What is a Web Application Firewall (WAF)?

แชร์
ฝัง
  • เผยแพร่เมื่อ 8 เม.ย. 2018
  • Traditional network firewalls (Layer 3-4) do a great job preventing outsiders from accessing internal networks. But, these firewalls offer little to no support in the protection of application layer traffic. Today, threat vectors are being introduced at all layers of the network. For example, the Slowloris and HTTP Flood attacks are Layer 7 attacks...a traditional network firewall would never stop these attacks. But, nonetheless, your application would still go down if/when it gets hit by one of these. It's important to defend your network with more than just a traditional Layer 3-4 firewall. That's where a Web Application Firewall (WAF) comes in. In this video, John outlines what a WAF is and why your web application needs one.
    community.f5.com/articles/lig...
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 150

  • @Weaver0x00
    @Weaver0x00 10 หลายเดือนก่อน +9

    I would also add that the reason to have WAFs is it's faster to adjust firewalls than rewrite an application. If your application has a security flaw, adjusting the firewall to "cover" that "weak spot" so to speak is much easier than fundamentally changing the architecture of your app. As humans we strive for perfection, that's why we have secure code standards and such. But the chase for perfection is without end and the app ultimately needs to be deployed, to perform its function, so it's much more productive to design safe apps to the best of your abilities while being efficient and use WAFs as a frontline defense.

  • @gaudia3985
    @gaudia3985 3 ปีที่แล้ว +12

    I like this. Being non-tech, i was grappling with the concept. The visual presentation here and the back-to-basics kind of instruction are exactly what i need. THANK YOU👍

  • @DGonz0-
    @DGonz0- 2 ปีที่แล้ว +2

    can we just take a moment to appreciate the crazy vizual. You're writing on a glass board (or so it appears) while looking at the cam and it's legibal as we see it in the direct your write which should be mirror reflected. It should look backwards... Great job Cam crew, good job John.

    • @devcentral
      @devcentral  2 ปีที่แล้ว +1

      Thanks for the comment and here's the Behind the Scenes for our Lightboards: th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

    • @DGonz0-
      @DGonz0- 2 ปีที่แล้ว +1

      @@devcentral 👌 Awesome!... I thought John was in boxers for a second... 😆🤣

  • @sumitrapyakurel5186
    @sumitrapyakurel5186 3 ปีที่แล้ว +9

    Great explanation!!! Thank you for your effort.

  • @lillysvids3395
    @lillysvids3395 ปีที่แล้ว +1

    Great presenter. very simply to follow and easy to listen to.

    • @devcentral
      @devcentral  ปีที่แล้ว

      Glad you lied it and thanks for the comment!

  • @anujprabhu223
    @anujprabhu223 3 ปีที่แล้ว +2

    Very well explained... thank you!

  • @davidkamaunu1273
    @davidkamaunu1273 3 ปีที่แล้ว +4

    I concur with Trevor you present very well and helps "owning the content"✨👍
    Sometimes network forensics and security can seem like Romulan..

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      glad you enjoyed it!

  • @guillermoyuste2412
    @guillermoyuste2412 4 ปีที่แล้ว +10

    Well explained, thank you!

    • @devcentral
      @devcentral  4 ปีที่แล้ว +1

      glad you enjoyed it!

  • @adityajain1989
    @adityajain1989 3 ปีที่แล้ว +1

    Lovely... Thankyou very much.. Due to your excellent presentation will start my journey to security from today

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      I'm glad you enjoyed the video!

  • @abdullahalnoman9204
    @abdullahalnoman9204 4 ปีที่แล้ว +3

    Amazing explanation!Thanks.

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      glad you enjoyed it!

  • @grom3852
    @grom3852 6 ปีที่แล้ว +2

    This is so amazing! What a great resource :)

    • @devcentral
      @devcentral  6 ปีที่แล้ว

      glad you enjoy the videos!

  • @hessamzahedi5413
    @hessamzahedi5413 2 ปีที่แล้ว +5

    Great explanation! Thank you
    Quick question, in general, can WAFs protect against LDAP injections as well?

