SlideShare a Scribd company logo
Advanced Security
Topics Covered:
• URLPolicies
• Bruteforce Prevention
• Antivirus
Module 4–Chapter 3
URL Policies
• Automatically createdforeachService
• Additional URL Policies can be created forspecific partsof aWeb App
• Modulesthatcanbeactivated in URLPolicies:
• DataTheftPrevention
• Bruteforce Prevention
• Antivirus
• RateControl (alsoavailableatService level)
• 4.3 – Advanced Security
Advanced Security
• 4.3 – Advanced Security
Response
Application
Server
Tommy
Request
Antivirus
• Virusscanningisenabled ona per-URLbasis
• ShouldonlybeenabledforURLswhich allowfile uploadsanddownloads
• Clam AV
• Barracudacreatesthe AVsignatures pushedthrough Energize Updates
• 4.3 – Advanced Security
Eisenberg
WAF
Web Server
Request blocked
EU
Bruteforce Protection
• Maximumnumberof requeststo aURLwithinaconfigured interval
• Allrequests oronlyinvalidrequests
• From asingle clientorfromallsources
• 4.3 – Advanced Security
WAF
Web Server
Bruteforce
tommy/password
2
1
Requests
1
2
Request blocked
Eisenberg
1.1.1.1
tommy/123456
3
tommy/qwerty
4
tommy/abc123 360s1.1.1.1
Session Tracking
• Limits thenumberof sessions originating from aparticularclientIP
addressina given interval
• Helps prevent session-based Denial of Service(DoS) attacks
• 4.3 – Advanced Security
WAF
Web Server
Session Trck.
Request blocked
Eisenberg
1.1.1.1
60s1.1.1.1
Request3
Request2
SessionID2
Request1
SessionID1
Request2
SessionID2
Request1
SessionID1
Advanced Security Configuration
• WEBSITES> AdvancedSecurity
• Edit thedefault-URL-policy
• Enable Data Theft Protection
• Enable AV
• Enable Bruteforce Protection
• Enable Rate Control
• Session Trackingwalkthrough
• EnableClickjackingProtection
• 4.3 – Advanced Security
Live Demo
Allow/Deny Rules
Topics Covered:
• Overview
• Allow/Deny RulesTypes
• ExtendedMatchRules
• RuleEvaluation Order
Module 4–Chapter 4
Allow/Deny Rules
• Define strictaccesscontrol rulesforthe services
• Rulesareservice-specific andcannotbeshared
• Two typesof rules:
• Allow/Deny rulesforURLs
• Allow/Denyrulesforheaders
• 4.4 – Allow/Deny Rules
Allow/Deny Rules
• 4.4 – Allow/Deny Rules
Response
Application
Server
Tommy
Request
Allow/Deny Rules for URLs
• Control accessto certainportionsto theWeb Applicationbasedon a
set of matchingcriteria
• WithoutchanginganyconfigurationontheWebApplicationitself
• Extendedmatchcanbeused
• Configurableactionsare the same asglobal ACLs
• 4.4 – Allow/Deny Rules
Web Application
Public Private
Payments
Access
Control
Allow/Deny Rules for Headers
• Enforcestrictlimitations onincoming headers
• Sanitize HTTP headerscontaining
• Sensitive informationidentifyingthe client
• Someapplication-specificstateinformation
• Prevent configured attacktypes
• Stop potentially malicious metacharactersandkeywords
• 4.4 – Allow/Deny Rules
Extended Match Rules
• Specifically define whichrequests/responsesneedtherule applied
• Conditionscanbe based on foundparametersor elements
• Used acrossmultiple modules (notonly Allow/Denyrules)
• 4.4 – Allow/Deny Rules
Tommy Firefox 16
WAF
USER-Agent co Firefox/16
Application
Server
URL Allow/Deny Rule
Request
Response
301 - Update_your_browser.html
Extended Match Rules Configuration
• 4.4 – Allow/Deny Rules
1
2
3
4
5
Extended Match Widget
1. OpentheExtendedMatchwidget
2. Configurewhattointercept
3. InsertconditionintheHeader
