Configuration

The System Configuration page includes the following sections. Click on the link to go to the corresponding section to learn more:

To go to the documentation for the previous section of System, see Clustering . To go to the documentation for next subsection in the System section, see Information.

To access the Configuration page in the WAF management interface, on the left panel, under System, click Configuration.

To save configuration changes or edits you make to any features and options, you must click Save on the lower-right of the section or page where you are making changes. Click apply changes on the upper-left corner of the page, and then click OK. Your changes will not be stored if you do not properly save your changes.

Network

Basic network configuration is performed in this section. Any changes made to this section are applied and saved by clicking on the Save" button.

Hostname

Input field

Domain name of the Web Security Manager Alert Logic Managed Web Application Firewall (WAF).

Valid input

Fully qualified domain name.

Input example

proxy.mydomain.com

Default value

None

Nickname

Input field

The nickname to use when listing WAF instance in the Fortra console.

Valid input

Text string

Input example

mydomain-WAF

Default value

None

SMTP server

Input field

SMTP server hostname or IP address.

SMTP server is used for sending alert emails to the contact email address specified.

SMTP server is not required.

Valid input

IP address or fully qualified domain name

Input example

smtp.mydomain.com

Default value

None

NTP server(s)

Input field

IP address or domain name of the NTP server(s).

Valid input

IP address or fully qualified domain name

Input example

192.168.0.1

time.google.com

Default value

None

Network gateways

Network gateways for IPv4 and IPv6.

IPv4 (default)

Input field

IP address of the default IPv4 gateway.

Valid input

Assigned IP address must be in the same network subnet as the IP address of one of the physical network interfaces.

Input example

192.168.0.1

Default value

None

Default Gateway

Input field

IP address of the default IPv6 gateway.

Valid input

Assigned IP address must be in the same network subnet as the IP address of one of the physical network interfaces.

Input example

fe80::1

Default value

None

Domain Name System (DNS)

Configure name resolution.

Fortra WAF supports DNSSEC and DNS over TLS (DoT) to support requirements for encrypted and/or validated name resolution.

DNSSEC

DNSSEC adds cryptographic signatures to DNS records, enabling clients to verify authenticity and prevent spoofing, but does not encrypt queries.

When DNSSEC is enabled, DNS servers that are not DNSSEC-enabled or cannot be validated are not configurable. Name resolution is handled by a local, recursively validating DNSSEC resolver.

DNS over TLS (DoT)

Encrypts DNS queries and responses using TLS over TCP (port 853), preventing eavesdropping and tampering. Improves privacy and integrity compared to traditional plaintext DNS.

When enabled, DNS queries are encrypted.

DNS Server(s)

Input field

IP address of one or more DNS servers.

Valid input

IPv4 address

Use a space character to separate multiple hosts (only one is required).

Input example

4.4.4.4 8.8.8.8

Static routes

Define static routes.

Click Add new route and enter route information for each route you want to add.

When routes are entered click Save settings in lower button bar to save.

Destination

Input field

The route destination.

Enter first IP address of destination network.

Valid input

A valid IP address.

Input example
  1. 192.168.5.0

  2. 192.168.6.8

  3. 192.168.7.10

Default value

None

Subnet

Input field

Network mask of the destination IP address.

Valid input

A valid network mask

Input example
  1. 255.255.255.0

  2. 255.255.255.248

  3. 255.255.255.255

Default value

None

Gateway

Input field

IP address of the gateway through which the destination can be reached.

Valid input

An IP address of a gateway which is directly reachable by the Web Security Manager node.

Input example
  1. 192.168.0.4

  2. 192.168.0.5

  3. 192.168.0.6

Default value

None

The examples above would result in:

  1. Access to IP addresses 192.168.5.0-255 (192.168.5.0/24) is routed through the gateway 192.168.0.4.

  2. Access to IP addresses 192.168.6.8-16 (192.168.6.8/29) is routed through the gateway 192.168.0.5.

  3. Access to IP address 192.168.7.10 (192.168.7.10/32) is routed through the gateway 192.168.0.6.

Date and Time

This section is used to configure time synchronization via NTP (Network Time Protocol).

