Skip to content

Commit a074738

Browse files
authored
Merge pull request #113895 from vhorne/ag-waf-faq
Ag waf faq
2 parents 98b4f76 + b8dd947 commit a074738

File tree

4 files changed

+66
-40
lines changed

4 files changed

+66
-40
lines changed

articles/application-gateway/application-gateway-faq.md

Lines changed: 1 addition & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
77
ms.topic: article
8-
ms.date: 04/01/2020
8+
ms.date: 05/05/2020
99
ms.author: victorh
1010
---
1111

@@ -326,42 +326,6 @@ For multiple domain-based (host-based) routing, you can create multisite listene
326326

327327
No, use only alphanumeric characters in your .pfx file password.
328328

329-
## Configuration - web application firewall (WAF)
330-
331-
### Does the WAF SKU offer all the features available in the Standard SKU?
332-
333-
Yes. WAF supports all the features in the Standard SKU.
334-
335-
### How do I monitor WAF?
336-
337-
Monitor WAF through diagnostic logging. For more information, see [Diagnostic logging and metrics for Application Gateway](application-gateway-diagnostics.md).
338-
339-
### Does detection mode block traffic?
340-
341-
No. Detection mode only logs traffic that triggers a WAF rule.
342-
343-
### Can I customize WAF rules?
344-
345-
Yes. For more information, see [Customize WAF rule groups and rules](application-gateway-customize-waf-rules-portal.md).
346-
347-
### What rules are currently available for WAF?
348-
349-
WAF currently supports CRS [2.2.9](../web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md#owasp229), [3.0](../web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md#owasp30), and [3.1](../web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md#owasp31). These rules provide baseline security against most of the top-10 vulnerabilities that Open Web Application Security Project (OWASP) identifies:
350-
351-
* SQL injection protection
352-
* Cross-site scripting protection
353-
* Protection against common web attacks such as command injection, HTTP request smuggling, HTTP response splitting, and remote file inclusion attack
354-
* Protection against HTTP protocol violations
355-
* Protection against HTTP protocol anomalies such as missing host user-agent and accept headers
356-
* Prevention against bots, crawlers, and scanners
357-
* Detection of common application misconfigurations (that is, Apache, IIS, and so on)
358-
359-
For more information, see [OWASP top-10 vulnerabilities](https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013).
360-
361-
### Does WAF support DDoS protection?
362-
363-
Yes. You can enable DDoS protection on the virtual network where the application gateway is deployed. This setting ensures that the Azure DDoS Protection service also protects the application gateway virtual IP (VIP).
364-
365329
## Configuration - ingress controller for AKS
366330

367331
### What is an Ingress Controller?

articles/web-application-firewall/afds/waf-faq.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
2-
title: Azure Web Application Firewall - Frequently Asked Questions
2+
title: Azure Web Application Firewall on Azure Front Door Service - frequently asked questions
33
description: This article provides answers to frequently asked questions about Web Application Firewall on Azure Front Door
44
services: web-application-firewall
55
author: vhorne
66
ms.service: web-application-firewall
77
ms.devlang: na
88
ms.topic: article
9-
ms.date: 09/25/2019
9+
ms.date: 05/05/2020
1010
ms.author: victorh
1111
---
1212

1313
# Frequently asked questions for Azure Web Application Firewall on Azure Front Door Service
1414

15-
This article answers common questions about Azure web application firewall (WAF) features and functionality.
15+
This article answers common questions about Azure Web Application Firewall (WAF) on Azure Front Door Service features and functionality.
1616

1717
## What is Azure WAF?
1818

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
---
2+
title: Azure Web Application Firewall on Application Gateway - frequently asked questions
3+
description: This article provides answers to frequently asked questions about Web Application Firewall on Application Gateway
4+
services: web-application-firewall
5+
author: vhorne
6+
ms.service: web-application-firewall
7+
ms.topic: article
8+
ms.date: 05/05/2020
9+
ms.author: victorh
10+
---
11+
12+
# Frequently asked questions for Azure Web Application Firewall on Application Gateway
13+
14+
This article answers common questions about Azure Web Application Firewall (WAF) on Application Gateway features and functionality.
15+
16+
## What is Azure WAF?
17+
18+
Azure WAF is a web application firewall that helps protect your web applications from common threats such as SQL injection, cross-site scripting, and other web exploits. You can define a WAF policy consisting of a combination of custom and managed rules to control access to your web applications.
19+
20+
An Azure WAF policy can be applied to web applications hosted on Application Gateway or Azure Front Doors.
21+
22+
## What features does the WAF SKU support?
23+
24+
The WAF SKU supports all the features available in the Standard SKU.
25+
26+
## How do I monitor WAF?
27+
28+
Monitor WAF through diagnostic logging. For more information, see [Diagnostic logging and metrics for Application Gateway](../../application-gateway/application-gateway-diagnostics.md).
29+
30+
## Does detection mode block traffic?
31+
32+
No. Detection mode only logs traffic that triggers a WAF rule.
33+
34+
## Can I customize WAF rules?
35+
36+
Yes. For more information, see [Customize WAF rule groups and rules](application-gateway-customize-waf-rules-portal.md).
37+
38+
## What rules are currently available for WAF?
39+
40+
WAF currently supports CRS [2.2.9](application-gateway-crs-rulegroups-rules.md#owasp229), [3.0](application-gateway-crs-rulegroups-rules.md#owasp30), and [3.1](application-gateway-crs-rulegroups-rules.md#owasp31). These rules provide baseline security against most of the top-10 vulnerabilities that Open Web Application Security Project (OWASP) identifies:
41+
42+
* SQL injection protection
43+
* Cross-site scripting protection
44+
* Protection against common web attacks such as command injection, HTTP request smuggling, HTTP response splitting, and remote file inclusion attack
45+
* Protection against HTTP protocol violations
46+
* Protection against HTTP protocol anomalies such as missing host user-agent and accept headers
47+
* Prevention against bots, crawlers, and scanners
48+
* Detection of common application misconfigurations (that is, Apache, IIS, and so on)
49+
50+
For more information, see [OWASP top-10 vulnerabilities](https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013).
51+
52+
## Does WAF support DDoS protection?
53+
54+
Yes. You can enable DDoS protection on the virtual network where the application gateway is deployed. This setting ensures that the Azure DDoS Protection service also protects the application gateway virtual IP (VIP).
55+
56+
57+
## Next steps
58+
59+
- Learn about [Azure Web Application Firewall](../overview.md).
60+
- Learn more about [Azure Front Door](../../frontdoor/front-door-overview.md).

articles/web-application-firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,8 @@
6363
href: ./ag/policy-overview.md
6464
- name: Bot protection overview
6565
href: ./ag/bot-protection-overview.md
66+
- name: FAQ
67+
href: ./ag/application-gateway-waf-faq.md
6668
- name: Front Door
6769
items:
6870
- name: Custom rules

0 commit comments

Comments
 (0)