Expressionfield
4. Apply/Closewidget
5. 1=highestpriority
Rule Evaluation Order
• The policies of the“bestmatching”ruleareapplied
• Hierarchical match
• ComparestheHostheader.Ifthereisnomatch,comparestheURLpath
• Ifmultiple ACLsmatch,eachextendedmatchruleisevaluatedinascending
orderofextendedmatchsequence
• Sequential match
• IgnorestheHostheaderandURLpath
• Eachextendedmatchruleisevaluatedinsequentialorder basedonthe
extendedmatchsequence
• 4.4 – Allow/Deny Rules
Allow/Deny Rules
• WEBSITES> Allow/DenyRules
• CreateaURLAllow/Deny rule
• CreateaHeadersAllow/Denyrule
• 4.4 – Allow/Deny Rules
Live Demo
Website Profiles
Topics Covered:
• Overview
• URLProfiles
• ParameterProfiles
• AdaptiveProfiling
• URLEncryption
Module 4–Chapter 5
Website Profiles Overview
• Specific rules tofine-tunethesecuritysettingsof a service
• URLprofiles
• Parametersprofiles
Tommy
Reed
WAF
/cgi-bin/reg.cgi
URL Profile
/cgi-bin/reg.cgi
Request
Parameters Profile
First Name
• Input Field
• Type Alpha
• Max Char 16
Last Name
• Input Field
• Type Alpha
• Max Char 16
/cgi-bin/reg.cgi
Request
Application
Server
Tommy
Reed
• 4.5 – Website Profiles
Website Profiles
• 4.5 – Website Profiles
Response
Application
Server
Tommy
Request
Website Profiles Modes
• Active - Validates requests,blocks, andlogs requestsviolations
• UseURLprofileandcorresponding parameterprofile(s) settings
• Passive - Validates the requestsand logs violations
• Learning- LearnstheWeb Application structure…
• 4.5 – Website Profiles
Website Profiles - Strict Profile Check
• Enforcethepositiveornegativesecuritymodel
• StrictProfileCheckenabled:
• ValidatesrequestsanddeniestherequeststhatdonotmatchtheURLprofilesandparameter
profiles
• StrictProfileCheckdisabled:
• Validatesrequests,andiftheydonotmatchtheURLprofilesandparameterprofiles,therequests
arevalidatedagainsttheglobalsecuritypolicy.
• 4.5 – Website Profiles
Adaptive Profiling
• Automatically learnsthestructureof aWeb Application
• Basedonrequests and/orresponses
• Available onmodel660+
• Creates the website profile based on thelearnedstructure
• 4.5 – Website Profiles
Tommy
Reed
WAF
/cgi-bin/reg.cgi
URL Profile
/cgi-bin/reg.cgi
Request
Parameters Profile
First Name
• Input Field
• Type Alpha
Last Name
• …
/cgi-bin/reg.cgi
Request
Application
Server
Tommy
Reed
ResponseResponse
Adaptive Profiling Configuration
1. Configure theservice in Learningmode
2. Startthelearningprocess
• GeneratetraffictotheWebApplication
3. Stop thelearningprocess
4. Review and Lock theURL Profiles
ConfigurationsettingsinWEBSITES>WebsiteProfiles
• 4.5 – Website Profiles
2 3
1 2
4
Website Profiles Configuration
• WEBSITES> Websites Profiles
• CreateanewURLprofile
• Createanewparameterprofile
• WEBSITE >Adaptive Profiling
• Addanadaptiveprofiling rule
• WEBSITES> Websites Profiles
• Configure thewebsiteprofiletolearn
• 4.5 – Website Profiles
Live Demo
Tuning Security Rules
Topics Covered:
• Web Firewall Logs
• TrustedHosts
• ExceptionProfiling
Module 4–Chapter 6
Web Firewall Logs
• Traffic violations arelogged in theWeb Firewall Log
• Canbeusedto mitigate false positives
• Suggeststhe recommended “Fix”
• Acceptinga recommendation could have thefollowing impact:
• Localized-Website profilemodification(URLorparameter)
• Global- Securitypolicymodification
• 4.6 – Tuning Security Rules
Trusted Hosts