It is strongly advised to configure an NTP server to have the correct date and time set on the system.

It is recommended to configure an internal NTP interface. If one is not available, a well-known NTP server can be used (time.nist.gov).

Timezone

Drop-down list

Timezone information.

Selects the system's timezone from the drop-down list.

Default value

Europe/Copenhagen

Date format

Drop-down list

Display dates in logs and reports in Month-Day-Year or Day-Month-Year format.

Select the date format from the drop-down list.

Default value

Month-Day-Year

Logging to external host

Logs in System > Logs can be sent to an external syslog server.

Enable logging to external syslog

Checkbox

Enable or disable logging to an external syslog server.

Syslog port

Input field

External syslog server listen port.
Syslog protocol

Drop-down list

Protocol for sending logs to the remote syslog server.

Select a protocol from the drop-down list.

Options

TCP/TLS (encrypted, untrusted) – TCP connection, TLS encrypted without certificate validation

TCP/TLS (encrypted) – TCP connection, TLS encrypted with certificate validation

UDP (unencrypted) – UDP connection and state-less, logs are sent in cleartext format

Default value

UDP (unencrypted)

Threshold

Drop-down list

Define what logs get sent by syslog level.

Select syslog level from the drop-down list.

Options

Syslog levels LOG_DEBUG.. LOG_CRIT

Default value

LOG_NOTICE

Logging to external server

Export deny logs to AWS S3.

When enabled, deny logs are written every 60 seconds to the configured S3 destination.

Export deny logs to S3

Checkbox

Enable or disable exporting deny logs to S3.

Format

Drop-down list

Logs can be written as JSON or JSON lines.

Select the formation from the drop-down list.

    Default value

    JSON

Bucket

Input field

S3 bucket to write to.

Bucket must exist and be writeable by the role or key as specified in AWS credentials.

Region

Input field

AWS region

Prefix

Input field

S3 prefix ("folder") to store files

AWS credentials

Configure authentication method and credentials for accessing AWS environment. This is required for functionality like DDoS protection and writing data to S3.

Delegated IAM role and static credentials (key-based access) are supported.

Use delegated IAM role

Checkbox

When enabled, the WAF will use the delegated IAM role specified in the AWS instance profile.

IAM role and key-based access are mutually exclusive. Selecting this checkbox will disable the AWS access key ID and AWS secret access key input fields.

AWS access key ID

Input field

AWS access key

AWS secret access key

Input field

AWS access key secret

Azure service principal credentials

Subscription ID

Input field

The Subscription ID is the unique identifier of an Azure subscription, represented as a GUID.

It specifies which subscription the configuration or service will operate in.

Example: 12345678-90ab-cdef-1234-567890abcdef.

Tenant ID

Input field

The Tenant ID is the unique identifier of the Azure Active Directory (AAD) tenant.

It identifies the directory where the service principal is registered.

Example: abcdef12-3456-7890-abcd-ef1234567890.

Application ID

Input field

The Application ID, also referred to as the Client ID, is the identifier of the Service Principal (the app registration in AAD).

It specifies which application is used for authentication.

Example: fedcba98-7654-3210-fedc-ba9876543210.

Secret

Input field

The Secret, also known as the Client Secret, functions like a password for the Service Principal.

It is used together with the Application ID to authenticate and obtain an OAuth token.

Third-party CAPTCHA credentials

Fortra WAF supports integration with third-party CAPTCHA services as an alternative to its built-in CAPTCHA functionality.

To enable this integration, specific credentials must be provided to authenticate and authorize the WAF with the chosen CAPTCHA service.

Google reCAPTCHA v2 (checkbox)

Site key

Input field

The Site Key is a public key used on the client side (in the HTML or JavaScript) to render the CAPTCHA widget and validate user interaction.

Secret key

Input field

The Secret Key is a private key used on the server side to verify the CAPTCHA response with Google’s API.

hCaptcha (checkbox)

Site key

Input field

The Site Key is a public key used on the client side to display the hCaptcha widget and collect user responses.

Secret key

Input field

The Secret Key is a private key used on the server side to validate the CAPTCHA response with the hCaptcha verification endpoint.

SNMP

Configure threshold level and address of external Syslog server.

