Web Application Firewall (WAF) : Feature Description

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

Web Application

Firewall (WAF)
Feature Description

VERSION: 8.0
UPDATED: OCTOBER 2016
Web Application Firewall (WAF)

Copyright Notices
Copyright © 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP
Technologies logo are registered trademarks of KEMP Technologies, Inc..
KEMP Technologies, Inc. reserves all ownership rights for the LoadMaster product line including software
and documentation. The use of the LoadMaster Exchange appliance is subject to the license agreement.
Information in this guide may be modified at any time without prior notice.
Microsoft Windows is a registered trademarks of Microsoft Corporation in the United States and other
countries. All other trademarks and service marks are the property of their respective owners.
Limitations: This document and all of its contents are provided as-is. KEMP Technologies has made efforts
to ensure that the information presented herein are correct, but makes no warranty, express or implied,
about the accuracy of this information. If any material errors or inaccuracies should occur in this document,
KEMP Technologies will, if feasible, furnish appropriate correctional notices which Users will accept as the
sole and exclusive remedy at law or in equity. Users of the information in this document acknowledge that
KEMP Technologies cannot be held liable for any loss, injury or damage of any kind, present or prospective,
including without limitation any direct, special, incidental or consequential damages (including without
limitation lost profits and loss of damage to goodwill) whether suffered by recipient or third party or from
any action or inaction whether or not negligent, in the compiling or in delivering or communicating or
publishing this document.
Any Internet Protocol (IP) addresses, phone numbers or other data that may resemble actual contact
information used in this document are not intended to be actual addresses, phone numbers or contact
information. Any examples, command display output, network topology diagrams, and other figures
included in this document are shown for illustrative purposes only. Any use of actual addressing or contact
information in illustrative content is unintentional and coincidental.
Portions of this software are; copyright (c) 2004-2006 Frank Denis. All rights reserved; copyright (c) 2002
Michael Shalayeff. All rights reserved; copyright (c) 2003 Ryan McBride. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE ABOVE COPYRIGHT HOLDERS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE ABOVE COPYRIGHT
HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
The views and conclusions contained in the software and documentation are those of the authors and
should not be interpreted as representing official policies, either expressed or implied, of the above
copyright holders..
Portions of the LoadMaster software are copyright (C) 1989, 1991 Free Software Foundation, Inc. -51
Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA- and KEMP Technologies Inc. is in full compliance
of the GNU license requirements, Version 2, June 1991. Everyone is permitted to copy and distribute
verbatim copies of this license document, but changing it is not allowed.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 2


Web Application Firewall (WAF)

Portions of this software are Copyright (C) 1988, Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice
and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and
other materials related to such distribution and use acknowledge that the software was developed by the
University of California, Berkeley. The name of the University may not be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
Portions of this software are Copyright (C) 1998, Massachusetts Institute of Technology
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated
documentation files (the "Software"), to deal in the Software without restriction, including without
limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the
Software, and to permit persons to whom the Software is furnished to do so, subject to the following
conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions
of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
Portions of this software are Copyright (C) 1995-2004, Jean-loup Gailly and Mark Adler
This software is provided 'as-is', without any express or implied warranty. In no event will the authors be
held liable for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial applications,
and to alter it and redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original
software. If you use this software in a product, an acknowledgment in the product documentation would
be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the
original software.
3. This notice may not be removed or altered from any source distribution.
Portions of this software are Copyright (C) 2003, Internet Systems Consortium
Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is
hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING
ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE
USE OR PERFORMANCE OF THIS SOFTWARE.
Used, under license, U.S. Patent Nos. 6,473,802, 6,374,300, 8,392,563, 8,103,770, 7,831,712, 7,606,912, 7,346,695, 7,287,084 and
6,970,933.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 3


Web Application Firewall (WAF)