• Hosts whose trafficis assumed tobe safe
• DefinedbyIPaddress/network
• Configured ingroups
• Use cases
• Exemptspecific trafficfromsecuritychecksorauthentication
• TraintheAdaptiveProfiling engine
• TraintheExceptionProfiling engine
• 4.6 – Tuning Security Rules
Exception Profiling
• Fine-tunessecuritypolicies associated witha service
• Uses a heuristics-basedstrategy to refine securitysettingsinresponse
to logged traffic
Tommy
WAF
Service
Security
Settings
Exception
Profiling
Max File size Upload
- 5 Mb
6 Mb7 Mb8 Mb
Request blocked
Increase
by 100%
Max File size Upload
- 10 Mb
Level LOW
- Trigger Count: 3
- New Value: +100%
• 4.6 – Tuning Security Rules
Exception Profiling Heuristics
• Changescanbesuggestedorapplied automatically
• Trustedtraffic
• Trusted(Hosts)
• Untrustedtraffic
• Low
• Medium
• High
• Untrustedtraffic levels are shared among services
• 4.6 – Tuning Security Rules
Tuning Security Rules Configuration
• BASIC >Web Firewall Logs
• Reviewfalsepositives andapplythefix
• WEBSITES> TrustedHosts
• Configure anewgroup andapplyittoaservice
• WEBSITES> ExceptionProfiling
• Assign ExceptionProfile leveltoaservice
• WEBSITES> ExceptionHeuristics
• Levelswalkthrough
• 4.6 – Tuning Security Rules
Live Demo
URL Encryption
• TheWAF encryptsall URLsassociated withtherequestedpage
• Requiresnochangesto the application
• If encryptedURLsare manipulatedor tamperedwithinsubsequent
requests,therequestsare blockedandlogged
• 4.3 – Advanced Security
WAF
Tommy
Application
Server
http://bn.com
Request
http://bn.com
Request
http://bn.com/index.php?include=a.txt
Response
http://bn.com/d098duj0
Response
URL Encryption Configuration
• WEBSITES> URLEncryption
• Activate URLencryptiononaservice
• Addanewencryptionrule
• BASIC >AccessLogs
• VerifyencryptedURLs
• 4.3 – Advanced Security
Live Demo
Application DDoS Attack Protection
Topics Covered:
• IP Reputation Filter
• DDoSPolicies
• Slow Client AttackPrevention
Module 4–Chapter 7
IP Reputation Filter
• Filters trafficfrom specific geographic regions / categories to aservice
• GeoPool
• BarracudaReputation
• TORNodes
• AnonymousProxy
• SatelliteProvider
WAF
Requests
Requests blocked
Backend
Servers
• 4.7 – Application DDoS Attack Protection
DDoS Policies
• Passively evaluate theclientsto determineif theyare suspiciousor not
• The client taggedas suspiciouswill be forcedto answera CAPTCHA
• Thesuspicious clientIPaddresses will beremembered for900seconds
BOT
Request
WAF
Web Server
Request
ResponseResponse
JS
Request
Request blocked
Response
C4PtcH4
• 4.7 – Application DDoS Attack Protection
Slow Client Attack Prevention
• Enforcesrequests/ responsestimeouts
• Enforcesrequests/ responsesminimumdata transferrates
• Prevents:
• SlowHTTPheadersvulnerability(Slowloris)
• SlowHTTPPOSTvulnerability(R-U-Dead-YetorRUDY)
• SlowreadDoSattack
• 4.7 – Application DDoS Attack Protection
Application DDoS Attack Protection
• WEBSITES> IP Reputation
• Configuration walkthrough
• WEBSITES> DDoSPrevention
• CreateanewDDoSpolicy
• Edit theSlow ClientAttackPreventionsettings
• 4.7 – Application DDoS Attack Protection
Live Demo

More Related Content

PPTX
Fortinet Icon Library
PPTX
WAF deployment
PDF
What You Should Know About WebLogic Server 12c (12.2.1.2) #oow2015 #otntour2...
PPT
PDF
01- intro to firewall concepts
PDF
Linux Servers
PPTX
負荷軽減!整合性もバッチリ!Veeamのストレージ連携セミナー!!
