Securing Traffic via WAF Essential Tutorial

This article explains the legacy version of WAF Essential that will undergo end-of-life on June 30, 2021. Our new version of WAF Essentials expands upon all of the capabilities offered by the legacy version of WAF Essential with a simplified and centralized setup. Please upgrade to the latest version of WAF at your earliest convenience.

The following information is only applicable for the WAF Essential product. This security offering provides limited Web Application Firewall and Rate Limiting functionality.

This tutorial provides step-by-step instructions on how to:

  1. Set up a security configuration to protect your web servers.
  2. Apply the above security configuration to your traffic.
  3. Optional. Define and apply the rate at which your traffic may be requested.
  4. Monitor your traffic for violations.

Step 1: Setting up a Security Configuration

Setting up a security configuration to protect your web servers consists of defining criteria for determining whether traffic is unwanted or malicious. This requires creating a profile that determines the criteria for identifying unwanted or malicious traffic and an instance that determines the action that will take place upon detection of unwanted or malicious traffic.

Navigate to the WAF Manager Page

Administer profiles from the WAF Manager page.

Navigate to the WAF Manager page. ClosedHow?From the main menu, navigate to Defend | WAF Essential | WAF Manager.

Create a Profile

A profile defines the type of requests that will be considered malicious.

Click Add Profile.

Assign it a Name

The name assigned to a profile is solely used to identify it.

In the Name option, type My Profile.

Assign a Security Level

Assign a security level to your profile to determine when a request will be treated as malicious traffic. A low security level will reduce false positives, while a high security level will provide the most amount of protection.

Navigate to the Policies tab by clicking on it.

Verify that the Ruleset option is set to ECRS 2019-02-11.

Verify that the Security Level option is set to Medium.

It may be necessary to adjust this setting once site traffic has been screened with this profile. Monitor the dashboard for false positives or undetected malicious threats. Adjust this setting accordingly to fine-tune traffic screening.

Verify that the enabled threat detection policies will not interfere with legitimate site traffic.

Consider disabling threat detection policies that are inapplicable to your site. For example, if your site does not leverage Apache Struts, then you should clear the Adv Struts policy.

Save Your Profile

Save your profile configuration by creating it.

Click Create Profile.

Define an Instance

An instance serves the following two purposes:

In the Name option, type My Instance.

In the Production Profile option, select the profile created above.

Set the Production Action option to Alert Only.

This mode generates dashboard alerts whenever a request is categorized as unwanted or malicious traffic. Leverage this mode to verify that legitimate site traffic will not be impacted by this WAF profile.

Save Your Changes

Create the instance by saving your changes.

Click Save.

Step 2: Applying a Security Configuration

Secure site traffic by activating the newly created instance via Rules EngineAllows the customization of how requests are handled by our CDN service. It may be used to override the default response provided by an origin server, CDN settings, and the default edge server behavior.'s Web Application Firewall feature. The rule containing this feature determines the set of requests that will undergo WAF monitoring.

Navigate to the Rules Engine Page

Rules Engine identifies one or more types of requests and the actions that will be applied to them. This tutorial demonstrates how to create a rule that activates the Web Application Firewall feature for all requests.

Navigate to the Rules Engine page. ClosedHow?From the main menu, navigate to [HTTP Large, HTTP Small, or ADN] | Rules Engine.

Set up a Draft

Instructions on how to create a draft vary according to whether a policy has been previously deployed to the Production environment.

Perform either of the following procedures:

Lock the Draft

Once a draft has been finalized, it must be converted into a policy. This action is known as "locking the draft."

Click Lock Draft as Policy.

Request the Deployment of the Policy

A deploy request indicates that the policy should be applied to either staging or production traffic.

Click Deploy Request.

In the Environment option, choose Production.

In the Message option, provide a comment that indicates why this deploy request was submitted.

Click Create Deploy Request.

It may take up to an hour to apply a newly approved policy to the Production environment.

Step 3: Defining a Rate Limit (Optional)

Protect your web servers from being overloaded with requests by capping the rate at which requests may be submitted. Requests that exceed the rate limit policy may be dropped, redirected to another URL, or sent a custom response.

Navigate to the Rate Limiting Rules Page

Define a rate limit from the Rate Limiting Rules page.

Navigate to the Rate Limiting Rules page. ClosedHow?From the main menu, navigate to Defend | WAF Essential | Rate Limiting Rules.

Define a Rate Limit

Define a rate limit by indicating the maximum rate of requests and the conditions under which it will be applied.

Click Add Rule.

In the Rule name option, type Catch-All Rate Limit.

In the Apply rate limit to option, select IP address.

This mode applies the rate limit to each unique IP address.

In the Rate limit option, type 300 above the Number of requests caption and select 30 seconds above the Time period caption.

Navigate to the Enforcement tab.

In the Duration option, select 5 minutes.

The action selected in the next step (i.e., alerts) will be applied for five minutes to clients that exceed the rate limit.

Verify that the Action Type option is set to Alert only.

Click Add Rule.

Click Apply All Changes and then Save Changes to save your changes and apply the rate limiting policy to your traffic.

Step 4: Monitor Threats Detected by WAF

Monitor threats via the WAF Dashboard. Utilize this dashboard to assess threats to site and to identify false positives.

Data Gathering

After an instance has been activated, time needs to pass to allow WAF to gather sufficient data from which trends may be detected.

Wait a reasonable amount of time (e.g., 24 hours) after applying your security configuration to your traffic.

Navigate to the WAF Dashboard

View graphs and detailed alert data from the WAF Dashboard.

Navigate to the Dashboard page. ClosedHow?From the main menu, navigate to Defend | WAF Essential | WAF Dashboard.

Review Trends

The graph on the WAF Dashboard provides insight into trends at a glance.

Review the graph at the top of the dashboard. Check for an abnormally high number of detected threats.

Analyze Individual Threats

It is useful to view detailed information on detected threats to ensure that WAF is correctly identifying threats.

Click the icon from the upper-right hand side of the window.

Click on each alert to view detailed information on it.

Step 5: Monitor Rate Limit Violations

Monitor rate limit violations via the Rate Limiting Dashboard.

Data Gathering

After an instance has been activated, time needs to pass to allow Rate Limiting to gather sufficient data from which trends may be detected.

Wait a reasonable amount of time (e.g., 24 hours) after applying your security configuration to your traffic.

Navigate to the Rate Limiting Dashboard

View graphs and detailed alert data from the Rate Limiting Dashboard.

Navigate to the Dashboard page. ClosedHow?From the main menu, navigate to Defend | WAF Essential | Rate Limiting Dashboard.

Review Trends

The graph on the Rate Limiting Dashboard provides insight into trends at a glance.

Review key statistics (e.g., Client IP and User Agent) to identify key individual offenders.

More Information