The Alert Logic Managed Web Application Firewall (WAF) Web Applications page includes the following sections. Click on the link to go to the corresponding section to learn more:
To go to the documentation for the previous section of Alert Logic Managed Web Application Firewall (WAF) , see Website Global Policy. To go to the documentation for next subsection in the WAF section, see Output Filter .
To access the Web application section in the WAF management interface:
- On the left panel, under Services, click Websites.
- On the Websites page, click the website you want to manage.
- Under WAF, click Policy, and then scroll down to the Web application section.
If you want to see all the settings on the Policy page, on the upper-right corner, change the Display preset to Advance.
To save configuration changes or edits you make to any features and options, you must click Save on the lower-right of the section or page where you are making changes. Click apply changes on the upper-left corner of the page, and then click OK. Your changes will not be stored if you do not properly save your changes.
The Web applications section allows for defining a sub scope with different policy rules for select policy components based on regular expressions.
Web applications are either added manually or they are automatically created created by the Learner.
The scope of the web application is defined by regular expression. Full match is implied (^regular expression$) and caret (^) and dollar ($) do not have to be included in the regular expression.
Scope regular expression
Input field |
Regular expression specifying the scope of the web application section.
|
Overlapping scopes and validation order |
Web application scopes are listed in validation order and if scopes are overlapping validation order can be changed in the policy section "Web application validation order" immediately above the "web applications" group in the policy. If web application scopes overlap - as in the case of |
Requests
Drop-down list |
Configure URL request status. When set to deny all requests for the web application will be denied.
|
Update
Drop-down list |
Configure URL update setting.
|
Violation action
Drop-down list |
Action to take when a request for the web application is denied. When set to block or detect this setting will override the global setting for the violation at hand.
|
Global violation action override allows for an even more fine grained violation action exception handling than simply specifying violation action for the web application. This override feature allows for specifying exceptions from the global violation action on a per violation type basis.
If, for instance, you have an application that generates "Malformed XML" because of some custom built client application sending XML requests that does not conform to standards it is possible to specify a policy exception for that specific violation for that specific application. This way you do not have to bypass XML validation globally or put the entire application in Pass or Detect mode.
To add a violation exception:
-
Select the violation type from the drop-down list
Global violation action override
-
The selected violation type is listed above the drop-down list with two action types: One for global Protect mode and one for global Detect mode.
-
For each mode select the desired action which can be either of Protect, Detect or Pass.
Restrict which HTTP methods are allowed.
Corresponding violation: Method illegal
HEAD
Check box |
Allow / disallow HTTP method HEAD. Default: |
GET
Check box |
Allow / disallow HTTP method GET. Default: |
POST
Check box |
Allow / disallow HTTP method POST. Default: |
OPTIONS
Check box |
Allow / disallow HTTP method OPTIONS. Default: |
PUT
Check box |
Allow / disallow HTTP method PUT. Default: |
DELETE
Check box |
Allow / disallow HTTP method DELETE. Default: |
MKCOL
Check box |
Allow / disallow HTTP method MKCOL. Default: |
COPY
Check box |
Allow / disallow HTTP method COPY. Default: |
MOVE
Check box |
Allow / disallow HTTP method MOVE. Default: |
PROPFIND
Check box |
Allow / disallow HTTP method PROPFIND. Default: |
PROPPATCH
Check box |
Allow / disallow HTTP method PROPPATCH. Default: |
LOCK
Check box |
Allow / disallow HTTP method LOCK. Default: |
UNLOCK
Check box |
Allow / disallow HTTP method UNLOCK. Default: |
PATCH
Check box |
Allow / disallow HTTP method PATCH. Default: |
Require a valid session to access this resource
Check box |
Enable / disable authorization of access to this resource based on session validity. If enabled, whenever this resource is requested, WAF will only allow the request if it originates from a valid user session. Note that session protection and request authorization have to be enabled for resource request authorization to be effective. See Session and CSRF protection Default: |
Enable request origin validation for this application
Check box |
Enable/disable validation of requests resulting from forms with this application as action. If enabled, whenever a request for this application contains a specific parameter (see below) it is verified that the request origins from a form on a web page/application belonging to the web system and that the form has been issued on a page belonging to the current users session. Note that for the validation token to be generated Generate request form validation tokens (CSRF protection) has to be enabled. See Session and CSRF protection. Default: |
Validate parameter name
Input field |
String specifying the name of a specific parameter to be present for WAF to perform request origin validation.
|
This section contains a list of current defined parameters with corresponding input validation type and value and other settings.
To update a parameter simply change the values and click on the
button.Select parameter
Check box |
Select or clear check box to mark for deletion. Default: <not selected> To mark an entry for deletion, check the box. When the parameter list is saved the parameter will be deleted. |
Name
Input field |
String specifying the parameters name.
|
Type
Drop-down list |
Input validation type.
|
Value(s)
Depends on |
Value for input validation.
|
Negative Check
Drop-down options |
Use negative checking if validation class is above configured threshold. If set to Auto the policy configured in classes negative signatures policy will be applied when validating input.
|
Update
Drop-down options |
Configure how the parameter should be handled by the Learner. If set to When set to
|