    • @devcentral
      @devcentral  2 ปีที่แล้ว +2

      Hi and thanks for the comment!. The primary defense against LDAP injection is proper input validation and a (competent) WAF should be able to do that.

  • @bradandrews777
    @bradandrews777 4 ปีที่แล้ว +12

    I would have liked to see a couple of details about how it works out. Show code/details on how a specific attack is blocked.
    I see the WAF as being valuable to quickly block off things that are learned until the application can be changed. That seems to go against what I see in the field though, since those who use a WAF often lack the commitment to go fix the core problem in the app later. That is surprising on the one hand, but not when leadership tendencies are considered.

  • @syednadeembe
    @syednadeembe 2 ปีที่แล้ว +1

    very simple and to the point video

    • @devcentral
      @devcentral  2 ปีที่แล้ว

      Glad you enjoyed it!

  • @treesus1835
    @treesus1835 3 ปีที่แล้ว +5

    "ack el" that's the first time I have heard ACL pronounced like that :D

  • @tempestboya2783
    @tempestboya2783 3 ปีที่แล้ว +2

    Good content and clear explanation, liked and subscribed, keep them bringing

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      glad you enjoyed it!

  • @saraafshar3910
    @saraafshar3910 2 ปีที่แล้ว +5

    I am happy about finding this awesome tutorial, thanks a lot

    • @devcentral
      @devcentral  2 ปีที่แล้ว

      Glad you enjoyed it!

  • @emanueladrianarias7957
    @emanueladrianarias7957 2 ปีที่แล้ว

    El tema es que los firewalls tradicionales ya no se utilizan y fueron reemplazados por los NGFW que trabajan en la capa de aplicaciones... ¿como compararías un WAF vs NGFW?.. Saludos!

  • @jitrammaharjan2025
    @jitrammaharjan2025 4 ปีที่แล้ว +1

    Great video !!!! Clear explain thank you

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      I'm glad you enjoyed it!

  • @cisoglobalinc
    @cisoglobalinc 4 ปีที่แล้ว +5

    Awesome explanation! Keep up the great work.

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      glad you enjoyed it!

  • @UralaTAO
    @UralaTAO 2 ปีที่แล้ว +2

    You are a great speaker man.

    • @devcentral
      @devcentral  2 ปีที่แล้ว

      Appreciate the comment!

  • @automotivegoodness4676
    @automotivegoodness4676 5 ปีที่แล้ว +3

    This is good, but you compared a legacy firewall to a WAF, but what about a Next-gen firewall?
    Next-Gen firewall does Layer 7/Deep packet inspection, so why would I need a WAF if I had a Next-Gen for example? What does the WAF inspect that the Next-Gen doesn't, especially when both can inspect HTTPs? Thank you!

    • @victorparlindungan5659
      @victorparlindungan5659 5 ปีที่แล้ว

      signatures and constraint. Some NGFW have embeded WAF software, but the differences between that WAF and "the real WAF" is the real WAF can do SSL-offload, and it have much deeper settings on signature (i think that focus on 10 OWASP)

  • @vortical911
    @vortical911 3 ปีที่แล้ว +2

    thank you !! you're a great teacher :)

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      Thanks Trevor...glad you enjoyed the video!

  • @jaylee3941
    @jaylee3941 ปีที่แล้ว

    Great Video, easy to understand. Question, if you only have Web Apps in the cloud, no infrastructure, would deploying a Firewall in front of the WAF be of any use or would this add complexity and new costs?

    • @devcentral
      @devcentral  ปีที่แล้ว +1

      Well, a WAF generally focuses on http(s) (80/443) traffic so there ight be instances where you'd want a Network Firewall (layer 3 - tcp/udp) to protect that traffic. Some WAFs have network security features and much depends on your infrastructure and where the WAF resides within the network. I know that's not a definitive answer but like with many infrastructure questions, it depends. :-)

  • @shcordeiro1
    @shcordeiro1 3 ปีที่แล้ว +1

    Really good explanation. Thanks a lot

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      glad you enjoyed it!

