Skip to content

Global Settings

On the Global Settings page, you can view and configure WAF. It includes allowlists & blocklists, rate limits, default rules, custom rules, and advanced configurations.

Notes: - The master switch in Global Settings controls rules for all websites. For example, disabling Access Rate Limit will disable it for every site. - Individual items in Global Settings (such as the first rule in Default Rules → Parameter Rules) only affect newly created websites after being disabled; existing websites are not affected.

img.png

1 Allowlist & Blocklist

  • Includes IP Allowlist/Blocklist, URL Allowlist/Blocklist, User-Agent Allowlist/Blocklist, and IP Groups.
  • Blocklist: Blocks requests matching blocklist entries.
  • Allowlist: Skips WAF checks for requests matching allowlist entries.

1.1 IP Allowlist & Blocklist

Allow or block requests based on IP address.

1.2 URL Allowlist & Blocklist

  • Blocklist: Blocks access to specified URLs.
  • Allowlist: Bypasses WAF checks for whitelisted URLs, useful for APIs that may contain SQL/XSS patterns (e.g., WordPress / Halo post save endpoints).

1.3 User-Agent Allowlist & Blocklist

Allow or block requests based on User-Agent.

1.4 IP Group

Group multiple IP addresses for use in IP allowlists or blocklists.

2 Rate Limit

Defends against CC attacks, including Access Rate Limit, Attack Rate Limit, and 404 Rate Limit.

2.1 Access Rate Limit

  • Temporarily blocks an IP if requests exceed the threshold within a time window.
  • Global Mode: Triggers if total requests to any URL exceed the threshold.
  • URL Mode: Triggers if requests to a single URL exceed the threshold.

img.png

2.2 Attack Rate Limit

  • Blocks an IP if it repeatedly triggers WAF rules.
  • Use case: An IP attacking your site and violating multiple rules.

img.png

2.3 404 Rate Limit

  • Blocks an IP if it generates too many 404 responses.
  • Use case: Scanners or malicious crawlers probing your site.

img.png

3 Default Rules

Built‑in WAF rules that block common malicious requests.

3.1 Parameter Rules

Filters malicious query parameters.

3.2 URL Rules

Filters malicious URLs.

3.3 HTTP Rules

Sets allowed HTTP methods. Disable methods you want to block (e.g., only allow GET).

Filters requests with malicious cookies.

3.5 Header Rules

Filters requests with malicious headers.

3.6 User-Agent Rules

Filters requests with malicious User-Agents.

3.7 Others

SQL Injection Protection and XSS Protection.

4 Custom Rules

  • Define your own WAF rules.
  • Includes custom ACL rules, file upload restrictions, region access control, and CDN settings.

4.1 Custom Rules (✨ Pro Edition)

  • Create custom WAF rules based on your needs.
  • Match conditions including URL, IP, Header, Host, and perform actions.
  • Example: Require CAPTCHA for requests to /login.

img.png

4.2 File Upload Restriction

Restrict allowed file types by extension.

img.png

4.3 Region Access Control (✨ Pro Edition)

Block or allow access from specific regions.

img.png

4.4 CDN

Enable if your site uses CDN and real client IPs are not logged correctly: - From HTTP Header: Extract from a specified header (e.g., cf-connecting-ip for Cloudflare). - From Header List: Auto‑detect from common real‑IP headers. - From X-Forwarded-For: Use the last proxy IP (e.g., X-Forwarded-For: client,proxy1,proxy2,proxy3 → use proxy3).

img.png

5 Configuration

Includes block page settings and malicious IP groups.

5.1 Block Page (✨ Pro Edition)

Customize the WAF block page.

img.png

5.2 Malicious IP Group

Block malicious IP groups provided by 1Panel.


Take 1Panel Further

Running 1Panel OSS? Pro Edition adds WAF protection, unlimited AI agents, multi-node management, and priority support — starting at $80/year.

Compare OSS vs Pro → Start 30-day free trial →