GMSSH Product ManualGMSSH Product Manual
Changelog
Official Site
  • 简体中文
  • English
Changelog
Official Site
  • 简体中文
  • English
  • 📖 Documentation

    • Product Overview
    • Introduction
    • Quick Start
    • GMSSH Client

      • Machine Management
      • Command Center
      • Terminal
      • Batch Tasks
      • Settings
    • GMSSH Desktop

      • Built-in Apps
      • App Center
      • Docker Manager
      • PHP Manager
      • MySQL Manager
      • Nginx Manager
      • Site Manager
      • Firewall Manager
      • WAF Firewall
      • Redis Manager
      • Proxy Manager
      • VPN Manager
      • Source Manager
    • Gemius AI
    • FAQ

WAF Firewall

GMSSH WAF Firewall is a Web Application Firewall management tool for Linux servers. It covers Dashboard, Protection Events, Website Protection, Blacklist/Whitelist, Global Configuration, Protection Rules, Attack Alerts, and Settings — providing comprehensive application-layer security for your web services.

Core Features

ModulePurposeCore Capabilities
DashboardSecurity OverviewReal-time monitoring, interception stats, attack trends
Protection EventsEvent RecordsHistorical event viewing and analysis
Website ProtectionSite-Level ProtectionPer-site protection policy configuration
Blacklist/WhitelistAccess ControlIP/URL/UA blacklist and whitelist management
Global ConfigurationGlobal ParametersWAF global protection parameter settings
Protection RulesRule ManagementProtection rule creation and management
Attack AlertsAlert NotificationsAttack alert policies and notification configuration
SettingsSystem SettingsWAF system-level settings

Initialization

On first launch, the system detects WAF environment status. If not initialized, automatic initialization begins.

Initialization

  • Auto Detection: Prompts "WAF environment not initialized, please initialize first".
  • Estimated Time: 30 seconds to 1 minute.
  • View Logs: Monitor initialization progress.
  • Firewall Toggle: Bottom-left switch available after initialization.

Dashboard

Real-Time WAF Security Dashboard. Displays real-time protection status and attack trends with per-site filtering.

Dashboard

Key Metrics

Four top cards showing critical security indicators:

MetricDescription
Historical InterceptionsTotal attack interceptions with new count badge
Today's RequestsTotal requests today with percentage change
Today's InterceptionsToday's blocked attacks with trend
Today's Cleaned TrafficMalicious traffic cleaned today with trend

Real-Time Interception Monitor

Line chart showing request and attack trends:

  • Data View: "Request Volume" and "Throughput" toggle.
  • Time Granularity: "Per Minute" and "Per Hour".

Today's Top 10 Interceptions

Horizontal bar chart ranking attacks by type/IP/URL:

  • View Toggle: "Blocked IPs" and "Blocked URLs" dimensions.
  • Attack Categories: Color-coded by type (XSS, SQL Injection, CC Attack, DDoS, etc.).

Real-Time Interception Log

ColumnDescription
TimeInterception timestamp
Source IP / LocationAttack source IP and geographic location
Trigger TypeAttack type (e.g., XSS Attack)
Request URLTarget URL
StatusAction taken (Temporary Block / Intercept Only)
  • Search: By source IP or URL.
  • View All: Click "View All >" to jump to full event list.

Historical Interception Trends

Line chart showing attack history:

  • Data View: "Request Volume" and "Throughput" toggle.
  • Time Range: "Day", "Month", "Year".
  • Dual Line Comparison: Shows both requests and attacks for ratio analysis.

Protection Events

Complete Protection Event Records. Table view of all intercepted or blocked attack requests with multi-dimensional search.

Protection Events

  • Event List:
ColumnDescription
TimeEvent timestamp
Site HOSTAttacked site domain
Source IPAttacker IP address
LocationIP geographic location
MethodHTTP method (GET/PUT/POST etc.)
Request URLTarget URL (hover for full URL)
Trigger TypeAttack type (XSS, CC, etc.)
StatusAction taken (Temporary Block / Intercept Only)
NotesBlock method description
  • Filters: Search by IP/URL/UA, time range, and status.
  • Export: Top-right download button.

Event Details

Click an event for full attack details:

Event Details

  • Status Card: Action taken and block duration.
  • Request Info: Time, site HOST, source IP, location, method, URL, User-Agent, trigger type.
  • Detected Malicious Content: Syntax-highlighted malicious payload (e.g., <script>alert(1)</script>).
  • Full HTTP Request: Expandable/collapsible complete HTTP request including headers.
  • Quick Actions: "Block IP" and "Block URL" buttons to add to blacklist.

