This article answers common questions about Azure Web Application Firewall (WAF) on Application Gateway features and functionality.
Azure WAF is a web application firewall that helps protect your web applications from common threats such as SQL injection, cross-site scripting, and other web exploits. You can define a WAF policy consisting of a combination of custom and managed rules to control access to your web applications.
An Azure WAF policy can be applied to web applications hosted on Application Gateway or Azure Front Door.
The WAF SKU supports all the features available in the Standard SKU.
Monitor WAF through diagnostic logging. For more information, see Diagnostic logging and metrics for Application Gateway.
No. Detection mode only logs traffic that triggers a WAF rule.
Yes. For more information, see Customize WAF rule groups and rules.
WAF currently supports CRS 3.2, 3.1 and 3.0. These rules provide baseline security against most of the top 10 vulnerabilities that Open Web Application Security Project (OWASP) identifies:
- SQL injection protection
- Cross-site scripting protection
- Protection against common web attacks such as command injection, HTTP request smuggling, HTTP response splitting, and remote file inclusion attack
- Protection against HTTP protocol violations
- Protection against HTTP protocol anomalies such as missing host user-agent and accept headers
- Prevention against bots, crawlers, and scanners
- Detection of common application misconfigurations (that is, Apache, IIS, and so on)
For more information, see OWASP top 10 vulnerabilities.
CRS 2.2.9 is no longer supported for new WAF policies. We recommend you upgrade to the latest CRS version. CRS 2.2.9 can't be used along with CRS 3.2/DRS 2.1 and greater versions.
Application Gateway WAF supports the following content types for managed rules:
- application/json
- application/xml
- application/x-www-form-urlencoded
- multipart/form-data
And for custom rules:
- application/x-www-form-urlencoded
- application/soap+xml, application/xml, text/xml
- application/json
- multipart/form-data
Yes. You can enable DDoS protection on the virtual network where the application gateway is deployed. This setting ensures that the Azure DDoS Protection service also protects the application gateway virtual IP (VIP).
No, WAF doesn't store customer data.
Azure Application Gateway natively supports WebSocket. WebSocket on Azure WAF on Azure Application Gateway doesn't require any extra configuration to work. However, WAF doesn't inspect the WebSocket traffic. After the initial handshake between client and server, the data exchange between client and server can be of any format, for example binary or encrypted. So Azure WAF can't always parse the data, it just acts as a pass-through proxy for the data.
For more information, see Overview of WebSocket support in Application Gateway.
- Learn about Azure Web Application Firewall.
- Learn more about Azure Front Door.