Skip to content

Commit b4958be

Browse files
authored
Merge pull request #2 from vhorne/vic-cdnwaf
Vic changes and additions
2 parents ded87a6 + 044949f commit b4958be

File tree

4 files changed

+64
-51
lines changed

4 files changed

+64
-51
lines changed

articles/web-application-firewall/cdn/cdn-overview.md

Lines changed: 36 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,18 @@ services: web-application-firewall
55
author: vhorne
66
ms.service: web-application-firewall
77
ms.topic: overview
8-
ms.date: 03/09/2020
8+
ms.date: 03/18/2020
99
ms.author: victorh
1010
---
1111

12-
# Azure Web Application Firewall with Azure CDN from Microsoft
12+
# Azure Web Application Firewall on Azure Content Delivery Network
1313

14-
Azure Web Application Firewall (WAF) with CDN provides centralized protection for your web contents. WAF defends your web services against common exploits and vulnerabilities. It keeps your service highly available for your users and helps you meet compliance requirements.
14+
Azure Web Application Firewall (WAF) on Azure Content Delivery Network (CDN) provides centralized protection for your web content. WAF defends your web services against common exploits and vulnerabilities. It keeps your service highly available for your users and helps you meet compliance requirements.
1515

16-
WAF on Azure CDN from Microsoft is a global and centralized solution. It's deployed on Azure network edge locations around the globe. WAF stops malicious attacks close to the attack sources, before they reach your origin. You get global protection at scale without sacrificing performance.
16+
> [!IMPORTANT]
17+
> WAF on Azure CDN is currently in public preview and is provided with a preview service level agreement. Certain features may not be supported or may have constrained capabilities. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for details.
18+
19+
WAF on Azure CDN is a global and centralized solution. It's deployed on Azure network edge locations around the globe. WAF stops malicious attacks close to the attack sources, before they reach your origin. You get global protection at scale without sacrificing performance.
1720

1821
A WAF policy easily links to any CDN endpoint in your subscription. New rules can be deployed within minutes, so you can respond quickly to changing threat patterns.
1922

@@ -23,59 +26,63 @@ A WAF policy easily links to any CDN endpoint in your subscription. New rules ca
2326

2427
You can configure a WAF policy and associate that policy to one or more CDN endpoints for protection. A WAF policy consists of two types of security rules:
2528

26-
- custom rules that are authored by the customer.
29+
- custom rules that you can create.
2730

28-
- managed rule sets that are a collection of Azure-managed pre-configured set of rules.
31+
- managed rule sets that are a collection of Azure managed pre-configured rules.
2932

30-
When both are present, custom rules are processed before processing the rules in a managed rule set. A rule is made of a match condition, a priority, and an action. Action types supported are: ALLOW, BLOCK, LOG, and REDIRECT. You can create a fully customized policy that meets your specific application protection requirements by combining managed and custom rules.
33+
When both are present, custom rules are processed before processing the rules in a managed rule set. A rule is made of a match condition, a priority, and an action. Action types supported are: *ALLOW*, *BLOCK*, *LOG*, and *REDIRECT*. You can create a fully customized policy that meets your specific application protection requirements by combining managed and custom rules.
3134

32-
Rules within a policy are processed in a priority order. Priority is a unique integer that defines the order of rules to process. Smaller integer value denotes a higher priority and those rules are evaluated before rules with a higher integer value. Once a rule is matched, the corresponding action that was defined in the rule is applied to the request. Once such a match is processed, rules with lower priorities aren't processed further.
35+
Rules within a policy are processed in a priority order. Priority is a unique number that defines the order of rules to process. Smaller numbers are a higher priority and those rules are evaluated before rules with a larger value. Once a rule is matched, the corresponding action that was defined in the rule is applied to the request. Once such a match is processed, rules with lower priorities aren't processed further.
3336

3437
A web application hosted on Azure CDN can have only one WAF policy associated with it at a time. However, you can have a CDN endpoint without any WAF policies associated with it. If a WAF policy is present, it's replicated to all of our edge locations to ensure consistent security policies across the world.
3538

3639
## WAF modes
3740

3841
WAF policy can be configured to run in the following two modes:
3942

40-
- **Detection mode:** When run in detection mode, WAF doesn't take any other actions other than monitors and logs the request and its matched WAF rule to WAF logs. You can turn on logging diagnostics for Front Door. When you use the portal, go to the **Diagnostics** section.
43+
- *Detection mode*: When run in detection mode, WAF doesn't take any other actions other than monitors and logs the request and its matched WAF rule to WAF logs. You can turn on logging diagnostics for Front Door. When you use the portal, go to the **Diagnostics** section.
4144