Website Protection

Site-Level Protection Policy Management. Independent protection policies per site for fine-grained security.

Website Protection

  • Site List: Table showing domain/site name, protection status (toggle), policy mode, interception count, and actions.
  • Filter: By status and domain/site name search.
  • Protection Toggle: Independent per-site switch.

Site-Level Policy Configuration

Site-Level Policy

Six independent configuration tabs per site:

  • Anti-CC Attack: URL-level CC defense, URL CAPTCHA, API CC defense, static file protection, directory scan defense.
  • Request Compliance: Bot protection, HTTP request filtering, domestic/international access restrictions.
  • Anti-Injection: SQL injection, command execution, XSS, and Cookie defense toggles.
  • Anti-Resource Abuse: Malicious download, URL protection, and file upload security.
  • Anti-Automation & Crawlers: Crawler and scanner defense.
  • Sensitive Words: Response desensitization and request keyword interception.

Tip

Site-level configuration takes priority over global configuration, allowing differentiated protection based on business needs.

Blacklist/Whitelist

Multi-Dimensional Access Control. Three tabs: "Whitelist", "Blacklist", and "Spider Pool", supporting IP, UA, and URL rule types.

Whitelist

Whitelist

  • Rule List: Table with IP/UA/URL, type, notes, and actions. Supports drag-reorder.
  • Type Filter: Dropdown (All / IP / UA / URL) with search.
  • Actions: Import, export, and add buttons; edit and delete per rule.
  • Whitelisted requests bypass all protection rules.

Blacklist

Blacklist

  • Same structure as whitelist: Supports IP, UA, URL types.
  • Blacklisted requests are immediately blocked from all site resources.

Spider Pool

Spider Pool

  • Search Engine Spider Whitelist: Pre-configured IP ranges for major search engine crawlers to protect SEO.
  • Engine Tabs: Baidu · Google · 360 · Sogou · Yahoo · Bing · Toutiao · Shenma.
  • IP List Editor: Text area per engine with one IP or CIDR per line (e.g., 180.76.15.0/24).
  • Note: Spider pool IPs bypass interception rules. Incorrect entries may cause crawl failures.

Global Configuration

WAF Global Protection Policies. Six tabs covering CC defense, compliance, injection, resource abuse, automation, and sensitive words.

Anti-CC Attack

Anti-CC Attack

Five CC protection strategies:

FeatureDescription
URL-Level CC DefensePer-URL CC rules with match mode, URL, time/count, verification level, block time/type, response page
URL CAPTCHAIndependent CAPTCHA rules for specific URLs with exact and regex matching
API CC DefenseCC protection for whitelisted API endpoints
Static File ProtectionExcludes JS, CSS, GIF, JPG, PNG by default; not recommended for continuous use
Directory Scan DefenseDefends based on 404 link generation with configurable time/count thresholds

Request Compliance

Request Compliance

FeatureDescription
Bot ProtectionEnable when under non-browser attacks; applies to all sites (CDN sites may have false positives)
HTTP Request FilteringThree sub-tabs: request type (HTTP method restrictions), header filtering (max lengths), request quantity (parameter limits, base64 decoding toggle)
Geographic Access RestrictionBlock domestic/international access with configurable IP lists (CIDR format)

Anti-Injection

Anti-Injection

FeatureDescription
SQL Injection DefenseDetects malicious SQL to prevent database tampering, deletion, and data leaks. Built-in rules for file inclusion, SSRF, Java RCE, SQL injection, XSS
Command Execution BlockSyntax model detection to prevent server compromise via websites
XSS DefenseDetects XSS syntax with rules for directory protection, PHP protocol filtering, base64 decoding, system function blocking
Malicious Cookie DefenseDetects malicious code, SQL injection, and XSS in cookies

Anti-Resource Abuse

Anti-Resource Abuse

FeatureDescription
Malicious Download DefensePrevents download of backup files, source code, and critical data
URL ProtectionCombined parameter access, PHP execution blocking, and URL access blocking
File Upload SecurityPrevents malicious uploads with format validation and extension/MIME blocking

Anti-Automation & Crawlers

Anti-Automation

FeatureDescription
Malicious Crawler DefenseDetects malicious crawlers via UA list (WPScan, HTTrack, antSword, etc.)
Malicious Scanner DefenseBlocks scanner/trojan tools by Header, Cookie, and Args extension filters

Sensitive Words

Sensitive Words

FeatureDescription
Response DesensitizationReplace/detect sensitive content in responses. Format: sensitive_word>replacement, one per line
Request Keyword BlockURL parameter filtering and forbidden words/paths (e.g., /cache/, /config/, /runtime/)

Protection Rules

Multi-Dimensional Protection Rules. Four tabs: Region Restriction, Rate Limiting, Exclusive Rules, and Custom Rules.

