 24 hours by analyzing access frequency data from your website over the past seven days.

Abuse prevention

Use ESA abuse prevention to protect your applications from traffic abuse that can lead to inflated costs and resource exhaustion. The feature leverages ESA IP intelligence database to automatically challenge or block requests from sources known for malicious activity.

Custom rules

Custom rules allow you to control user access to resources on your website. To create a custom rule for your website, specify the match conditions and an action such as block or monitor.

Rate limiting rules

You can create rate limiting rules via Edge Security Acceleration (ESA) to limit the rate of requests that match specific conditions. For example, if an IP address visits your website at a high frequency within a specific period of time, you can create a rate limiting rule to specify a request rate limit, and enable slider CAPTCHA verification or add the IP address to the blacklist for a period of time when the configured limit is reached.

Managed rules

Intrusion attacks such as SQL injection, cross-site scripting (XSS), code execution, carriage return line feed (CRLF) injection, remote file inclusion (RFI), and webshells pose high risks but are usually difficult to detect by using custom rules and rate limiting rules. To address this issue, Edge Security Acceleration (ESA) offers built-in intelligent managed rules to defend against OWASP attacks and the latest origin vulnerabilities. You can enable protection against various types of attacks without manual configurations and updates.

Scan protection rules

The scan protection module detects the behavior and characteristics of automated scanners to prevent attackers or scanners from scanning websites. Attack sources are blocked or added to the blacklist. This reduces the risk of intrusions into web services and prevents undesired traffic generated by malicious scanners.

Whitelist rules

Whitelist rules allow you to permit requests with specific characteristics. These requests bypass all or certain protection rules, such as custom rules, rate limiting, managed rules, scan protection, and bot management.

IP access rules

IP access rules support setting protection rules based on IP address, ASN, and region. These rules take effect for both HTTP requests (Layer 7) and Layer 4 proxy.

Rule execution order

The execution sequence of different rules is as follows: IP access rules → Whitelist rules → Security level → Scan protection rules → Managed rules → Custom rules → Smart rate limiting → Rate limiting rules → Bots management rules → Abuse prevention rules.

Note

A request is matched against all rules in the sequence until it is blocked by a triggered rule or allowed by a whitelist rule.

image

Availability

Category

Entrance

Pro

Premium

Enterprise

Custom rules

3

20

100

100

Rate limiting rules

Not supported

2

5

10

Managed rules - Ruleset type

Supports basic rules

Supports all rules

Supports all rules

Supports all rules

Scan protection rules

Not supported

5

10

20

Whitelist rules

2

3

5

10

IP access rules

200