42-
- **Prevention mode:** In prevention mode, WAF takes the specified action if a request matches a rule. If a match is found, no further rules with lower priority are evaluated. Any matched requests are also logged in the WAF logs.
45+
- *Prevention mode*: In prevention mode, WAF takes the specified action if a request matches a rule. If a match is found, no further rules with a lower priority are evaluated. Any matched requests are also logged in the WAF logs.
4346

4447
## WAF actions
4548

46-
WAF customers can choose to run from one of the actions when a request matches a rule's conditions:
49+
You can choose one of the following actions when a request matches a rule's conditions:
4750

48-
- **Allow:** Request passes through the WAF and is forwarded to back-end. No further lower priority rules can block this request.
49-
- **Block:** The request is blocked and WAF sends a response to the client without forwarding the request to the back-end.
50-
- **Log:** Request is logged in the WAF logs and WAF continues evaluating lower priority rules.
51-
- **Redirect:** WAF redirects the request to the specified URI. The URI specified is a policy level setting. Once configured, all requests that match the **Redirect** action will be sent to that URI.
51+
- *Allow*: The request passes through the WAF and is forwarded to back-end. No further lower priority rules can block this request.
52+
- *Block*: The request is blocked and WAF sends a response to the client without forwarding the request to the back-end.
53+
- *Log*: The request is logged in the WAF logs and WAF continues evaluating lower priority rules.
54+
- *Redirect*: WAF redirects the request to the specified URI. The URI specified is a policy level setting. Once configured, all requests that match the *Redirect* action is sent to that URI.
5255

5356
## WAF rules
5457

55-
A WAF policy can consist of two types of security rules - custom rules, authored by the customer and managed rule sets, Azure-managed pre-configured set of rules.
58+
A WAF policy can consist of two types of security rules:
59+
60+
- *custom rules*: rules you create yourself
61+
- *managed rule sets*: Azure managed pre-configured set of rules
62+
63+
### Custom rules
5664

57-
### Custom authored rules
65+
Custom rules can have match rules and rate control rules.
5866

59-
Custom rules may consist of match rules and rate control rules.
60-
You can configure custom match rules as follows:
67+
You can configure the following custom match rules:
6168

62-
- **IP allow list and block list:** You can control access to your web applications based on a list of client IP addresses or IP address ranges. Both IPv4 and IPv6 address types are supported. This list can be configured to either block or allow those requests where the source IP matches an IP in the list.
69+
- *IP allow list and block list*: You can control access to your web applications based on a list of client IP addresses or IP address ranges. Both IPv4 and IPv6 address types are supported. This list can be configured to either block or allow those requests where the source IP matches an IP in the list.
6370

64-
- **Geographic based access control:** You can control access to your web applications based on the country code that's associated with a client's IP address.
71+
- *Geographic based access control*: You can control access to your web applications based on the country code that's associated with a client's IP address.
6572

66-
- **HTTP parameters-based access control:** You can base rules on string matches in HTTP/HTTPS request parameters. For example, query strings, POST args, Request URI, Request Header, and Request Body.
73+
- *HTTP parameters-based access control*: You can base rules on string matches in HTTP/HTTPS request parameters. For example, query strings, POST args, Request URI, Request Header, and Request Body.
6774

68-
- **Request method-based access control:** You based rules on the HTTP request method of the request. For example, GET, PUT, or HEAD.
75+
- *Request method-based access control*: You base rules on the HTTP request method of the request. For example, GET, PUT, or HEAD.
6976

70-
- **Size constraint:** You can base rules on the lengths of specific parts of a request such as query string, Uri, or request body.
77+
- *Size constraint*: You can base rules on the lengths of specific parts of a request such as query string, Uri, or request body.
7178

72-
A rate control rule is to limit abnormal high traffic from any client IP.
79+
A rate control rule limits abnormally high traffic from any client IP address.
7380

