Firewall Security Shortcuts make it easy to apply strong security protections with just a few clicks. Instead of building rules from scratch, each shortcut gives you a ready-to-use firewall configuration designed for a specific scenario such as blocking suspicious IPs, preventing login abuse, stopping bots from scraping your content, or allowing internal APIs to operate without unnecessary security checks. These shortcuts help you save time, avoid configuration mistakes, and set up a solid security baseline even before you add custom rules. They are especially useful for teams that want to strengthen security quickly without navigating technical expressions or manually tuning every condition.
You can customize any shortcut before enabling it, giving you full control over how strict or permissive you want your firewall to be. This flexibility ensures that shortcuts work smoothly with your application’s design, traffic patterns, and operational needs. Whether you run a simple website or a multi-application setup, shortcuts help you maintain security without slowing down deployment.
Click on any shortcut name below to see its detailed conditions, recommended use case, and the exact action performed when enabled.
IP Blocking
Blocks specific malicious or abusive IPs instantly. This is especially helpful when you're dealing with repeated attack attempts or targeted probing from known sources. A quick block can immediately reduce harmful traffic.
Geo Blocking
Restricts requests from countries where you do not expect real users. This reduces unwanted bot traffic, lowers noise on your logs, and limits exposure to attacks coming from high-risk regions.
Login Path Protection
Adds additional verification checks for your login page. It helps you defend against credential stuffing, brute-force attempts, and automated login abuse. Since login endpoints are one of the most targeted areas of any application, this rule provides essential protection.
Anti Scraping
Detects and blocks scraping bots that harvest pricing, metadata, or content. This protects proprietary information, helps stop unfair competitive analysis, and prevents excessive bandwidth usage from unauthorized tools.
Form Submission Protection
Reduces spam and automated submissions on forms such as contact pages, signup forms, and checkout screens. This ensures that your business workflows remain clean and that real user submissions are not drowned in bot traffic.
Hostname Filtering
Allows or blocks requests based on the hostname used in the request. This prevents direct IP access, domain spoofing, or unexpected hostnames from hitting your origin directly.
Hotlink Protection
Stops external websites from embedding or displaying your images, videos, or other assets without permission. This is essential for saving bandwidth and maintaining ownership over your content.
Exclude from WAF
Allows trusted internal services, monitoring tools, or safe URLs to bypass the WAF entirely. Useful for health checks, cron jobs, and automated requests that don’t require scrutiny.
Block WP-Admin Access
Restricts requests to the WordPress admin path, preventing random bots from attempting to exploit known vulnerabilities in WP-Admin or wp-login.
Cookie Challenge for Abused IPs
Applies a lightweight browser check to suspicious IPs. It’s minimally invasive for real users but effective at filtering out bots.
CAPTCHA Challenge for Abused IPs
Enforces a CAPTCHA challenge when traffic looks harmful. This offers stronger verification when you want to be absolutely certain that the requester is a real human.
Block Sensitive File Types
Prevents access to backup files, configuration exports, logs, or other sensitive file extensions. This is crucial for preventing data leaks and reconnaissance attempts.
API POST Enforcement
Ensures that specific APIs accept only POST requests, blocking GET or HEAD requests that are often used for probing. This helps reduce attack surface and enforces correct client behavior.
Bypass Rate Limit for Internal APIs
Allows trusted internal endpoints such as health or status checks to bypass rate limiting. This prevents false rate-limit blocks that could affect uptime monitoring or internal automation.