This article explains the legacy version of
WAF is designed to analyze HTTP traffic for malicious content. Upon detecting a threat, it will either generate an alert, block, redirect, or provide a custom response. Blocked requests will terminate at the edge of our network. This shields your origin serverRefers to the server(s) where content served via the CDN is stored. There are two types of origin servers, which are CDN and customer origin servers. All requests that cannot be fulfilled directly by an edge server are forwarded to an origin server. For example, a request for content that has not been previously cached is forwarded from an edge server to an origin server. from these threats.
Yes. Please contact your CDN account manager to activate WAF on your account.
No. WAF, which is a cloud-based platform that runs on our CDN, is designed to detect and prevent malicious traffic from reaching your web servers. By enforcing your security logic on the edge of our network, WAF is able to efficiently protect your web applications.
WAF may be configured to detect a wide variety of threats ranging from application-specific (e.g., IIS, WordPress, Drupal, etc.) to generic attacks (e.g., HTTP request violations, Java, SQL injections, etc.).
WAF screens traffic and then either alerts, blocks, redirects, or provides a custom response when a malicious request is detected. Leverage Rate Limiting to prevent your web server(s) from being overloaded by too many requests.
Yes. WAF only protects traffic that is routed via our CDN. It is considered a security best practice to obfuscate your web servers to prevent malicious actors from directly attacking your web servers and thereby bypassing the various security measures provided by our CDN.
Set up your firewall to only allow requests from our network.
View our IP blocks (Customer Origin Group / Legacy).
The latency due to WAF screening traffic can be measured in sub-milliseconds. Users should not be able to perceive a difference in the performance of secured traffic when compared to traffic that is not secured by WAF.
The set of traffic that will be screened by WAF varies according to these factors:
Your configuration.
Rules Engine identifies a set of requests (e.g., all traffic or only traffic that flows through a specific site) and the security policy that will be enforced on them.
Type of threat detection.
WAF's primary purpose is to protect your web servers. It does this by screening traffic that will flow to your web servers (i.e., cache missesIndicates that the requested content could not be served immediately from the edge of our network because it either hasn't been cached or its TTL has expired. This type of request is forwarded to an origin server.) to verify that each request meets the following criteria defined within your profile:
Additionally, WAF enforces your access control configuration across all traffic (i.e., cache hits and misses). This prevents blacklisted traffic from accessing your content.
WAF configuration is very flexible. It allows you to tailor the traffic profiles that will be protected by each WAF configuration. This provides you with the ability to:
The recommended approach for securing site traffic requires performing the following steps:
You may configure WAF to screen your traffic using two different profiles. This type of setup, known as Dual WAF, allows you to test changes to your WAF configuration while still ensuring that your traffic is protected by WAF with a known configuration. Once you have vetted your changes and eliminated false positives, you may then quickly enforce the new configuration on your production traffic.
Rules Engine identifies the types of requests that will be screened by WAF and the WAF policy that will be used to screen those requests. Leveraging Rules Engine to screen traffic allows WAF security policy to vary according to the type of traffic. For example, a CMS-specific policy may be enabled for CMS traffic and disabled for all other traffic.
The following table describes the length of time it takes for changes to your WAF configuration to take effect.
Configuration | Action | Time |
---|---|---|
Profile |
Add Modify Delete |
2 minutes |
Instance |
Add Modify Delete |
2 minutes |
Rules Engine |
Add Modify Delete |
1 hour Complex rules must undergo an internal review process before the requested change takes effect. Once the updated configuration has been approved, it must be propagated throughout our network. |
The role of Rules Engine in a WAF setup is to determine the type of requests that will be secured by WAF. As a result, it should not require frequent updates. Typically, updates to profiles and instances fine-tune your WAF configuration. These type of updates take effect in a relatively short time period. This allows you to quickly react to newly identified security threats.
Rules defined within Rules Engine take effect before WAF. Rules that may conflict with a WAF configuration typically involve blocking or modifying certain types of requests. For example, Rules Engine may block a request even though it qualifies for whitelisting via WAF.
A rule set contains a set of policies that define how site traffic will be screened for malicious traffic.
All profiles must be associated with a rule set. A profile's rule set may be defined upon creating or modifying a profile.
The recommend rule set is ECRS. This rule set provides protection against a variety of application-specific and unknown vulnerabilities.
Yes. The ECRS rule set contains a variety of policies that are application-specific. Those policies should be disabled if they do not apply to the traffic being filtered by WAF (as defined by Rules Engine). Leaving these policies enabled may introduce false positives.
The ECRS rule set is updated as needed to address new threats.
Our recommendation is to always use the latest version of a rule set. However, care should be taken when making changes to a profile that is being leveraged by WAF to filter site traffic. Modifying such a profile will alter how WAF filters HTTP traffic.
The recommended approach for updating a profile's rule set is through the following process:
Create a copy of the desired profile.
Make sure that the new profile leverages the latest version of the rule set.
Create a new instance that leverages the newly created profile.
Set the Production Action option to "alert."
The recommended approach to minimizing false positives is summarized below.
From within Rules Engine, add ruleRules Engine: Refers to a set of statements that identify a set of requests and the manner in which those requests will be handled.s or rule statementRules Engine: Refers to the set of conditional expressions & conditions that identify a single type of request. The last conditional expression in a statement should contain a set of actions that will be applied to that request type.s that identify specific types of requests and the instances that will be leveraged when screening that traffic.
The user experience for requests blocked by WAF is described below.
Default WAF response header name/value:
Event log data is available for 30 days.
Event log data for the last 30 days is available either through the WAF Dashboard or our REST API service.