74-
- **Rate limiting rules:** You may configure a threshold on the number of web requests allowed from a client IP during a one-minute duration. This rule is distinct from an IP list-based allow/block custom rule that either allows all or blocks all request from a client IP. Rate limits can be combined with additional match conditions such as HTTP(S) parameter matches for granular rate control.
81+
- *Rate limiting rules*: You can configure a threshold on the number of web requests allowed from a client IP address during a one-minute duration. This rule is distinct from an IP list-based allow/block custom rule that either allows all or blocks all request from a client IP address. Rate limits can be combined with additional match conditions such as HTTP(S) parameter matches for granular rate control.
7582

7683
### Azure-managed rule sets
7784

78-
Azure-managed rule sets provide an easy way to deploy protection against a common set of security threats. Since such rulesets are managed by Azure, the rules are updated as needed to protect against new attack signatures. Azure-managed Default Rule Set includes rules against the following threat categories:
85+
Azure-managed rule sets provide an easy way to deploy protection against a common set of security threats. Since these rulesets are managed by Azure, the rules are updated as needed to protect against new attack signatures. The Azure managed Default Rule Set includes rules against the following threat categories:
7986

8087
- Cross-site scripting
8188
- Java attacks
@@ -88,14 +95,10 @@ Azure-managed rule sets provide an easy way to deploy protection against a commo
8895
- Protocol attackers
8996

9097
The version number of the Default Rule Set increments when new attack signatures are added to the rule set.
91-
Default Rule Set is enabled by default in Detection mode in your WAF policies. You can disable or enable individual rules within the Default Rule Set to meet your application requirements. You can also set specific actions (ALLOW/BLOCK/REDIRECT/LOG) per rule. Default action for managed Default RuleSet is **Block".
98+
The Default Rule Set is enabled by default in *Detection* mode in your WAF policies. You can disable or enable individual rules within the Default Rule Set to meet your application requirements. You can also set specific actions (ALLOW/BLOCK/REDIRECT/LOG) per rule. The default action for the managed Default Rule Set is *Block*.
9299

93100
Custom rules are always applied before rules in the Default Rule Set are evaluated. If a request matches a custom rule, the corresponding rule action is applied. The request is either blocked or passed through to the back-end. No other custom rules or the rules in the Default Rule Set are processed. You can also remove the Default Rule Set from your WAF policies.
94101

95-
> [!IMPORTANT]
96-
> WAF with Azure CDN is currently in public preview and is provided with a preview service level agreement. Certain features may not be supported or may have constrained capabilities. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for details.
97-
98-
99102
## Configuration
100103

101104
You can configure and deploy all WAF rule types using the Azure portal, REST APIs, Azure Resource Manager templates, and Azure PowerShell.
@@ -106,4 +109,4 @@ Monitoring for WAF with CDN is integrated with Azure Monitor to track alerts and
106109

107110
## Next steps
108111

109-
- Learn about [Web Application Firewall on Azure Front Door](../afds/afds-overview.md)
112+
- [Tutorial: Create a WAF policy with Azure CDN using the Azure portal](waf-cdn-create-portal.md)

articles/web-application-firewall/cdn/waf-cdn-create-portal.md

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
22
title: 'Tutorial: Create WAF policy for Azure CDN - Azure portal'
3-
description: In this tutorial, you learn how to create a Web Application Firewall (WAF) policy by using the Azure portal.
3+
description: In this tutorial, you learn how to create a Web Application Firewall (WAF) policy on Azure CDN using the Azure portal.
44
author: vhorne
55
ms.service: web-application-firewall
66
services: web-application-firewall
77
ms.topic: tutorial
8-
ms.date: 03/09/2020
8+
ms.date: 03/18/2020
99
ms.author: victorh
1010
---
1111

12-
# Tutorial: Create a Web Application Firewall policy with Azure CDN using the Azure portal
12+
# Tutorial: Create a WAF policy on Azure CDN using the Azure portal
1313

14-
This tutorial show you how to create a basic Azure Web Application Firewall (WAF) policy and apply it to a endpoint at Azure CDN.
14+
This tutorial shows you how to create a basic Azure Web Application Firewall (WAF) policy and apply it to an endpoint on Azure Content Delivery Network (CDN).
1515

1616
In this tutorial, you learn how to:
1717

@@ -22,11 +22,11 @@ In this tutorial, you learn how to:
2222
2323
## Prerequisites
2424

