Securing Traffic via WAF Tutorial

Our WAF offering is designed to secure site traffic against malicious and unwanted traffic. The core methods through which it secures site traffic are listed below.

Setup Overview

The configuration process for WAF is illustrated below.

Step 1: Create Rules

Step-by-step instructions on how to create an access rule, rate rule, and managed rule are provided below.

Create a custom rule to identify threats using custom criteria that takes into account your site's traffic profile to avoid false positives.

Create an Access Rule

Create an access rule that identifies traffic that should be allowed, denied, or screened through whitelists, accesslists, and blacklists.

Navigate to the Access Rules page. ClosedHow?From the main menu, navigate to More | Security | WAF Tier | Security Rule Manager | Access Rules.

Click Add Access Rule.

In the Name option, type My Access Rule.

From the Add an Access Control option, select IP.

Click Add Blacklist.

Specify an IP address from which suspicious traffic originates.

Click Save.

Create a Rate Rule

Use a rate rule to restrict the flow of traffic to your application.

Navigate to the Rate Rules page. ClosedHow?From the main menu, navigate to More | Security | WAF Tier | Security Rule Manager | Rate Rules.

Click Add Rate Rule.

In the Rule name option, type My Rate Limit.

In the Apply rate limit to option, select IP address.

In the Rate limit section, set the Number of requests option to 100 and the Time period option to 1 minute.

Click Save.

Create a Managed Rule

Create a managed rule that leverages predefined rules to detect application layer attacks.

Navigate to the Managed Rules page. ClosedHow?From the main menu, navigate to More | Security | WAF Tier | Security Rule Manager | Managed Rules.

Click Add Managed Rule.

In the Name option, type My Managed Rule.

Click the Policies tab. In the Ruleset option, select ECRS 2020-11-02.

Set the Threshold option to 5.

Set the Paranoia Level option to 1.

From the Policies section, disable policies that do not apply to your application. For example, you may safely disable Adv Drupal, Adv SharePoint, and Adv WordPress if your application does not leverage those platforms.

Click Save.

Step 2: Create Security Application Manager Configuration

Step-by-step instructions on how to create a Security Application Manager configuration that identifies the security policy that will be applied to your application are provided below.

Navigate to the Security Application Manager page. ClosedHow?From the main menu, navigate to More | Security | WAF Tier | Security Application Manager.

Click Add New.

In the Name option, type My Application.

From the Rules section, click Access Rule.

From the Production Access Rule option, select My Access Rule.

From the Action type option, select Alert only.

From the Rules section, click Managed Rule.

From the Production Managed Rule option, select My Rate Limit.

From the Action type option, select Alert only.

From the Rules section, click Rate Rules.

From the Add Rate Rule option, select My Managed Rule.

From the Action type option, select Drop request (429 Too Many Requests).

Click Save.

Step 3: Monitor Threats

The Threats dashboard illustrates threat detection trends and lists recent illegitimate requests. This dashboard is a useful tool for:

By default, the dashboard tracks the set of threats detected over the last week.

Data Gathering

After an instance has been activated, time needs to pass to allow WAF to gather sufficient data from which trends may be detected.

Wait a reasonable amount of time (e.g., 24 hours) after setting up a Security Application Manager configuration.

Navigate to the Threats Dashboard

View graphs and detailed alert data from the Threats dashboard.

Navigate to the Threats Dashboard page. ClosedHow?From the main menu, navigate to Security | WAF Tier | Dashboard.

Review Trends

The dashboard's graph provides insight into trends at a glance.

Review the graph at the top of the dashboard. Check for an abnormally high number of detected threats.

Analyze Individual Threats

It is useful to view detailed information on detected threats to ensure that WAF is correctly identifying threats.

Click the icon from the upper-right hand side of the window.

Click on each alert to view detailed information on it.

More Information