PDF
OAuth and STUN, TURN in WebRTC context RFC7635
Fortinet Icon Library
WAF deployment
What You Should Know About WebLogic Server 12c (12.2.1.2) #oow2015 #otntour2...
01- intro to firewall concepts
Linux Servers
負荷軽減!整合性もバッチリ!Veeamのストレージ連携セミナー!!
OAuth and STUN, TURN in WebRTC context RFC7635

What's hot (20)

PDF
Web Socket ASM support lior rotkovitch
PDF
Fortinet security fabric
PPTX
PPTX
Technical Tips: Visual Regression Testing and Environment Comparison with Bac...
PPTX
OTG - Practical Hands on VAPT
PPTX
Network Monitoring Basics
DOC
Basic command to configure mikrotik
PPTX
Addressing the OWASP Mobile Security Threats using Xamarin
PPTX
OpenNMS introduction
PPTX
OWASP Top 10 2021 What's New
PDF
Routed networks sydney
PDF
Frida Android run time hooking - Bhargav Gajera & Vitthal Shinde
PDF
F5 ASM v12 DDoS best practices
PDF
Java Concurrency - Quiz Questions
PDF
PPTX
Extreme fabric connect
PPTX
Akamai waf
ODP
Introduction to Nginx
Web Socket ASM support lior rotkovitch
Fortinet security fabric
Technical Tips: Visual Regression Testing and Environment Comparison with Bac...
OTG - Practical Hands on VAPT
Network Monitoring Basics
Basic command to configure mikrotik
Addressing the OWASP Mobile Security Threats using Xamarin
OpenNMS introduction
OWASP Top 10 2021 What's New
Routed networks sydney
Frida Android run time hooking - Bhargav Gajera & Vitthal Shinde
F5 ASM v12 DDoS best practices
Java Concurrency - Quiz Questions
Extreme fabric connect
Akamai waf
Introduction to Nginx
Ad

Similar to Advanced security in Barracuda WAF (20)

PPTX
Basic security and Barracuda VRS
PPTX
Barracuda WAF Deployment in Microsoft Azure
PDF
Обход файрволов веб-приложений
PDF
WAF protections and bypass resources
PPTX
Waf bypassing Techniques
PDF
Advanced web application hacking and exploitation
PPT
Securing Windows web servers
PPTX
PDF
How to Ensure You're Launching the Most Secure Website - Michael Tremante
PPT
Protecting web aplications with machine learning and security fabric
PPTX
Tune in for the Ultimate WAF Torture Test: Bots Attack!
PPTX
The Power of Web Application Firewalls (WAFs) in Protecting Your Web App.pptx
PDF
Taking the Fear out of WAF
PPTX
Web application vulnerability assessment
PPT
Hacking web applications
PPTX
Radware - WAF (Web Application Firewall)
PPT
Net scaler appfw customer technical presentation dec 2012f
PPT
Hacking web applications
PPTX
Splunk Enterpise for Information Security Hands-On
PDF
DSS ITSEC Conference 2012 - Radware WAF
Basic security and Barracuda VRS
Barracuda WAF Deployment in Microsoft Azure
Обход файрволов веб-приложений
WAF protections and bypass resources
Waf bypassing Techniques
Advanced web application hacking and exploitation
Securing Windows web servers
How to Ensure You're Launching the Most Secure Website - Michael Tremante
Protecting web aplications with machine learning and security fabric
Tune in for the Ultimate WAF Torture Test: Bots Attack!
