Skip to main content

Understanding concept of rule group and CC in the firewall or WAF

 In the context of a firewall or Web Application Firewall (WAF), the terms rule group, rule group level, and CC level refer to different layers or components involved in detecting and blocking malicious traffic. Here's a breakdown:



---


1. Rule Group


A rule group is a collection of rules designed to detect and mitigate specific types of threats. These rules are typically grouped by function or attack type.


Example in WAF: A rule group might contain rules for detecting SQL injection, XSS, or file inclusion attacks.


Example in Firewall: A rule group could handle traffic filtering based on IP addresses, ports, protocols, or applications.


Managed Rule Groups: In services like AWS WAF or Cloudflare, rule groups can be managed by third parties, constantly updated to address new threats.




---


2. Rule Group Level


The rule group level refers to the order or priority in which rule groups are applied. This is important for layered security and performance.


Think of it as a hierarchy or stack:


Level 1: Global filters like IP reputation or geoblocking.


Level 2: Application-layer protection like SQLi, XSS.


Level 3: Custom business logic or allow-lists.



Higher-level rule groups may block or allow traffic before it even reaches the next level.


Some WAFs let you assign action priorities, such as ALLOW, BLOCK, COUNT, or LOG.




---


3. CC Level (Challenge Collapsar Level)


CC Level (also known as Challenge Collapsar level) is primarily a DDoS protection parameter, often used in Chinese WAFs/firewalls (like Baidu, Tencent Cloud, or CDN-level WAFs).


CC attacks = “Challenge Collapsar” attacks, a type of HTTP flood DDoS.


CC Level is a sensitivity setting that controls how aggressively the WAF/firewall blocks suspected CC attacks.



Too high a CC Level may cause false positives, blocking legitimate users.




---


Summary Table


Let me know if you'd like this mapped to a specific product like AWS WAF, Cloudflare, or Fortinet.



Comments

Popular posts from this blog

ITNSA Konfigurasi Ansible WinRM Windows Server

 ### Mengonfigurasi Koneksi Ansible ke Server Windows Ansible adalah alat otomatisasi yang sangat populer dan sering digunakan untuk mengelola berbagai jenis server, termasuk server Windows. Artikel ini akan memandu Anda melalui langkah-langkah untuk mengonfigurasi Ansible agar dapat terhubung dengan server Windows menggunakan WinRM (Windows Remote Management). #### 1. Menyiapkan WinRM di Server Windows ##### Opsi 1: Menggunakan Skrip PowerShell Anda bisa menggunakan skrip PowerShell yang sudah disediakan untuk mengonfigurasi WinRM agar dapat digunakan oleh Ansible. 1. Buka PowerShell di server Windows Anda sebagai administrator. 2. Jalankan perintah berikut untuk mengunduh dan mengeksekusi skrip konfigurasi:    ```powershell    iex (New-Object Net.WebClient).DownloadString('https://github.com/ansible/ansible/raw/devel/examples/scripts/ConfigureRemotingForAnsible.ps1')    ``` ##### Opsi 2: Pengaturan Manual 1. Buka PowerShell di server Windows Anda seb...

Soal dan pembahasan LKSN ITNSA

Berikut adalah koleksi soal-soal ITNSA dan beberapa website yang memberikan pembahasan pada event perlombaaan LKS SMK Nasional bidang lomba IT Network Systems Administration. 2014 Palembang Di tahun ini ada 1 soal packet tracer. Di website dibawah ini diberikan juga cara pembahasannya. https://agussas.wordpress.com/2015/04/02/review-soal-lks-nasional-it-network-23-packet-tracer-challenge/ Semua soal:  https://www.dropbox.com/sh/l90zyke2ib5msgv/AAA3kPOFo-zEn4wPOW4a3iMwa?dl=0 dan https://drive.google.com/file/d/18lDhtMjAnPAhkfOJ6uFHsC5j6ycg3K4I/view Pembahasan juga dalam bentuk video di youtube:  https://www.youtube.com/watch?v=8QML594nQBU 2015 Banten Pembahasan:   https://www.youtube.com/watch?v=quDbpC2xSfQ Soal:  https://drive.google.com/file/d/1B09IYfdoGENBL3txSQodpptG1zdQxBWI/view 2016 Malang Soal:   https://drive.google.com/file/d/13-2bRtb5IXO9vxAhLfhghZbDXeUzD0FI/view Pembahasan:   https://www.youtube.com/watch?v=zmUSUZguH24 20...

Soal dan pembahasan LKS ITNSA Network Infrastructure Basic

Soal tahun 2021 tingkat Nasional Soal bisa di download di https://itnsa.id Basic Configuration Configure IP Address of all network devices according to the addressing table.  Create SSH user ‘patah’ with password specified in the appendix.  Make sure the user are able to enter configuration commands in the router.  Allow server admins to SSH to all network devices.  If you need to set additional password on the Routers, use Skills39 Look at the appendix table and configure accordingly Configure IP address: csr1000v# configure terminal #change interface name according to the topology csr1000v (config)# interface GigabitEthernet0 csr1000v (config-if)# ip address  x.x.x.x y.y.y.y csr1000v (config-if)# no shutdown Create SSH user: csr1000v# configure terminal csr1000v (config) # username patah password cisco123 csr1000v (config)# privilege 15 patah Allow server admins to SSH: csr1000v# configure terminal csr1000v (config)# ip access-list standard SSH_ACL csr10...