What is a WAF?The full name of WAF is (Web Application Firewall), which is referred to as WAF. An internationally recognized statement is that a Web application firewall is a product that specifically provides protection for Web applications by executing a series of security policies for HTTP/HTTPS. Common deployment methods of WAF:Common WAF deployment methods: WAF is generally deployed before the Web server to protect Web applications. So what can a WAF do?
From the definition, we can see that the purpose of application delivery is to ensure the reliability, availability and security of key business of enterprises. Application delivery should be the same as many technologies, such as WAN acceleration, load balancing, Web application firewall... There are different products and focuses for different application needs. What can’t a WAF do?
The difference between WAF and traditional security devices:Features of traditional safety equipment:
WAF features: WAF is a professional application layer security protection product.
Main functions of WAF:
Major WAF manufacturers:
The development history of WAFThe development of WAF has mainly gone through IPS architecture, reverse proxy, transparent proxy and flow mode. Features of IPS architecture:Advantages:
Disadvantages:
Reverse proxy features:Advantages:
Disadvantages:
Transparent proxy features:Advantages:
Disadvantages:
Streaming mode features:Advantages:
Disadvantages:
WAF Key TechnologiesWAF's transparent proxy technology principle:Figure: WAF transparent proxy technology principle Transparent proxy technology is based on TCP connection, the proxy technology of the application layer of the network protocol stack, which realizes the establishment of two-way independent TCP connection with the client and the server, and isolates the direct TCP connection establishment between the client and the server. The communication process is as follows: Figure: WAF communication process WAF mainly changes the following data packet content items:
Web application security protection strategy:Regular expression matching method based on WEB attack feature library; strategy rules are organized into rule linked lists, and deep inspection of request headers, request submission content, response headers, response content bodies, etc. are performed one by one for matching inspection. The following attacks can be prevented:
Web application security audit:WAF can audit all user access behaviors and uncover potential threats through in-depth analysis of access records. It can also help track down requests that are missed by attack protection. Anti-CC:The principle of CC attack is that the attacker controls certain hosts to continuously send a large number of data packets to the other server, causing the server resources to be exhausted until it crashes. CC is mainly used to consume server resources. Everyone has this experience: when a web page is visited by a large number of people, it takes a long time to open the web page. CC simulates multiple users (the number of threads is the number of users) to continuously access pages that require a large amount of data operations (that is, a large amount of CPU time), resulting in a waste of server resources. The CPU is at 100% for a long time, and there are always endless connections until the network is congested and normal access is terminated. Principles of preventing CC attacks:
Web delivery:"Application delivery" actually refers to Application Delivery Networking (ADN), which uses corresponding network optimization/acceleration equipment to ensure that users' business applications can be delivered to internal employees and external service groups quickly, securely and reliably. From the definition, we can see that the purpose of application delivery is to ensure the reliability, availability and security of key business of enterprises. Application delivery should be the same as many technologies, such as WAN acceleration, load balancing, Web application firewall... There are different products and focuses for different application needs. WAF can generally deliver applications through:
Multiple deployment modes of WAFWAF generally supports transparent proxy, reverse proxy, bypass monitoring, and bridge mode deployment modes. Transparent proxy serial mode:Figure: WAF deployment scenario - transparent proxy serial mode The transparent proxy deployment mode supports transparent serial deployment. It can be connected in series in the user network to achieve plug-and-play without the user having to change the network equipment and server configuration. It is easy to deploy and can be applied to most user networks. Deployment features:
The transparent proxy serial mode is the most commonly used deployment mode and has good defense effect. Reverse proxy mode:Reverse proxy is divided into two modes, reverse proxy (proxy mode) and reverse proxy (traction mode). Proxy Mode:Figure: WAF deployment scenario - reverse proxy (proxy mode) WAF uses the reverse proxy mode to access the network environment in a bypass manner. It is necessary to change the destination mapping table of the network firewall. The network firewall maps the business port address of the WAF to hide the IP address of the server. That is, in the figure, when the external network visits www.test.com, it will be resolved to 110.1.1.1. On the network firewall FW, the nat-server technology will be used to resolve the external network address 110.1.1.1 to the internal network address 192.168.1.1. 192.168.1.1 is the business port address of WAF. WAF will access the backend server 192.168.1.100 and return the packet to WAF, which then returns it to the user, playing a proxy role and hiding the real web server address. Deployment features:
Traction Mode:Figure: WAF deployment scenario - reverse proxy (traction mode) WAF uses the reverse proxy mode to access the network environment in a bypass manner. It is necessary to perform policy routing PBR on the core switch to direct the traffic from the client to the server to the WAF. The next hop address of the policy routing is the business port address of the WAF. Deployment features:
Bypass monitoring mode:Figure: WAF deployment scenario - bypass monitoring mode Use bypass monitoring mode, mirror the server port on the switch, and copy a copy of the traffic to the WAF. The deployment does not affect online services. In bypass mode, the WAF will only issue an alarm but not block it. Transparent bridge mode:Figure: WAF deployment scenario - transparent bridge mode Transparent bridge mode is truly transparent and will not change any content of the data packet, such as the source port and TCP sequence number. Bridge mode does not track TCP sessions and can support asymmetric routing environments. WAF reliability deployment - HA active-standby mode under transparent proxy:Figure: WAF deployment scenario - HA active-standby mode under transparent proxy In dual-machine HA mode, WAF works in Active and Standby modes, that is, when one WAF is in detection and protection mode, the other is a standby and does not work. When the main WAF fails, or the uplink and downlink connected to the main WAF fail, the standby WAF will negotiate to enter the detection and protection mode.
WAF reliability deployment - HA active-standby mode under reverse proxy:Figure: WAF deployment scenario - HA active-standby mode under reverse proxy WAF negotiates the master-slave relationship through the VRRP protocol under the reverse proxy. Under normal circumstances, only the master works and the backup does not work. When a problem occurs on the WAF master, the backup automatically switches to the master to work. |
>>: Foreign media: Global investment and deployment in 5G will accelerate in 2020
[[418030]] 1. Can you have both high performance ...
The 2021 Mobile World Congress (MWC) Shanghai Exh...
In today's article, I want to talk to you abo...
Just a few days ago, the plenary session of the i...
Before 2014, a lot of people used Google, Faceboo...
In the first half of 2020, affected by the epidem...
[51CTO.com original article] On September 25, at ...
Due to business needs, I came into contact with o...
The tribe has shared news about edgeNAT twice. Th...
2021 is a big year for China's 5G development...
This article is reprinted with permission from AI...
[51CTO.com original article] Recently, Huawei'...
Hello everyone, I am Xiao Fu. Illustrated network...
The final and award ceremony of the 2024 3rd Ruij...
[[431019]] introduction Istio provides ServiceEnt...