Table of Contents
1 Introduction .................................................................................................................................... 5
1.1 Document Purpose ................................................................................................................. 5
1.2 Intended Audience .................................................................................................................. 5
2 Configuring WAF ............................................................................................................................. 6
2.1 Resource Considerations ........................................................................................................ 6
2.2 Balancing WAF Resource Utilization with High Load Applications ......................................... 6
2.3 WAF Rule Management .......................................................................................................... 7
2.3.1 Commercial Rules............................................................................................................ 7
2.3.2 Custom Rules................................................................................................................... 9
2.4 Configure WAF Options for a Virtual Service ........................................................................ 10
2.5 Backing Up and Restoring a WAF Configuration ................................................................... 12
2.6 WAF WUI Options ................................................................................................................. 13
2.6.1 WAF Settings in the Main Menu of the LoadMaster WUI ............................................ 13
2.6.2 WAF Options in the Virtual Service Modify Screen ...................................................... 15
2.6.3 WAF Event Log .............................................................................................................. 18
2.6.4 WAF Options in the Extended Log Files Screen ............................................................ 19
2.6.5 Enable WAF Debug Logging .......................................................................................... 20
2.6.6 WAF Statistics................................................................................................................ 21
2.6.7 WAF Misconfigured Virtual Service Status ................................................................... 23
3 Troubleshooting ............................................................................................................................ 24
References ............................................................................................................................................ 25
Document History ................................................................................................................................. 26

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 4


Web Application Firewall (WAF)
Introduction

1 Introduction
The KEMP Web Application Firewall (WAF) enables secure deployment of web applications,
preventing Layer 7 attacks while maintaining core load balancing services, which ensures
comprehensive application delivery and security. WAF functionality directly augments the
LoadMaster’s existing security features to create a layered defence for web applications -
enabling a safe, compliant and productive use of published services.
When WAF is enabled, the WAF engine scans every incoming HTTP packet – running through
each assigned rule individually and deciding what action to take if a rule is matched. The rules
can be run on requests and responses.
WAF can protect against attacks, such as:
 Injection
 Cross-Site Scripting (XSS)
 Unvalidated redirects and forwards
 Missing function-level access control
 Sensisitve data exposure
 Security misconfiguration
 Broken authentication and session management
For a more detailed overview of the WAF feature, refer to the WAF section in the KEMP
LoadMaster, Product Overview.

1.1 Document Purpose


The purpose of this document is to describe the WAF features and provide step-by-step
instructions on how to configure the WAF settings in the KEMP LoadMaster.
For further information and assistance, refer to our KEMP Support site for Support contact
details: http://kemptechnologies.com/load-balancing-support/kemp-support/.

1.2 Intended Audience


This document is intended to be read by anyone who is interested in finding out more about the
KEMP WAF functionality.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 5


Web Application Firewall (WAF)
Configuring WAF

2 Configuring WAF
2.1 Resource Considerations

Utilizing WAF can have a significant performance impact on the


LoadMaster deployment. Please ensure that the appropriate resources are
allocated.

For virtual and bare metal LoadMaster instances, a minimum of 2GB of allocated RAM is
required for operation of WAF. The default memory allocation for Virtual LoadMasters and
LoadMaster Bare Metal instances before LoadMaster Operating System version 7.1-22 is 1 GB of
RAM. If this default allocation has not been changed, modify the memory settings before
attempting to proceed with WAF configuration. If the check box to enable WAF is greyed out, it
could mean that the LoadMaster does not have enough memory to run WAF.

2.2 Balancing WAF Resource Utilization with High Load


Applications
The WAF subsystem uses a significant amount of system resources. When enabling WAF, you
should avoid overconsuming system resources that are needed for load balancing Virtual
Services. When WAF starts to consume resources at a level that impacts overall system
performance, one or more of these symptoms can be observed:

 High CPU utilization


 High memory utilization
 InterProcess Communication (IPC) issues between Layer 7 and WAF processes
 Decreased Virtual Service throughput
 Increased Virtual Service latency
There are essentially two ways of dealing with these issues:

 Disable WAF completely on one or more Virtual Services.