25-
Create a Front Door profile by following the instructions described in [Quickstart: Create a Front Door profile](../../cdn/cdn-create-new-endpoint.md).
25+
Create an Azure CDN profile and endpoint by following the instructions in [Quickstart: Create an Azure CDN profile and endpoint](../../cdn/cdn-create-new-endpoint.md).
2626

2727
## Create a Web Application Firewall policy
2828

29-
First, create a basic WAF policy with managed Default Rule Set (DRS) by using the portal.
29+
First, create a basic WAF policy with a managed Default Rule Set (DRS) using the portal.
3030

3131
1. On the top left-hand side of the screen, select **Create a resource**>search for **WAF**>select **Web application firewall** > select **Create**.
3232
2. In the **Basics** tab of the **Create a WAF policy** page, enter or select the following information, accept the defaults for the remaining settings, and then select **Review + create**:
@@ -48,37 +48,38 @@ First, create a basic WAF policy with managed Default Rule Set (DRS) by using th
4848
| Endpoint | Select the name of your endpoint, then select **Add**.|
4949

5050
> [!NOTE]
51-
> If the endpoint is associated to a WAF policy, it is shown as grayed out. You must first remove the Endpoint from the associated policy, and then re-associate the endpoint to a new WAF policy.
51+
> If the endpoint is associated with a WAF policy, it is shown grayed out. You must first remove the Endpoint from the associated policy, and then re-associate the endpoint to a new WAF policy.
5252
1. Select **Review + create**, then select **Create**.
5353

5454
## Configure Web Application Firewall policy (optional)
5555

5656
### Change mode
5757

58-
When you create a WAF policy, by the default WAF policy is in **Detection** mode. In **Detection** mode, WAF does not block any requests, instead, requests matching the WAF rules are logged at WAF logs.
59-
To see WAF in action, you can change the mode settings from **Detection** to **Prevention**. In **Prevention** mode, requests that match rules that are defined in Default Rule Set (DRS) are blocked and logged at WAF logs.
58+
By default WAF policy is in *Detection* mode when you create a WAF policy. In *Detection* mode, WAF doesn't block any requests. Instead, requests matching the WAF rules are logged at WAF logs.
59+
60+
To see WAF in action, you can change the mode settings from *Detection* to *Prevention*. In *Prevention* mode, requests that match rules that are defined in Default Rule Set (DRS) are blocked and logged at WAF logs.
6061

6162
![Change WAF policy mode](../media/waf-cdn-create-portal/policy.png)
6263

6364
### Custom rules
6465

65-
You can create a custom rule by selecting **Add custom rule** under the **Custom rules** section. This launches the custom rule configuration page. There are two types of custom rules, **match rule** and **rate limit** rule.
66-
Below is an example of configuring a custom match rule to block a request if the query string contains **blockme**.
66+
To create a custom rule, select **Add custom rule** under the **Custom rules** section. This opens the custom rule configuration page. There are two types of custom rules: **match rule** and **rate limit** rule.
67+
68+
The following screenshot shows a custom match rule to block a request if the query string contains the value **blockme**.
6769

6870
![Change WAF policy mode](../media/waf-cdn-create-portal/custommatch.png)
6971

70-
Rate limit rule requires two additional fields: Rate limit duration and threshold as shown in below example:
72+
Rate limit rules require two additional fields: **Rate limit duration** and **Rate limit threshold (requests)** as shown in the following example:
7173

7274
![Change WAF policy mode](../media/waf-cdn-create-portal/customrate.png)
7375

7476
### Default Rule Set (DRS)
7577

76-
Azure-managed Default Rule Set is enabled by default. To disable an individual rule within a rule group, expand the rules within that rule group, select the **check box** in front of the rule number, and select **Disable** on the tab above. To change actions types for individual rules within the rule set, select the check box in front of the rule number, and then select the **Change action** tab above.
78+
The Azure managed Default Rule Set is enabled by default. To disable an individual rule within a rule group, expand the rules within that rule group, select the check box in front of the rule number, and select **Disable** on the tab above. To change actions types for individual rules within the rule set, select the check box in front of the rule number, and then select the **Change action** tab above.
7779

7880
![Change WAF Rule Set](../media/waf-cdn-create-portal/managed2.png)
7981

8082
## Next steps
8183

8284
> [!div class="nextstepaction"]
8385
> [Learn about Azure Web Application Firewall](../overview.md)
84-
> [Learn more about Azure Front Door](../../frontdoor/front-door-overview.md)

0 commit comments

Comments
 (0)