Enable SNMP queries

Checkbox

Enable or disable SNMP daemon.

If checked, Web Security Manager will accept SNMP queries on the first of the IP addresses to which management is bound.

Public community

Input field

Public community password.

The read-only community password.

Valid input

Any string

Input example

wdbhhaiedb

Default value

public

System location

Input field

Information about the system.

Valid input

Any string

Input example

Facility 1, Server room 1

Default value

none

Listening on

Read only

If SNMP is enabled will display the IP address the SNMP daemon is listening on.

Admin contact

Update notifications, attack alerts and system errors can be sent by email to the admin contact email address.

Contact

Input field

Email address of the administrative contact.

All alert emails and notifications are sent to this address.

You need to define an SMTP server before any emails are sent.

Valid input

Email address

Input example

admin@mydomain.com

Default value

admin@mydomain.com

Sender domain

Input field

The email address domain.

If not configured it will be extracted from the contact email.

Valid input

a valid domain

Input example

mydomain.com

Default value

extracted from contact

Email system alerts

Critical events or conditions are logged both locally and to external syslog server (if enabled). However if an external syslog server is not available (or is not monitored) a subset of (potentially) critical alerts can be sent to the designated admin contact email.

Email system error messages to admin contact

Checkbox

Enable or disable sending of error messages altogether.

If checked, selected alert types will be sent.

Disk and memory

Checkbox

If checked, disk and memory related errors at log level ERROR and CRITICAL will be sent.

Cluster interface events

Checkbox

If checked, cluster interface related errors at log level ERROR and CRITICAL will be sent.

The most common cluster interface event is STATE TRANSITION which, when sent by the worker node in a cluster, indicates that the master node is either down (backup > master) or has resumed operation (master > backup).

When the nodes in a cluster are powered on/off or rebooted state transition messages are also logged to the syslog error log and may generate email alerts.

Administrative daemons

Checkbox

If checked, any error at log level ERROR and CRITICAL from administrative daemons will be sent.

Forward HTTP proxy

Configure forward proxy to be used by the update system when connecting to the update server.

Use proxy for outbound HTTP

Checkbox

Enable or disable the configured forward proxy.

Proxy address

Input field

The address of the forward proxy

Valid input

A valid IP address.

Input example

10.10.10.5

Default value

None

Proxy port

Input field

Proxy port number

Valid input

An TCP/IP port number

Input example

8080

Default value

none

Forward proxy authentication required

Checkbox

Enable if forward proxy requires authentication.

Username

Input field

User name used for authenticating to the Proxy.

Valid input

A valid username

Input example

wsm1

Default value

none

password

Input field

Password to authenticate the proxy user.

Backup configuration

This section is used to configure an FTP/SCP server used for automated configuration backup/restore of Web Security Manager configuration.

FTP configuration

FTP server

Input field

FTP hostname or IP address.

Valid input

IP address or fully qualified domain name

Input example

ftp.mydomain.com

Default value

None

FTP port

Input field

FTP server port number

Valid input

An TCP/IP port number

Input example

21

Default value

21

Login

Input field

Username used for login.

FTP account used must be able to store files on the remote FTP server.

Valid input

A valid username

Input example

wsm_backup

Default value

none

Password

Input field

Password used for SCP login.

Valid input

Any string.

A long password is recommended as it do not have to be memorable by humans.

Input example

s984ROf.dds&fdsfs)afa8343287

Default value

none

Remote directory

Input field

Full path to directory on FTP server used for storing Web Security Manager related files.

Valid input

A directory path ending with /

Input example

/ftp/wsm/

Default value

none

SCP configuration

SCP server

Input field

SCP hostname or IP address.

Valid input

IP address or fully qualified domain name

Input example

ftp.mydomain.com

Default value

None

SCP port

Input field

SCP server port number

Valid input

An TCP/IP port number

Input example

21

Default value

21

Login

Input field

Username used for login.

SCP account used must be able to store files on the remote SCP server.

Valid input

A valid username

Input example

wsm_backup

Default value

none

SCP key

Button

Click Download Web Security Manager Public SCP Key to download key used for authentication.

Make sure to add this key to the authorized keys list on the remote server.