 Tailor the applied rulesets used on each Virtual Service to reduce the rules applied to the
minimum necessary for secure operation.
Best practice for WAF rulesets is to avoid a blanket application of a ruleset, and instead enable
only those rules in the ruleset that are specifically required for your application.
Note that internal processing and communication between WAF and Layer 7 in version 7.2.36 is
enhanced to help mitigate resource exhausting issues through smarter thread and resource
management. Best practice is still to enable a minimum set of rules instead of enabling the
entire ruleset.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 6


Web Application Firewall (WAF)
Configuring WAF

2.3 WAF Rule Management


If you have a WAF license and WAF Support, KEMP provides a number of commercial rules, such
as ip_reputation, which can be set to automatically download and update daily. These
commercial rules are targeted to protect against specific threats to which packaged and custom
applications are vulnerable. The KEMP-provided commercial rules are available when signed up
to a WAF subscription.
These commercial rules are automatically downloaded and installed if WAF is enabled and rules
have not been installed yet. If the automatic download or installation fails, an appropriate error
log is generated. In such cases, the rules can be manually installed and downloaded.
You can also upload other rules, such as the ModSecurity core rule set which contains generic
attack detection rules that provide a base level of protection for any web application.
You can also write and upload your own custom rules, if required.
With the WAF-enabled LoadMaster, you can choose whether to use KEMP-provided rules (which
can be set to automatically download), custom rules that can be uploaded or a combination of
both. The sections below provide details regarding commercial rules and custom rules.

2.3.1 Commercial Rules


The KEMP-provided commercial rules can be set to automatically download and install. They can
also be manually downloaded and installed. The sections below explain how to use each
method.

KEMP-provided commercial rules are only available when you sign up for a
WAF subscription.

2.3.1.1 Automatic Downloading and Updating of Commercial Rules


Follow the steps below to configure automatic download and installation settings for WAF
commercial rules:
In the main menu, select Virtual Services > WAF Settings.

Figure 2-1: WAF Rule Management

To enable the automatic download of updates to WAF commercial rule files, select the
Enable Automated Rule Updates check box.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 7


Web Application Firewall (WAF)
Configuring WAF

The automatic and manual download options are greyed out if WAF
support has expired. If this is the case, contact KEMP to renew your
subscription.

To enable automatic installation of the updated WAF commercial rule files, select the
Enable Automated Installs check box.

By default, the Enable Automated Installs and Manually Install rules


options are greyed out. The rules must be downloaded for the first time
before these options become available.

Select the time (hour of the day) at which to automatically install the commercial rule
updates.

The WAF rules must be assigned to a Virtual Service in order to take effect.
For instructions on how to assign WAF rules to a Virtual Service, refer to
Section 2.4.

2.3.1.2 Manual Downloading and Updating of Commercial Rules


To manually download and install the commercial rule file updates, follow the steps below:
In the main menu, select Virtual Services > WAF Settings.

Figure 2-2: WAF Rule Management

Click Download Now to download the WAF rules now.

A warning message appears if the rules have not been updated in the last 7
days or if they have not been downloaded at all.

After the rules are downloaded, the Show Changes button appears. Click this button to
retrieve a log of changes that have been made to the KEMP Technologies WAF rule set.
Click Install Now to manually install the commercial rule updates.

The WAF rules must be assigned to a Virtual Service in order to take effect.
For instructions on how to assign WAF rules to a Virtual Service, refer to
Section 2.4.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 8


Web Application Firewall (WAF)
Configuring WAF

2.3.2 Custom Rules


Third party rules, such as the ModSecurity core rule set can be uploaded to the LoadMaster. You
can also write your own custom rules which can be uploaded. The WAF Rule Management
screen enables you to upload Custom Rules (.conf) and associated Custom Rule Data (.data or
.txt) files. You can also upload gzip-compressed Tarball files (.tar.gz), which contain multiple rule
and data files.
To upload rule and data files, follow the steps below:
In the main menu, select Virtual Services > WAF Settings.

Figure 2-3: WAF Rule Management

To upload custom rules; in the Installed Rules section, click Choose File.

Individual rules can be uploaded as .conf files. Alternatively, you can load a
package of rules in a .tar.gz file, for example, the ModSecurity core rule set.

Browse to and select the rule file(s) to be uploaded.


Click Add Ruleset.
To upload any additional data files; in the Custom Rule Data section, click Choose File.

The additional files are for the rules’ associated data files. If you uploaded a
Tarball in Step 3, the rules and data files can be packaged together.

Browse to and select the additional data files to be uploaded.


Click Add Data File.
The rules are now available to assign within the Virtual Services modify screen. Refer to the next
section to find out how to configure the Virtual Service to use the installed rules (commercial or
custom).

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 9


Web Application Firewall (WAF)
Configuring WAF

2.3.2.1 Delete/Download a Custom Rule or Data File

Figure 2-4: Custom Rules

Custom rules and data files can be deleted or downloaded by clicking the relevant buttons.