The Power of Web Application Firewalls (WAFs) in Protecting Your Web App.pptx
Taking the Fear out of WAF
Web application vulnerability assessment
Hacking web applications
Radware - WAF (Web Application Firewall)
Net scaler appfw customer technical presentation dec 2012f
Hacking web applications
Splunk Enterpise for Information Security Hands-On
DSS ITSEC Conference 2012 - Radware WAF
Ad

More from Aravindan A (13)

PPTX
Application delivery
PPTX
Barracuda WAF deployment in AWS
PPTX
Api sec demo_updated_v2
PPTX
WAF CC Introduction
PPTX
System administration
PPTX
Devops
PPTX
Advanced networking
PPTX
Reporting
PPTX
Logging intro
PPTX
Application delivery
PPTX
Access control
PPTX
application security basics
PPTX
general protocol basics
Application delivery
Barracuda WAF deployment in AWS
Api sec demo_updated_v2
WAF CC Introduction
System administration
Devops
Advanced networking
Reporting
Logging intro
Application delivery
Access control
application security basics
general protocol basics

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MIND Revenue Release Quarter 2 2025 Press Release
Reach Out and Touch Someone: Haptics and Empathic Computing
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
Programs and apps: productivity, graphics, security and other tools
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology

Advanced security in Barracuda WAF

  • 1. Advanced Security Topics Covered: • URLPolicies • Bruteforce Prevention • Antivirus Module 4–Chapter 3
  • 2. URL Policies • Automatically createdforeachService • Additional URL Policies can be created forspecific partsof aWeb App • Modulesthatcanbeactivated in URLPolicies: • DataTheftPrevention • Bruteforce Prevention • Antivirus • RateControl (alsoavailableatService level) • 4.3 – Advanced Security
  • 3. Advanced Security • 4.3 – Advanced Security Response Application Server Tommy Request
  • 4. Antivirus • Virusscanningisenabled ona per-URLbasis • ShouldonlybeenabledforURLswhich allowfile uploadsanddownloads • Clam AV • Barracudacreatesthe AVsignatures pushedthrough Energize Updates • 4.3 – Advanced Security Eisenberg WAF Web Server Request blocked EU
  • 5. Bruteforce Protection • Maximumnumberof requeststo aURLwithinaconfigured interval • Allrequests oronlyinvalidrequests • From asingle clientorfromallsources • 4.3 – Advanced Security WAF Web Server Bruteforce tommy/password 2 1 Requests 1 2 Request blocked Eisenberg 1.1.1.1 tommy/123456 3 tommy/qwerty 4 tommy/abc123 360s1.1.1.1
  • 6. Session Tracking • Limits thenumberof sessions originating from aparticularclientIP addressina given interval • Helps prevent session-based Denial of Service(DoS) attacks • 4.3 – Advanced Security WAF Web Server Session Trck. Request blocked Eisenberg 1.1.1.1 60s1.1.1.1 Request3 Request2 SessionID2 Request1 SessionID1 Request2 SessionID2 Request1 SessionID1
  • 7. Advanced Security Configuration • WEBSITES> AdvancedSecurity • Edit thedefault-URL-policy • Enable Data Theft Protection • Enable AV • Enable Bruteforce Protection • Enable Rate Control • Session Trackingwalkthrough • EnableClickjackingProtection • 4.3 – Advanced Security Live Demo
  • 8. Allow/Deny Rules Topics Covered: • Overview • Allow/Deny RulesTypes • ExtendedMatchRules • RuleEvaluation Order Module 4–Chapter 4
  • 9. Allow/Deny Rules • Define strictaccesscontrol rulesforthe services • Rulesareservice-specific andcannotbeshared • Two typesof rules: • Allow/Deny rulesforURLs • Allow/Denyrulesforheaders • 4.4 – Allow/Deny Rules
  • 10. Allow/Deny Rules • 4.4 – Allow/Deny Rules Response Application Server Tommy Request
  • 11. Allow/Deny Rules for URLs • Control accessto certainportionsto theWeb Applicationbasedon a set of matchingcriteria • WithoutchanginganyconfigurationontheWebApplicationitself • Extendedmatchcanbeused • Configurableactionsare the same asglobal ACLs • 4.4 – Allow/Deny Rules Web Application Public Private Payments Access Control