Remote directory

Input field

Full path to directory on SCP server used for storing Web Security Manager related files.

Valid input

A directory path ending with /

Input example

/scp/wsm/

Default value

none

Auto-backup

Auto-backup, if enabled, is performed daily at 03:00 AM based on your current timezone settings.

Access logs and configurations can be backed up to an external source. Configurations, which includes certificates and other secrets, can only be backed up if one or both SCP options are selected.

Enable FTP HTTP access logs auto-backup

Checkbox

Enable or disable FTP auto-backup of access logs.

Enable SCP HTTP access logs auto-backup

Checkbox

Enable or disable SCP auto-backup of access logs.

Enable SCP configuration auto-backup

Checkbox

Enable or disable SCP auto-backup of system and proxy (website security profiles) configurations.

Management user password requirements

Manage password requirements, session and login restrictions, and SSL certificate.

Defaults depend on if the WAF instance is locked down to StateRAMP mode.

Minimum length

Input field

Minimum password length in number of characters

Valid input

Number in the interval 6 to 64

Default value

Default: 8

StateRAMP: 12

Letter characters required

Checkbox

Require one or more letter characters, a-z + international.

Default value

Default: On

StateRAMP: On

One or more digits (0-9) required

Checkbox

Require one or more digits.

Default value

Default: Off

StateRAMP: On

Combination of upper and lower case required

Checkbox

Require a combination of uppercase and lowercase characters.

Default value

Default: Off

StateRAMP: On

Non alphanumeric characters required

Checkbox

Require one or more special (non-alphanumeric) characters.

Default value

Default: Off

StateRAMP: On

Data anonymization

Data anonymization ensures that client-related log data is irreversibly obfuscated before being written to disk. This applies to all data, whether it is classified as Personally Identifiable Information (PII) or Protected Health Information (PHI), with specific exceptions.

To protect the feature from accidental disabling, its configuration can be permanently locked.

By complying with GDPR de-identification standards, the anonymization process fulfills some of the strictest global regulations for data protection. This ensures robust compliance and extends to jurisdictions with similar requirements.

The anonymization process is designed to render data completely and irreversibly anonymous. This removes it from the scope of GDPR, as outlined in Recital 26, ensuring that anonymized data is no longer tied to identifiable individuals.

For more information, see Fortra WAF Data Anonymization.

Enable Data Anonymization

Checkbox

Check to enable data anonymization.

When enabled, log data will be irreversibly obfuscated before being written to disk.

Source IP Masking

Drop-down list

Source IPs are anonymized by applying a netmask.

Options

Off – No source IP anonymization

/24 – Source IPs are reduced using a class C netmask – 10.11.12.13 becomes 10.11.12.0

/16 –Source IPs are reduced using a class B netmask – 10.11.12.13 becomes 10.11.0.0

/8 –Source IPs are reduced using a class A netmask – 10.11.12.13 becomes 10.0.0.0

Exceptions

Input fields

By default, all input elements that contain information specific to the client request are anonymized, regardless of whether information is confidential or not.

To preserve the semantic structure of the request and not sacrifice exploit or attack-related information, header and input parameter names, URL path, and violation specific strings are exempt from anonymization (see Fortra WAF Data Anonymization and Obfuscation method for more information).

If additional named request elements need to be exempt from anonymization, add them as exceptions in the Exceptions table.

Options

Item – Name of the input element

Example: User-Agent

Type – Type of input element

Example: Header

Log Data Export

Checkbox

Allow unredacted log data export.

When enabled, log data will be exported (e.g., S3 log exports) in its original form and prior to anonymization.

External authentication

Fortra WAF supports Single Sign-On (SSO) and delegated authentication for the local WAF user interface by integrating with an external OAuth 2.0 provider. Authentication is delegated to the external identity system, but users must also exist in the WAF instance’s local user database with the same user ID to ensure proper authorization.

Configuration

Client ID

Input field

A unique identifier issued by the OAuth2 provider when the WAF is registered as a client application.

Used to identify the WAF during the authentication process.

Client Secret

Input field

A confidential key provided by the OAuth2 provider.

Acts like a password for the WAF to authenticate itself to the provider.