If a rule is assigned to a Virtual Service it will not be available for deletion.

2.4 Configure WAF Options for a Virtual Service


WAF settings can be configured for each individual Virtual Service. Follow the steps below to
configure the WAF options in a Virtual Service. For more information on each of the fields, refer
to Section 2.5.
In the main menu of the LoadMaster WUI, select Virtual Services > View/Modify
Services.
Click Modify on the relevant Virtual Service.
Expand the WAF Options section.

Figure 2-5: WAF Options

By default, WAF is disabled. To enable WAF, select Enabled.

The maximum number of WAF-enabled Virtual Services is the total


RAM/512 MB, for example 8 GB/512 MB = 16 AFP Virtual Services. When
the maximum is reached, no additional Virtual Services can be enabled
with WAF.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 10


Web Application Firewall (WAF)
Configuring WAF

A message is displayed next to the Enabled check box displaying how many
WAF-enabled Virtual Services exist and the maximum number of WAF-
enabled Virtual Services that can exist. If the maximum number of WAF-
enabled Virtual Services is reached, the Enabled check box is greyed out.

Specify the Default Operation type.

The Default Operation is what occurs if no action is specified in the


relevant rule.

Audit Only: This is an audit-only mode – logs are created but requests and
responses are not blocked.

Block Mode: Either requests or responses are blocked based on the


assigned rules.

Specify the Audit mode.

There are three audit modes:

No Audit: No data is logged.

Audit Relevant: Logs data that is of a warning level and higher. This is the
default option for this setting.

Audit All: Logs all data through the Virtual Service.

Selecting the Audit All option produces a large amount of log data. KEMP
does not recommend selecting the Audit All option for normal operation.
However, the Audit All option can be useful when troubleshooting a
specific problem.

Specify whether or not to Inspect HTML POST Request Content.

The Inspect HTML POST Request Content option is disabled by default. If


you enable the Inspect HTML POST Request Content option, two more
check boxes become available that enable you to disable the processing of
JavaScript Object Notation (JSON) and XML requests.

Specify whether or not to Process Responses.

The processing of response data can be CPU and memory intensive.

Specify the Hourly Alert Notification Threshold and click Set Alert Threshold.

This is the number of incidents per hour before sending an alert. Setting
this to 0 disables alerting.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 11


Web Application Firewall (WAF)
Configuring WAF

Assign rulesets by selecting them in the Available Rulesets section.


Individual rules can be enabled/disabled per ruleset by selecting/clearing them in the
box on the right.

If any OWASP rule sets are enabled, owasp_setup is enabled automatically


because it contains settings common to all OWASP rule sets.

Rules can be filtered by entering a filter term in the Rule Filter text box.
Clicking Clear All disables all rules for the selected ruleset.
Clicking Set All enables all rules for the selected ruleset.
Clicking the Reset button disables all rules and rulesets.
When finished enabling/disabling the relevant rulesets and rules, click Apply.

Application-specific and application-generic rules cannot both be assigned


to the same Virtual Service. If you try to do this, an error message (Cannot
assign Application Specific and Application Generic rules simultaneously)
appears to inform you that this is not possible.

2.5 Backing Up and Restoring a WAF Configuration

Figure 2-6: Backup and Restore

A backup of the LoadMaster configuration can be taken by going to System Configuration >
System Administration > Backup/Restore and clicking Create Backup File.
The configuration can be restored from this screen also. Note that the Virtual Service settings
can be restored by selecting VS Configuration and the rules can be restored by selecting
LoadMaster Base Configuration.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 12


Web Application Firewall (WAF)
Configuring WAF

A WAF configuration can only be restored onto a LoadMaster with a WAF


license.

2.6 WAF WUI Options


This section describes the different WAF fields available in the LoadMaster WUI. There are WAF
WUI options in the WAF Settings section of the main menu and in the Virtual Service modify
screen. Refer to the sections below for field descriptions.

2.6.1 WAF Settings in the Main Menu of the LoadMaster WUI


You can get to this screen by selecting Virtual Services > WAF Settings in the main menu of the
LoadMaster WUI.