  • @_lost._.zeny_
    @_lost._.zeny_ 2 ปีที่แล้ว +2

    man just started writing mirror alphabets.... he's in different league 🔥

    • @psilvas
      @psilvas 2 ปีที่แล้ว +1

      this is how we do the Lightboard Lessons: th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

    • @_lost._.zeny_
      @_lost._.zeny_ 2 ปีที่แล้ว +1

      @@psilvas damn!!

  • @JavaDeveloperForFun24
    @JavaDeveloperForFun24 3 ปีที่แล้ว +8

    it would be nice if there were subtitles!

    • @bibaq4923
      @bibaq4923 3 ปีที่แล้ว +2

      agree with u!!!

    • @devcentral
      @devcentral  3 ปีที่แล้ว +1

      We'll see what we can do about that and appreciate the comment.

    • @redareda-yb9vu
      @redareda-yb9vu 9 หลายเดือนก่อน

      😂😂😂😂😂😂 ‏‪0:31‬‏

    • @redareda-yb9vu
      @redareda-yb9vu 9 หลายเดือนก่อน

      😂😂😂😂😂😂 ‏‪0:36‬‏

    • @redareda-yb9vu
      @redareda-yb9vu 9 หลายเดือนก่อน

      😂😂😂😂😂😂 ‏‪0:45‬‏ 😅

  • @wtang3123
    @wtang3123 6 ปีที่แล้ว +37

    How is he writing backwards? It's hard to stay focused because it's too cool

    • @devcentral
      @devcentral  6 ปีที่แล้ว +10

      Thanks for the note! You can see how we do these here: th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

    • @grom3852
      @grom3852 6 ปีที่แล้ว +1

      Lol, ya there's some video showing how its all done, but don't watch it cause it's so awesome without! lol ;)

    • @chrishoward1983able
      @chrishoward1983able 5 ปีที่แล้ว

      i agree, i'm in awe....

    • @bekirkatranci
      @bekirkatranci 5 ปีที่แล้ว +3

      I was about to figure it myself then I saw the t-shirt chest label, fooled myself and said "nah, he must be really writing backwards". So, that's backwards, too? If so, nice touch!

    • @tareeko
      @tareeko 4 ปีที่แล้ว +3

      It's even cooler that they printed a flipped logo on his polo shirt.

  • @gauravsingh-ii9jq
    @gauravsingh-ii9jq 3 ปีที่แล้ว +2

    Backward writing understood but did you design the tshirt with mirror images as well?

    • @psilvas
      @psilvas 3 ปีที่แล้ว

      Hi. We had shirts made with the logos reversed. :-)

  • @chris_wall
    @chris_wall ปีที่แล้ว +1

    Thank you very much for this video.

    • @devcentral
      @devcentral  ปีที่แล้ว

      ...and, thank you for the comment! Glad you enjoyed the video!

  • @HD_Heresy
    @HD_Heresy 2 ปีที่แล้ว +2

    Love your videos guys! Would basic WAF theory like this still be relevant in 2022? I know a lot of knowledge in IT Security changes day by day!

    • @devcentral
      @devcentral  2 ปีที่แล้ว +3

      We think so but WAFs are moving more toward WAAP - Web Application & API Protection. So, still protecting websites plus, API calls. Hope that helps!

    • @HD_Heresy
      @HD_Heresy 2 ปีที่แล้ว +2

      Oh WAAP sounds interesting! Look forward to your lightboard lesson on that one day!

  • @NK-iw6rq
    @NK-iw6rq ปีที่แล้ว +2

    Great explanation !

    • @devcentral
      @devcentral  ปีที่แล้ว +1

      Glad you liked it! And, thanks for the comment!

  • @lucisetumbrae
    @lucisetumbrae 3 ปีที่แล้ว +1

    Super video.Thank you.

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      glad you enjoyed it!

  • @tamirzuhair
    @tamirzuhair 5 ปีที่แล้ว +1

    How would you integrate a waf with a typical n/w firewall??
    What would be the typical packet flow in that case between the clients and the web app servers?