Redirect URI

Input fields

The callback URL where the OAuth2 provider sends the authorization code after the user logs in.

Must match the URI registered with the provider

Authorization Server

Input field

The endpoint URL of the OAuth2 provider responsible for issuing tokens and handling authorization requests.

Typical integration workflow

  • Register the WAF as an application with your identity provider (e.g., Azure AD, Okta).
  • Obtain the Client ID and Client Secret.
  • Configure the Redirect URI to point back to the WAF.
  • Enter the Authorization Server URL (often something like https://login.microsoftonline.com/{tenant}/oauth2/v2.0/authorize).
  • Create required corresponding user IDs in the WAF UI (System > Users)

Anti-malware scanning and integrity checking

The anti-malware and integrity checking controls enable regular scanning of the WAF instances for the presence of malware or unauthorized changes to the system or supporting software configuration.

The controls are required for StateRAMP requirements compliance.

Anti-malware scanning

The anti-malware scanning control helps satisfy NIST 800-53 SI-3 requirements by implementing malicious code protection at system entry and exit points through periodic scans of the WAF instances’ file system.

  • WAF Manager and workers file systems are scanned every 24 hours
  • Malware definitions are updated prior to each scan
  • Malware detection alerts are escalated to the Fortra SOC immediately after scan completion when malicious code is detected

To fully meet the requirements of NIST 800-53 SI-3, file upload scanning must also be enabled in Policy > Protocol restrictions > File uploads allowed which in turn requires the Advanced Signatures engine to be enabled in Policy > Website global policy > Attack signatures usage.

Integrity checking

The integrity checking control helps satisfy the NIST 800-53 SI-7 requirements by running integrity verification tools to detect unauthorized changes to the system configuration as specified in the Oracle Linux 8 Security Technical Implementation Guide – MAC-2 Sensitive (as defined by the US Department of Defense).

  • Integrity scans run every 24 hours
  • Baseline is updated for every authorized change
  • Unauthorized changes are escalated to the Fortra SOC immediately after scan completion

StateRAMP Lockdown configuration

StateRAMP Lockdown ensures that the Fortra WAF managed service operates in full alignment with StateRAMP security requirements for environments handling state, local, and education (SLED) government data. This mode applies stricter configuration controls, enhanced monitoring, and compliance enforcement based on NIST SP 80053 Rev. 5 standards, including:

  • Malicious Code Protection (SI3) – Real-time and periodic scanning, signature updates, and alerting.
    • Configured in System > Configuration > Anti-malware scanning and integrity checking.
  • Integrity Verification (SI7) – Automated checks for unauthorised changes, runtime page integrity, and cryptographic protections.
    • Configured in System > Configuration > Anti-malware scanning and integrity checking.
  • DNS Security
    • DNS over TLS (DoT) and DNSSEC to protect DNS queries and responses (SC20, SC21, SC22).
    • Configured in System > Configuration > Anti-malware scanning and integrity checking > Domain Name System (DNS).
  • Multi-Factor Authentication (MFA)
    • Mandatory MFA for all user authentication to the WAF interface (IA2(1), IA2(2)).
    • Configured in System > Users.
  • FIPS 140-2 Validated Mode
    • Operation in cryptographic modules validated to FIPS 140-2 standards for encryption and key management (SC12, SC13, SC28).
    • Configured in System > Configuration > FIPS 140-2 validated mode.

Lockdown mode guarantees that all WAF policies, logging, and integrated services meet or exceed StateRAMP authorization requirements, providing a secure and auditable environment for regulated data.

Except for DNS Security, the WAF cannot be locked down to StateRAMP until all required configurations are complete.

Exception option: NIST 800-53 SC-21 DNS resolution

If it is not possible to require DNSSEC for a specific WAF deployment, a justified exception can be made for this requirement.

In some deployment configurations, such as AWS autoscaling, requiring DNSSEC may be unenforceable (as DHCP provides the DNS server) or prevent the WAF deployment from working correctly since resolving IP domain names that are internal to the VPC does not support DNSSEC.

Furthermore, when DNSSEC is required, name servers that do not support DNSSEC cannot be configured. However, unsigned name server responses are still accepted because the WAF may need to resolve domain names for which the authoritative DNS server does not support DNSSEC.