Figure 2-7: Remote Logging

Logging Format
Select either Native or JSON depending on what format you want the audit logs to appear in.
Enable Remote Logging
This check box enables you to enable or disable remote logging for WAF.Remote URL
Specify the remote server Uniform Resource Locator (URL).
Username
Specify the remote username.
Password
Specify the remote password.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 13


Web Application Firewall (WAF)
Configuring WAF

Figure 2-8: Automated WAF Rule Updates

The automatic and manual download options are greyed out if the WAF
subscription has expired.

Enable Automated Rule Updates


Select this check box to enable the automatic download of the latest WAF rule files. This is done
daily, if enabled.
Last Updated
This section displays the date when the last rules were downloaded. It gives you the option to
attempt to download the rules now. It also displays a warning if rules have not been
downloaded in the last 7 days. The Show Changes button is displayed if the rules have been
downloaded. This button can be clicked to retrieve a log of changes that have been made to the
KEMP Technologies WAF rule set.
Enable Automated Installs
Select this check box to enable the automatic daily install of updated rules at the specified time.
When to Install
Select the hour at which to install the updates every day.
Manually Install rules
This button enables you to manually install rule updates, rather than automatically installing
them. This section also displays when the rules were last installed.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 14


Web Application Firewall (WAF)
Configuring WAF

Figure 2-9: Custom Rules and Custom Rule Data

Custom Rules
This section enables you to upload custom rules and associated data files. Individual rules can be
loaded as .conf files or you can load a package of rules in a gzip-compressed Tarball (.tar.gz) file.
Custom Rule Data
This section enables you to upload data files that are associated to the custom rules.

2.6.2 WAF Options in the Virtual Service Modify Screen


You can get to the Virtual Service WAF Options by selecting Virtual Services > View/Modify
Services in the main menu, clicking Modify on the relevant Virtual Service and expanding the
WAF Options section.

Figure 2-10: Enable WAF

By default, WAF is disabled. To enable WAF, select the Enabled check box.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 15


Web Application Firewall (WAF)
Configuring WAF

Figure 2-11: WAF Options (per Virtual Service)

The WAF feature must be enabled before you can configure these options. Select the Enabled
check box to enable WAF on this Virtual Service.
Default Operation
Specify the Default Operation type:
 Audit Only: This is an audit-only mode – logs are created but requests and responses are
not blocked. It is recommended when first using WAF to enable Audit Only mode for a
period of time, analyse the logs and adjust the rules and settings as needed before
enabling Block Mode – to ensure that no legitimate traffic is blocked.
 Block Mode: Either requests or responses are blocked based on the assigned rules.
Audit mode
Audit logs are produced according to the specifications on the following website:
https://github.com/SpiderLabs/ModSecurity/wiki/ModSecurity-2-Data-Formats
Select what logs to record:

 No Audit: No data is logged.


 Audit Relevant: Logs data which is of a warning level and higher. This is the default
option for this setting.
 Audit All: Logs all data through the Virtual Service.

Selecting the Audit All option produces a large amount of log data. KEMP
does not recommend selecting the Audit All option for normal operation.
However, the Audit All option can be useful when troubleshooting a
specific problem.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 16


Web Application Firewall (WAF)
Configuring WAF

Inspect HTML POST Request Content


Enable this option to also process the data supplied in POST requests.

The Inspect HTML POST Request Content option is disabled by default.


Two additional options (Disable JSON Parser and Disable XML Parser) only
become available if Inspect HTML POST Request Content is enabled.

Disable JSON Parser


Disable processing of JavaScript Object Notation (JSON) requests.
Disable XML Parser
Disable processing of Extensible Markup Language (XML) requests.
Process Responses
Enable this option to verify response data sent from the Real Servers.

This can be CPU and memory intensive so only enable this if necessary.

If a Real Server is gzip encoding, WAF will not check that traffic, even if
Process Responses is enabled.

Hourly Alert Notification Threshold


This is the threshold of incidents per hour before sending an alert email. Setting this to 0 disables
alerting.
Rules
This is where you can assign/un-assign generic, application-specific, application-generic and
custom rules to/from the Virtual Service.

You cannot assign application-specific and application-generic rules to the


same Virtual Service.