    • @devcentral
      @devcentral  5 ปีที่แล้ว

      Here's a good lightboard lesson on the "life of a packet" through the BIG-IP. it doesn't explicitly cover everything you asked, but it can provide additional perspective. and, the answer from Blood Sausage is a good one as well!!
      th-cam.com/video/qCLEw5xIZ7s/w-d-xo.html

    • @SajidKhan-dy2dk
      @SajidKhan-dy2dk 4 ปีที่แล้ว

      Tamir Zuhair

  • @nikunjbhartia2222
    @nikunjbhartia2222 3 ปีที่แล้ว +1

    Isn't this supposed to be handled in the l7 reverse proxy ?

  • @wramarante
    @wramarante 2 ปีที่แล้ว +1

    Hi John. Great video. What about the behavior of a WAF with HTTPS? Does it work properly without SSL inspection or does it need an open traffic? Tnks.

    • @devcentral
      @devcentral  2 ปีที่แล้ว +1

      Generally it does need to terminate and decrypt the traffic to inspect the data. However, if an organization want to send encrypted traffic direct to the server, a WAF can pass that through if configured to do so. Does that answer your question?

    • @wramarante
      @wramarante 2 ปีที่แล้ว +1

      @@devcentral yes, it does. The F5 WAF has built-in stuff to decrypt the traffic before evaluating the data or it requires a separate tool like F5 SSLO?

    • @devcentral
      @devcentral  2 ปีที่แล้ว +1

      @@wramarante The WAF can decrypt. SSL Orchestrator can too depending on your infrastructure.

  • @rupinder2127
    @rupinder2127 4 ปีที่แล้ว +2

    Awesome explanation

  • @fawadkhan8905
    @fawadkhan8905 4 ปีที่แล้ว +3

    thats great, but how can we know over the network before log activity, whether the user is going to to do un-authorize or authorize activity in the web application

    • @devcentral
      @devcentral  4 ปีที่แล้ว +2

      Hi Fawad, thanks for the question. When a user requests a web application, you don't immediately know if they are trying to do something good or bad. This is where the Web Application Firewall comes in and inspects each request and ensures it is a safe request (based on all the signatures of the WAF and the protection capabilities it has), and then only allows the request through if it passes the security checks of the WAF. If the WAF finds something unsafe in the request, then it blocks the request from accessing your web application. It does this for every single request, so even if a user gets logs in properly and then (once they are in) starts to do some bad stuff, the WAF will block as soon as the bad stuff starts happening. I hope this helps...thanks!

    • @fawadkhan8905
      @fawadkhan8905 4 ปีที่แล้ว +1

      F5 DevCentral thank you great insight

  • @f5dan319
    @f5dan319 6 ปีที่แล้ว +1

    Do you have plans to produce a Lightboard for 'Advanced WAF' in the near future?

    • @devcentral
      @devcentral  6 ปีที่แล้ว +1

      yes we do! stay tuned...it's coming out in the next couple of weeks

    • @devcentral
      @devcentral  6 ปีที่แล้ว +2

      Here's the Advanced WAF Lightboard: th-cam.com/video/HBbDKBV4QW0/w-d-xo.html

  • @RM-jo7in
    @RM-jo7in ปีที่แล้ว +1

    Hi, i got two small questions: First how is a WAF setup? Is there a physical instance ahead of the web apps within my network?
    seconly how does the detection work, is it able to work with complex machine learning models or is the detection of for example XSS signature based?
    Other than that great video, thanks :)

    • @aubreyking3685
      @aubreyking3685 ปีที่แล้ว +1

      WAF can be set up in many different configurations. Most common, historically, is to have an appliance in front of applications. The WAF can be a proxy, itself, or scaled horizontally in front of the app being defended. With modern attacks, most customers are shifting to a multi-layered WAF approach, with Distributed Cloud WAAP taking out signature based attacks before a packet even reaches the data center. Inside the data center, AWAF profiles the applications on a per-uri basis, right down to which unicode characters are allowed! It understands what the expected request and response time are for every element on every uri in your app. Some customers also employ NGINX+ w/ Application Protection to proxy in small environments or even to profile East-West inside an application environment that exists underneath the traditional load balancer / WAF or cloud WAF that is northbound in flow.
      Great question! Thanks for watching!