System updates configuration

This configuration controls the timing and scheduling of operating system and supporting software updates for the WAF instance.

Delay

  • Function – Specifies the interval between update availability and installation.
  • Behavior
    • No delay > Updates install immediately when available.
    • Configured delay (in days) > Updates are deferred for the defined duration before installation begins.
  • Use Case – Delay can be applied to observe stability of updates before deployment.

Restrict Update Window

  • Function – Enables time-based constraints for update execution.
  • Configuration Parameters
    • Restrict update window checkbox activates scheduling logic.
    • Per-day configuration table:
      • Enable – Boolean flag for each day (Sunday–Saturday).
      • Start Time / End Time – Defines permissible update execution window for the selected day.
  • Behavior – Updates execute only within defined windows after the delay period expires. If no windows are configured, updates occur immediately after delay completion.
  • Execution Logic
    1. Update becomes available.
    2. Delay timer starts (if configured).
    3. After delay expires:
      1. If update windows are defined, installation occurs during next valid window.
      2. If no windows are defined, installation occurs immediately.

Metrics configuration

Fortra WAF can publish host-level CPU, memory, and disk utilisation metrics to Amazon CloudWatch. These metrics enable customers to monitor resource consumption and configure alarms or dashboards for auto-scaling environments.

  • Namespace
    • AlertLogic/System
  • Metrics Exported:
    • CPU Utilization (%)
    • Memory Utilization (%)
    • Disk Utilization (%)

Metrics include standard CloudWatch dimensions, such as InstanceId, and, where applicable, AutoScalingGroupName.

Management GUI login restrictions

Manage session timeout and how failed login attempts are handled.

Defaults depend on if the WAF instance is locked down to StateRAMP mode.

Idle timeout

Input field

Number of seconds the management GUI can be idle before the user is logged out.

Valid input

timeout in seconds 20 to 86400.

Input example

900 - 15 minutes

Default value

Default: 600

StateRAMP: 600

Failed login delay

Input field

Number of seconds to wait after a failed login attempt before a new attempt can be made.

Valid input

timeout in seconds 0 to 60.

Default value

Default: 3

StateRAMP: 5

Failed logins limit

Input field

Number of failed login attempts allowed before the failed login action is taken.

Valid input

Number of attempts 1 to 100.

Default value

Default: 5

StateRAMP: 3

Failed logins action

Drop-down list

What to do if a user exceeds the failed attempted login limit.

Options:

None – No action

Lockout – The user account is locked for the configured duration. Once the duration has passed, the user account is unlocked and the user can log in.

Suspend – The user account is suspended and cannot be used until the account status has been set to OK by an administrator.

Suspended - The user account status can be set in System: Users.

Default value

Default: None

StateRAMP: Lockout

Lockout duration
Input field

Duration of account lockout after failed login attempts limit is exceeded

Valid input

Number of seconds

Default value

Default: 1800

StateRAMP: 1800

Notify user on lockout and suspend

Checkbox

If enabled, user will receive an error message in the login page if the account has been locked or suspended.

Default: On

Suspend inactive accounts

Checkbox

Enable suspending of accounts that have not been active for a specified duration.

Default: Off

Account inactivity threshold

Input field

Number of days a user account can be inactive before it is automatically suspended.

Valid input

Duration in days 1 to 1000.

Default value

90

Management GUI certificate

Management GUI SSL certificates can either be self signed or imported certificates.

In the SSL certificate section the current SSL certificate in use is displayed. To upload a new certificate click the Manage GUI certificates button.

Generate self-signed SSL certificate

To generate a self signed certificate, enter the certificate information in the input fields.

Click Save settings in the lower button pane.

Importing the PKCS12 format

If the certificate is in the PKCS12 format follow the guidelines below:

  1. Enter the path to the certificate file in the PKCS12 file input field.

  2. Enter Passphrase in the Passphrase input field.

  3. Click Save settings in the lower button pane.

If Validate certificate chain is enabled Web Security Manager will validate and order the chain certificates.

