2 Risposte
- Più recenti
- Maggior numero di voti
- Maggior numero di commenti
1
Hi,
VPN is considered a masking service as your actual IP address and online actions are virtually untraceable. You can run a test by yourself:
- Create a web service for example a 3tier app using ALB (Application Load balancer)
- Attach WAF managed rule set to the ALB and only activate Anonymous IP list.
- While adding the managed rule set you can be more specific to only block action using the edit option for Anonymous IPlist [There is edit tab in front of the Capacity unit].
- Try connecting the App using a VPN service externally.
If you wanted to just block the Tor nodes and let VPN permit, that level of granularity is not available in this managed rule.
Thanks
con risposta un anno fa
0
You can leverage the IP list parser where the Lambda function will gathers and parses data from tor exit nodes and the other 3rd party sources.
con risposta un anno fa
Contenuto pertinente
- AWS UFFICIALEAggiornata 3 anni fa
- AWS UFFICIALEAggiornata 2 anni fa
- AWS UFFICIALEAggiornata 2 anni fa
- AWS UFFICIALEAggiornata 4 mesi fa