  • @monnombre6547
    @monnombre6547 3 ปีที่แล้ว +1

    awesome explanation!!!

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      Glad you enjoyed it!

  • @rohitmv6712
    @rohitmv6712 2 ปีที่แล้ว

    I hope I will get judgement about this..tnk u very much..

  • @AJCHANNEL
    @AJCHANNEL 4 ปีที่แล้ว +1

    Gud work

  • @soggybottomboys2792
    @soggybottomboys2792 4 ปีที่แล้ว

    Are there hardware WAF’s you can buy of is this something you have to download or program in?

    • @JasonRahm
      @JasonRahm 4 ปีที่แล้ว

      F5's WAF is available in many difference packages, you can reference here: www.f5.com/products/security/advanced-waf.

  • @MrShahanwer
    @MrShahanwer 2 ปีที่แล้ว

    Highness of your writing skills.....lefty smoothly write

  • @saleetrip2476
    @saleetrip2476 4 ปีที่แล้ว +6

    writing backwards?

    • @wilcosec
      @wilcosec 3 ปีที่แล้ว

      camera is facing a mirror

  • @sisitharupasingha17
    @sisitharupasingha17 2 ปีที่แล้ว +1

    Just want to know is this support for web site security , block sql injection and other attacks

    • @devcentral
      @devcentral  2 ปีที่แล้ว

      Yes, a WAF (if properly configured) can mitigate those types of attacks.

    • @sisitharupasingha17
      @sisitharupasingha17 2 ปีที่แล้ว

      @@devcentral can you suggest any service for hostgater cpannel

  • @BilalKhan-rg2wg
    @BilalKhan-rg2wg 4 ปีที่แล้ว +1

    Great...thanks a lot..😊😊

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      glad you enjoyed it!

  • @alicynwonderland6499
    @alicynwonderland6499 3 ปีที่แล้ว +1

    When he's talking about layers 3 and 4, is he referencing the OSI model?

    • @devcentral
      @devcentral  3 ปีที่แล้ว +1

      Yes he is. thanks for the comment!!

    • @alicynwonderland6499
      @alicynwonderland6499 3 ปีที่แล้ว +1

      @@devcentral Thanks for the quick reply!

  • @okuhlephambiliokuhlephambi2287
    @okuhlephambiliokuhlephambi2287 3 ปีที่แล้ว

    Well Explained

  • @rohitmv6712
    @rohitmv6712 2 ปีที่แล้ว

    My certificate is been used by one company and made server so how could u help me regarding this

  • @kayceekelvin
    @kayceekelvin 4 ปีที่แล้ว +1

    Great explanation, but the WAF features you mentioned can also be handled by an NGFW (upto layer 7) as opposed traditional network firewalls (layer3-4). I was hoping you throw a light on the real difference between an NGFW and a WAF.

    • @jayanarayanankodothputhiya9465
      @jayanarayanankodothputhiya9465 4 ปีที่แล้ว +3

      As I understand NGFW is a package comprising of WAF and IPS/IDS capabilities on a traditional firewall. It is a cost effective solution for SME. At the same time they are prone to single point of failure, having all those features in a single box. For large enterprises, they use separate devices to protect their infrastructure, insuring different layers fo security,

  • @desiaclementslewis8318
    @desiaclementslewis8318 2 ปีที่แล้ว +1

    thank you

    • @devcentral
      @devcentral  2 ปีที่แล้ว

      Glad you enjoyed the video!

  • @ateendrakumar5276
    @ateendrakumar5276 3 ปีที่แล้ว +1

    What are you using for writing like this?

    • @psilvas
      @psilvas 3 ปีที่แล้ว

      You can see how we do this: th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

  • @habukproductions6966
    @habukproductions6966 ปีที่แล้ว +1

    Are you left handed??
    Do you write in lateral inverted style??
    Is your T-shirt having an inverted text ??