  • 12. Allow/Deny Rules for Headers • Enforcestrictlimitations onincoming headers • Sanitize HTTP headerscontaining • Sensitive informationidentifyingthe client • Someapplication-specificstateinformation • Prevent configured attacktypes • Stop potentially malicious metacharactersandkeywords • 4.4 – Allow/Deny Rules
  • 13. Extended Match Rules • Specifically define whichrequests/responsesneedtherule applied • Conditionscanbe based on foundparametersor elements • Used acrossmultiple modules (notonly Allow/Denyrules) • 4.4 – Allow/Deny Rules Tommy Firefox 16 WAF USER-Agent co Firefox/16 Application Server URL Allow/Deny Rule Request Response 301 - Update_your_browser.html
  • 14. Extended Match Rules Configuration • 4.4 – Allow/Deny Rules 1 2 3 4 5 Extended Match Widget 1. OpentheExtendedMatchwidget 2. Configurewhattointercept 3. InsertconditionintheHeader Expressionfield 4. Apply/Closewidget 5. 1=highestpriority
  • 15. Rule Evaluation Order • The policies of the“bestmatching”ruleareapplied • Hierarchical match • ComparestheHostheader.Ifthereisnomatch,comparestheURLpath • Ifmultiple ACLsmatch,eachextendedmatchruleisevaluatedinascending orderofextendedmatchsequence • Sequential match • IgnorestheHostheaderandURLpath • Eachextendedmatchruleisevaluatedinsequentialorder basedonthe extendedmatchsequence • 4.4 – Allow/Deny Rules
  • 16. Allow/Deny Rules • WEBSITES> Allow/DenyRules • CreateaURLAllow/Deny rule • CreateaHeadersAllow/Denyrule • 4.4 – Allow/Deny Rules Live Demo
  • 17. Website Profiles Topics Covered: • Overview • URLProfiles • ParameterProfiles • AdaptiveProfiling • URLEncryption Module 4–Chapter 5
  • 18. Website Profiles Overview • Specific rules tofine-tunethesecuritysettingsof a service • URLprofiles • Parametersprofiles Tommy Reed WAF /cgi-bin/reg.cgi URL Profile /cgi-bin/reg.cgi Request Parameters Profile First Name • Input Field • Type Alpha • Max Char 16 Last Name • Input Field • Type Alpha • Max Char 16 /cgi-bin/reg.cgi Request Application Server Tommy Reed • 4.5 – Website Profiles
  • 19. Website Profiles • 4.5 – Website Profiles Response Application Server Tommy Request
  • 20. Website Profiles Modes • Active - Validates requests,blocks, andlogs requestsviolations • UseURLprofileandcorresponding parameterprofile(s) settings • Passive - Validates the requestsand logs violations • Learning- LearnstheWeb Application structure… • 4.5 – Website Profiles
  • 21. Website Profiles - Strict Profile Check • Enforcethepositiveornegativesecuritymodel • StrictProfileCheckenabled: • ValidatesrequestsanddeniestherequeststhatdonotmatchtheURLprofilesandparameter profiles • StrictProfileCheckdisabled: • Validatesrequests,andiftheydonotmatchtheURLprofilesandparameterprofiles,therequests arevalidatedagainsttheglobalsecuritypolicy. • 4.5 – Website Profiles
  • 22. Adaptive Profiling • Automatically learnsthestructureof aWeb Application • Basedonrequests and/orresponses • Available onmodel660+ • Creates the website profile based on thelearnedstructure • 4.5 – Website Profiles Tommy Reed WAF /cgi-bin/reg.cgi URL Profile /cgi-bin/reg.cgi Request Parameters Profile First Name • Input Field • Type Alpha Last Name • … /cgi-bin/reg.cgi Request Application Server Tommy Reed ResponseResponse
  • 23. Adaptive Profiling Configuration 1. Configure theservice in Learningmode 2. Startthelearningprocess • GeneratetraffictotheWebApplication 3. Stop thelearningprocess 4. Review and Lock theURL Profiles ConfigurationsettingsinWEBSITES>WebsiteProfiles • 4.5 – Website Profiles 2 3 1 2 4