Individual rules within each ruleset can be enabled/disabled as required. To enable a ruleset,
select the relevant check box. If you have not enabled/disabled rules in that ruleset previously,
all rules are enabled by default in the right box. If you have previously enabled/disabled rules in
that ruleset, within that Virtual Service – the rules retain their previous settings.
You can enable/disable individual rules as needed by selecting the relevant ruleset on the left
and selecting/clearing the rules on the right.

Some rules or rule sets may have dependencies on other rules. There is no
dependency check in the LoadMaster when rules are disabled - before
disabling any rule, be aware of any rule chains or dependencies.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 17


Web Application Firewall (WAF)
Configuring WAF

When finished making changes, click Apply.


Clicking the Clear All button disables all rules for the selected ruleset.
Clicking the Set All button enables all rules for the selected ruleset.
Text can be entered in the Rule Filter text box to filter the rules to only show rules that contain
the filter text.
Clicking Reset disables all rulesets and rules.

Only assign the rules that are required. All assigned rules will be checked
against, so a large number of assigned rules can lead to high CPU usage.

2.6.3 WAF Event Log

Table 2-1: System Log Files

You can view the WAF Event Log by going to System Configuration > Logging Options > System
Log Files and clicking the relevant View button. This log file contains all WAF alerts and
automatically update to show new events.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 18


Web Application Firewall (WAF)
Configuring WAF

2.6.4 WAF Options in the Extended Log Files Screen

Figure 2-12: Extended Log Files

The Extended Log Files screen provides options for logs relating to the ESP and WAF features.
These logs are persistent and will be available after a LoadMaster reboot. To view all of the
options click the icons.

Figure 2-13: Extended Log Files

In addition to WAF logs, ESP logs are also available on this screen. For more
information, refer to the Edge Security Pack (ESP), Feature Description.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 19


Web Application Firewall (WAF)
Configuring WAF

WAF Audit Logs: recording WAF logs based on what has been selected for the Audit mode drop-
down list (either Audit Relevant or Audit All) in the WAF Options section of the Virtual Service
modify screen.
To view the logs, select the appropriate log file and click the relevant View button.
The number listed in each log entry corresponds to the ID of the Virtual Service. To get the
Virtual Service ID, first ensure that the API interface is enabled (Certificates & Security > Remote
Access > Enable API Interface). Then, in a web browser address bar, enter
https://<LoadMasterIPAddress>/access/listvs. Check the index of the Virtual Service. This is the
number that corresponds to the number on the audit log entry.
One or more archived log files can be viewed by selecting the relevant file(s) from the list of file
names and clicking the View button. You can filter the log files by entering a word(s) or regular
expression in the filter field and clicking the View field.
Clear Extended Logs
All extended logs can be deleted by clicking the Clear button.
Specific log files can be deleted by filtering on a specific date range, selecting one or more
individual log files in the log file list or selecting a specific log type (for example connection,
security or user) in the log file list and clicking the Clear button. Click OK on any warning
messages.
Save Extended Logs
All extended logs can be saved to a file by clicking the Save button.
Specific log files can be saved by filtering on a specific date range, selecting one or more
individual log files in the log file list or selecting a specific log type (for example connection,
security or user) in the log file list and clicking the Save button.

2.6.5 Enable WAF Debug Logging


WAF debug traces can be enabled by clicking the Enable Logging button at System
Configuration > Logging Options > System Log Files.

This generates a lot of log traffic. It also slows down WAF processing. Only
enable this option when requested to do so by KEMP Technical Support.
KEMP does not recommend enabling this option in a production
environment.

The WAF debug logs are never closed and they are rotated if they get too
large. AFP (in general) needs to be disabled and re-enabled (by clearing and
re-selecting the Enabled check box) in all WAF-enabled Virtual Service
settings to re-enable the debug logs. Alternatively, perform a rule update
(in the WAF Settings screen), with rules that are relevant for the Virtual
Service(s).