Importing the PEM format

If the certificate is in the PEM format follow the guidelines below:

  1. Open the .PEM file in a text-editor. Copy the public certificate section of the certificate.

    The public key/certificate is the section of the certificate file between (and including) the certificate start and end tags. Example:

    -----BEGIN CERTIFICATE-----
     Certificate characters
    -----END CERTIFICATE----- 
  2. Select Import SSL certificate In the Web Security Manager management interface

    Paste the SSL public key/certificate into the SSL-certificate field.

  3. Now copy the (SSL) private key section of the certificate. The (SSL) private key is the section of the certificate file between (and including) the private key start and end tags. Example:

    -----BEGIN RSA PRIVATE KEY-----
     Private key characters 
    -----END RSA PRIVATE KEY-----
  4. Enter the passphrase for the private key in the passphrase field (if the original private key was encrypted).

  5. If a certificate authority chain is provided with your certificate enter the entire list of certificates (more than one certificate may be provided) in the SSL authority certificate(s) chain field

If Validate certificate chain is enabled WAF will validate and order the chain certificates.

FIPS 140-2 validated mode

WAF provides the option for the appliance in the customer environment to be locked down to only run the OpenSSL FIPS Object Module in FIPS 140-2 validated mode (FIPS 140-2 certificate #4215).

The lockdown to FIPS 140-2 mode, including validation of the integrity of the FIPS validated crypto modules, is automated, irreversible, and locks down the operating system (Oracle Linux 8) to run in FIPS 140-2 validated mode as originally specified in the OS provider’s FIPS 140-2 certificate.

When the option is selected, the applicable package and libraries are converted to FIPS mode, library pre-linking is disabled, and the WAF appliance reboots. After the appliance has rebooted, all communication occurs using only the FIPS-validated algorithms and the appliance will only accept and use FIPS validated encryption for all inbound and outbound communication to and from all services on the appliance. This includes the WAF HTTP proxy service, the appliance’s HTTPS web based UI, and SSH services used to remotely access the underlying appliance.

The FIPS 1402 validation certificate number for the Oracle Linux 8 OpenSSL Cryptographic Module is:

Certificate #4215

  • Module Name - Oracle Linux 8 OpenSSL Cryptographic Module
  • Standard - FIPS 1402
  • Validation Level - Level 1
  • Status - Active (sunset date: 21 September 2026)
  • Tested Configuration - Oracle Linux 8.4 (64-bit) on multiple Oracle Server platforms
  • Reference - NIST CMVP Certificate #4215

Validation of FIPS mode

When the WSM appliance is using only FIPS-validated encryption modules, the WSM User Interface running on the appliance displays the label FIPS mode. The FIPS mode label reflects the value of

/proc/sys/crypto/fips_enabled 
Which is computed at startup when the system performs the self tests as required in the FIPS 140-2 certificate Security Policy.

If the self test validation at startup fails the system and crypto modules are not running as required for FIPS validated mode and the FIPS mode label is not displayed in the appliance UI.

Enabling FIPS 140-2 validated mode

When enabling FIPS mode:

  • The appliance is converted and locked down irreversibly to run in FIPS mode.
  • Depending on the disk size the conversion process will take between 2-10 minutes.
  • When the conversion process is finished the appliance will reboot.
  • During the process proxy services will be available and website availability will not be affected until the appliance reboots.

To enable FIPS 140-2 validated mode

  1. Select Enable FIPS mode
  2. Click Convert appliance into FIPS mode. The system will now display a confirmation dialog that outlines the conversion process.
  3. Confirm that the appliance is irreversibly converted to FIPS mode. The conversion process begins.
  4. Log out of the UI and log in again to have the FIPS mode validation label displayed.

    The FIPS mode validation flag that is displayed in the appliance user interface is stored in the currently logged in session in the UI layer so to have the mode validation label displayed immediately after conversion is necessary to log in again to read the setting from /proc/sys/crypto/fips_enabled.

    In Amazon Web Services Auto-Scaling deployments, the FIPS mode is embedded in the AMI that the auto-scaling stack is built from. Consequently, the user interface option to convert the appliance to FIPS validated mode is not available. The configuration of FIPS validated mode and self-test at startup is to provide validation, and is no different from non-auto scaling WSM deployments.