  • 24. Website Profiles Configuration • WEBSITES> Websites Profiles • CreateanewURLprofile • Createanewparameterprofile • WEBSITE >Adaptive Profiling • Addanadaptiveprofiling rule • WEBSITES> Websites Profiles • Configure thewebsiteprofiletolearn • 4.5 – Website Profiles Live Demo
  • 25. Tuning Security Rules Topics Covered: • Web Firewall Logs • TrustedHosts • ExceptionProfiling Module 4–Chapter 6
  • 26. Web Firewall Logs • Traffic violations arelogged in theWeb Firewall Log • Canbeusedto mitigate false positives • Suggeststhe recommended “Fix” • Acceptinga recommendation could have thefollowing impact: • Localized-Website profilemodification(URLorparameter) • Global- Securitypolicymodification • 4.6 – Tuning Security Rules
  • 27. Trusted Hosts • Hosts whose trafficis assumed tobe safe • DefinedbyIPaddress/network • Configured ingroups • Use cases • Exemptspecific trafficfromsecuritychecksorauthentication • TraintheAdaptiveProfiling engine • TraintheExceptionProfiling engine • 4.6 – Tuning Security Rules
  • 28. Exception Profiling • Fine-tunessecuritypolicies associated witha service • Uses a heuristics-basedstrategy to refine securitysettingsinresponse to logged traffic Tommy WAF Service Security Settings Exception Profiling Max File size Upload - 5 Mb 6 Mb7 Mb8 Mb Request blocked Increase by 100% Max File size Upload - 10 Mb Level LOW - Trigger Count: 3 - New Value: +100% • 4.6 – Tuning Security Rules
  • 29. Exception Profiling Heuristics • Changescanbesuggestedorapplied automatically • Trustedtraffic • Trusted(Hosts) • Untrustedtraffic • Low • Medium • High • Untrustedtraffic levels are shared among services • 4.6 – Tuning Security Rules
  • 30. Tuning Security Rules Configuration • BASIC >Web Firewall Logs • Reviewfalsepositives andapplythefix • WEBSITES> TrustedHosts • Configure anewgroup andapplyittoaservice • WEBSITES> ExceptionProfiling • Assign ExceptionProfile leveltoaservice • WEBSITES> ExceptionHeuristics • Levelswalkthrough • 4.6 – Tuning Security Rules Live Demo
  • 31. URL Encryption • TheWAF encryptsall URLsassociated withtherequestedpage • Requiresnochangesto the application • If encryptedURLsare manipulatedor tamperedwithinsubsequent requests,therequestsare blockedandlogged • 4.3 – Advanced Security WAF Tommy Application Server http://bn.com Request http://bn.com Request http://bn.com/index.php?include=a.txt Response http://bn.com/d098duj0 Response
  • 32. URL Encryption Configuration • WEBSITES> URLEncryption • Activate URLencryptiononaservice • Addanewencryptionrule • BASIC >AccessLogs • VerifyencryptedURLs • 4.3 – Advanced Security Live Demo
  • 33. Application DDoS Attack Protection Topics Covered: • IP Reputation Filter • DDoSPolicies • Slow Client AttackPrevention Module 4–Chapter 7
  • 34. IP Reputation Filter • Filters trafficfrom specific geographic regions / categories to aservice • GeoPool • BarracudaReputation • TORNodes • AnonymousProxy • SatelliteProvider WAF Requests Requests blocked Backend Servers • 4.7 – Application DDoS Attack Protection
  • 35. DDoS Policies • Passively evaluate theclientsto determineif theyare suspiciousor not • The client taggedas suspiciouswill be forcedto answera CAPTCHA • Thesuspicious clientIPaddresses will beremembered for900seconds BOT Request WAF Web Server Request ResponseResponse JS Request Request blocked Response C4PtcH4 • 4.7 – Application DDoS Attack Protection
  • 36. Slow Client Attack Prevention • Enforcesrequests/ responsestimeouts • Enforcesrequests/ responsesminimumdata transferrates • Prevents: • SlowHTTPheadersvulnerability(Slowloris) • SlowHTTPPOSTvulnerability(R-U-Dead-YetorRUDY) • SlowreadDoSattack • 4.7 – Application DDoS Attack Protection
  • 37. Application DDoS Attack Protection • WEBSITES> IP Reputation • Configuration walkthrough • WEBSITES> DDoSPrevention • CreateanewDDoSpolicy • Edit theSlow ClientAttackPreventionsettings • 4.7 – Application DDoS Attack Protection Live Demo