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 20


Web Application Firewall (WAF)
Configuring WAF

2.6.6 WAF Statistics

2.6.6.1 Home Page

Figure 2-14: WAF Status

The WAF Status section isdisplayed on the WUI home page if at least one Virtual Service has
WAF enabled. The values shown here are as follows:
 The total number of requests handled by the WAF (shows all requests, whether they
were blocked or not). Two requests are recorded for each connection – one incoming
and one outgoing request.
 The total number of events handled by the WAF (therefore requests that were blocked).
 The number of events that have happened in the current hour (since xx.00.00).
 The number of events that have happened since 00.00 am (local time).
 The number of times the event counter has gone over the configured warning threshold
today. For example, if the threshold is set to 10 and there has been 20 events, this
counter will be set to 2. The warning threshold is set on a per-Virtual Service basis by
filling out the Hourly Alert Notification Threshold field in WAF Options in the Virtual
Service modify screen. For further information, refer to Section 2.6.1.

2.6.6.2 Statistics Page

Figure 2-15: WAF Enabled VS Statistics

To get to the WAF statistics page in the LoadMaster WUI, go to Statistics > Real Time Statistics >
WAF. These statistics refresh every 5 to 6 seconds. The following items are displayed on this
screen:
Count: The left-most column displays the total number of WAF-enabled Virtual Services.
Name: The name of the WAF-enabled Virtual Service.
Virtual IP Address: The IP address and port of the Virtual Service.
Protocol: The protocol of the Virtual Service (tcp or udp).
Status: The status of the Virtual Service. For information on each of the possible statuses, refer
to the Web User Interface (WUI), Configuration Guide.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 21


Web Application Firewall (WAF)
Configuring WAF

Total Requests: The total number of requests handled by the WAF (shows all requests, whether
they were blocked or not). Two requests are recorded for each connection – one incoming and
one outgoing request.
Total Events: The total number of events handled by the WAF (therefore, requests that were
blocked).
Events this hour: The number of events that have happened in the current hour (since xx.00.00).
Events Today: The number of events that have happened since 00.00 am (local time).
Events over Limit Today: The number of times the event counter has gone over the configured
warning threshold today. For example, if the threshold is set to 10 and there has been 20 events,
this counter will be set to 2. The warning threshold is set on a per-Virtual Service basis by filling
out the Hourly Alert Notification Threshold field in WAF Options in the Virtual Service modify
screen. For further information, refer to Section 2.6.1.

Figure 2-16: Virtual Service WAF statistics

These WAF statistics can also be seen in the Virtual Service statistics screen (go to Statistics >
Real Time Statistics > Virtual Services and then click the Virtual IP Address link).

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 22


Web Application Firewall (WAF)
Configuring WAF

2.6.7 WAF Misconfigured Virtual Service Status

Figure 2-17: WAF Misconfigured status

On the View/Modify Services screen in the LoadMaster WUI, the Status of each Virtual Service
is displayed. If the WAF for a particular Virtual Service is misconfigured (for example, if there is
an issue with a rule file), the status changes to WAF Misconfigured and turns to red.

If the Virtual Service is in this state, all traffic is blocked.

WAF can be disabled for that Virtual Service to stop the traffic being blocked, if required, while
troubleshooting the problem.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 23


Web Application Firewall (WAF)
Troubleshooting

3 Troubleshooting
All events are logged but there may be a delay in them being available for Administrator viewing.
For further information on the WAF logging options, refer to Sections 2.6.3 and 2.6.5.

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 24


Web Application Firewall (WAF)
References

References
Unless otherwise specified, the following documents can be found at
http://kemptechnologies.com/documentation

Edge Security Pack (ESP), Feature Description

KEMP LoadMaster, Product Overview

Web User Interface (WUI), Configuration Guide

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 25


Web Application Firewall (WAF)
Document History

Document History
Date Change Reason for Change Version Resp.

Jan 2015 Release updates Updates for 7.1-24 release 1.6 LB

Feb 2015 Minor update Enhancement made 1.7 LB

Mar 2015 Minor update Enhancement made 1.8 LB

Apr 2015 Minor update Enhancement made 1.9 LB

Sep 2015 Update screenshots WUI reskin 3.0 KG

Dec 2015 Release updates Updates for 7.1-32 release 4.0 LB

Jan 2016 Minor update Updated Copyright Notices 5.0 LB

Mar 2016 Release updates Updates for 7.1-34 release 6.0 LB

July 2016 Minor updates Enhancements made 7.0 LB

Oct 2016 Minor updates Enhancements made 8.0 LB

Copyright © 2002 - 2016 KEMP Technologies, Inc. All Rights Reserved. 26

You might also like