Region Restriction

Region Restriction

  • Rule List: Table with regions (as tags), applied sites, trigger action, status, and actions.
  • Region Tags: Colored tags for countries and provinces (e.g., US, Japan, Singapore, Guangdong).
  • Trigger Action: "Block" or "Allow" per rule.
  • Applied Sites: Associated sites count with click-to-view and edit.
  • Status: Toggle per rule.
  • Actions: Import, export, add, edit, delete, drag-reorder.
  • Modes:
    • All Overseas: One-click block/allow all overseas access.
    • All Domestic: One-click block/allow all domestic access.
    • Custom: Manual city selection with search.

Rate Limiting

Rate Limiting

  • API Rate Limit Rules: Table with rule name, site config, trigger URL, target, frequency (sec/count), response action, return format, status.
  • Recommended for API protection only; site-wide enabling may affect user experience.
FieldDescription
Rule NameRate limit rule name
URL Match ModeMatching method (exact match, etc.)
Trigger URLAPI path to rate-limit
ScopeTarget scope (single IP, etc.)
Rate ThresholdTime window and max requests (e.g., 60s / 100 req)
Return FormatResponse format (JSON, etc.)
Response ActionAction on trigger (block IP, etc.)

Exclusive Rules

Exclusive Rules

  • Exclusive Rule Engine: Master toggle for CMS vulnerability protection (WordPress, Discuz, ThinkPHP), primarily against RCE attacks.
  • WordPress Deep Protection: Toggle for WordPress-specific vulnerability defense.
  • ThinkPHP Vulnerability Patches: Toggle for ThinkPHP framework protection.
  • Common Web Vulnerabilities: Toggle for general web vulnerability rules.

Custom Rules

Custom Rules

  • Custom Rule List: Table with rule name, site config, trigger conditions, response action, status.
  • Response Actions: "Block", "Allow", "CAPTCHA".
  • Actions: Add, edit, delete, drag-reorder.

Create Custom Rule

Create Custom Rule

  • Rule Name: Input with AI-assisted generation (top-right).
  • Trigger Condition Groups: Multi-condition combinations:
    • Match Field: Client IP, URL (without params), etc.
    • Match Method: Equals / Exact match, etc.
    • Match Content: Specific match value.
    • Logic: AND / OR between conditions, +/- to add/remove.
  • Response Action: Action type (Block/Allow/CAPTCHA) and return status code (e.g., 404).

Attack Alerts

Real-Time Attack Notification Push. Push WAF interception events to DingTalk or custom Webhook for instant response.

Attack Alerts

DingTalk Alert Settings

  • Toggle: Enable/disable DingTalk push.
  • Webhook URL: DingTalk bot Webhook address.
  • Encryption Key: Signing verification key (optional).
  • Save: Save configuration.
  • Test Push: Send test alert to verify setup.

Webhook Alert Settings

  • Toggle: Enable/disable Webhook push.
  • Webhook URL: Custom Webhook receiver address.
  • Test Push: Send test alert.

Settings

WAF Global System Settings. Configure protection mode and CDN real IP retrieval.

Settings

Protection Mode

  • Enable Protection Mode: Toggle for read-only mode (all suspicious requests blocked).
  • Note: Do not enable unless during security drills — it may affect login, payment, search, and other normal functions.

CDN Settings

Configure how to retrieve the client's real IP when accessing through CDN or reverse proxy:

MethodDescription
HTTP HeaderGet real IP from a specified header field (e.g., x-real-ip)
Header ListMatch from multiple headers in order (supports x-forwarded-for, x-real-ip, cf-connecting-ip, etc.)
X-Forwarded-For ProxyExtract real IP from X-Forwarded-For by proxy level (right-to-left, 1 = last proxy)
Last Updated: 3/20/26, 12:11 PM
Contributors: xiarui
Prev
Firewall Manager
Next
Redis Manager