    • @devcentral
      @devcentral  ปีที่แล้ว +1

      We made a video to explain it all :) th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

    • @habukproductions6966
      @habukproductions6966 ปีที่แล้ว

      Ahh!! The Tshirt has inverted text

  • @011pankajkumar
    @011pankajkumar 3 ปีที่แล้ว

    can WAF inspect Encrypted/HTTPS traffic too ?

    • @psilvas
      @psilvas 3 ปีที่แล้ว

      it can, as long as the SSL terminates on the WAF and is decrypted, it can inspect that traffic.

  • @adityaverma2492
    @adityaverma2492 ปีที่แล้ว +1

    thanks

    • @devcentral
      @devcentral  ปีที่แล้ว

      We appreciate the comment!

  • @markusay
    @markusay 3 ปีที่แล้ว +4

    I like his reversed logo shirt

    • @deathstroke2341
      @deathstroke2341 3 ปีที่แล้ว

      he is writing with his right hand actually

  • @yoshi5113
    @yoshi5113 ปีที่แล้ว +1

    inverted writing technique?

    • @devcentral
      @devcentral  ปีที่แล้ว

      Behind the Scenes: th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

  • @rohitmv6712
    @rohitmv6712 2 ปีที่แล้ว

    Qgm group LLC,is made server using my ISO, finger print,headscan, so what security is given by the government, or security Buro

  • @marcrtaylor
    @marcrtaylor 2 ปีที่แล้ว +1

    Great video - but I have a question. Is he writing backwards? Or is the video just reversed? It's magic!

    • @devcentral
      @devcentral  2 ปีที่แล้ว

      Thanks for the comment! One we get often. ;-) Here's how we produce these: th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

    • @marcrtaylor
      @marcrtaylor 2 ปีที่แล้ว +1

      @@devcentral thanks! I guessed right! Its really effective!

  • @faisalalbalushi9
    @faisalalbalushi9 4 ปีที่แล้ว

    You comparing WAF VS very old firewall !
    You should compared with NG firewalls.

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      Thanks for the comment! It's true that firewalls have come a long way in recent days/years. This video is showing the difference between a WAF and some of the older network firewalls. It's important to have the security functionality discussed in the video, so if a newer firewall can get it done, that's great!

  • @wandts
    @wandts 4 ปีที่แล้ว

    não entendi nada

  • @randomname6133
    @randomname6133 ปีที่แล้ว +1

    Dude is Davinci writing with left hand backwards

    • @devcentral
      @devcentral  ปีที่แล้ว

      thanks for the comment and this is how we produce these: th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

  • @wu2993
    @wu2993 4 ปีที่แล้ว

    i want this chinese vision

  • @yunshanzhu718
    @yunshanzhu718 2 ปีที่แล้ว

    firewall takes care only layer3-4, that is in stone age.

  • @shiloranxxer
    @shiloranxxer ปีที่แล้ว

    FLE HOUSE HAS FOUND ITS NEW HOST.

  • @druidelf3
    @druidelf3 6 ปีที่แล้ว +4

    you are SO cute.

    • @kalkalasch
      @kalkalasch 4 ปีที่แล้ว

      i bet you'd like to flood some of his ports with http requests but i am sure he's employing an intrusion prevention system

  • @kalkalasch
    @kalkalasch 4 ปีที่แล้ว

    Shirt blends it with background and arms appear independent of body. Makes hard to focus.

  • @gshcbgdggshdhgs6677
    @gshcbgdggshdhgs6677 3 ปีที่แล้ว

    Yang milih allah like 800 ya yang milih dajal abaikan saja

  • @ghosttiger84
    @ghosttiger84 2 ปีที่แล้ว

    This video is filled with filler, and technical jargon. I bet 90% of viewers still don't understand what a WAF does.

  • @vidyakrishnan1757
    @vidyakrishnan1757 4 ปีที่แล้ว +2

    Great explanation ! Thank you ...

    • @devcentral
      @devcentral  4 ปีที่แล้ว +1

      glad you enjoyed it!