What is a Web Application Firewall (WAF)?

Поделиться
HTML-код
  • Опубликовано: 1 фев 2025
  • НаукаНаука

Комментарии • 164

  • @Weaver0x00
    @Weaver0x00 Год назад +16

    I would also add that the reason to have WAFs is it's faster to adjust firewalls than rewrite an application. If your application has a security flaw, adjusting the firewall to "cover" that "weak spot" so to speak is much easier than fundamentally changing the architecture of your app. As humans we strive for perfection, that's why we have secure code standards and such. But the chase for perfection is without end and the app ultimately needs to be deployed, to perform its function, so it's much more productive to design safe apps to the best of your abilities while being efficient and use WAFs as a frontline defense.

  • @DGonz0-
    @DGonz0- 2 года назад +3

    can we just take a moment to appreciate the crazy vizual. You're writing on a glass board (or so it appears) while looking at the cam and it's legibal as we see it in the direct your write which should be mirror reflected. It should look backwards... Great job Cam crew, good job John.

    • @devcentral
      @devcentral  2 года назад +2

      Thanks for the comment and here's the Behind the Scenes for our Lightboards: ruclips.net/video/U7E_L4wCPTc/видео.html

    • @DGonz0-
      @DGonz0- 2 года назад +2

      @@devcentral 👌 Awesome!... I thought John was in boxers for a second... 😆🤣

  • @gaudia3985
    @gaudia3985 4 года назад +12

    I like this. Being non-tech, i was grappling with the concept. The visual presentation here and the back-to-basics kind of instruction are exactly what i need. THANK YOU👍

  • @lillysvids3395
    @lillysvids3395 2 года назад +1

    Great presenter. very simply to follow and easy to listen to.

    • @devcentral
      @devcentral  2 года назад

      Glad you lied it and thanks for the comment!

  • @UralaTAO
    @UralaTAO 3 года назад +2

    You are a great speaker man.

  • @davidkamaunu1273
    @davidkamaunu1273 4 года назад +4

    I concur with Trevor you present very well and helps "owning the content"✨👍
    Sometimes network forensics and security can seem like Romulan..

  • @adityajain1989
    @adityajain1989 3 года назад +1

    Lovely... Thankyou very much.. Due to your excellent presentation will start my journey to security from today

    • @devcentral
      @devcentral  3 года назад

      I'm glad you enjoyed the video!

  • @bradandrews777
    @bradandrews777 5 лет назад +12

    I would have liked to see a couple of details about how it works out. Show code/details on how a specific attack is blocked.
    I see the WAF as being valuable to quickly block off things that are learned until the application can be changed. That seems to go against what I see in the field though, since those who use a WAF often lack the commitment to go fix the core problem in the app later. That is surprising on the one hand, but not when leadership tendencies are considered.

  • @guillermoyuste2412
    @guillermoyuste2412 5 лет назад +10

    Well explained, thank you!

  • @hessamzahedi5413
    @hessamzahedi5413 2 года назад +6

    Great explanation! Thank you
    Quick question, in general, can WAFs protect against LDAP injections as well?

    • @devcentral
      @devcentral  2 года назад +2

      Hi and thanks for the comment!. The primary defense against LDAP injection is proper input validation and a (competent) WAF should be able to do that.

  • @sumitrapyakurel5186
    @sumitrapyakurel5186 3 года назад +10

    Great explanation!!! Thank you for your effort.

  • @syednadeembe
    @syednadeembe 3 года назад +1

    very simple and to the point video

  • @saraafshar3910
    @saraafshar3910 3 года назад +5

    I am happy about finding this awesome tutorial, thanks a lot

  • @JavaDeveloperForFun24
    @JavaDeveloperForFun24 3 года назад +8

    it would be nice if there were subtitles!

    • @bibaq4923
      @bibaq4923 3 года назад +2

      agree with u!!!

    • @devcentral
      @devcentral  3 года назад +1

      We'll see what we can do about that and appreciate the comment.

    • @redareda-yb9vu
      @redareda-yb9vu Год назад

      😂😂😂😂😂😂 ‏‪0:31‬‏

    • @redareda-yb9vu
      @redareda-yb9vu Год назад

      😂😂😂😂😂😂 ‏‪0:36‬‏

    • @redareda-yb9vu
      @redareda-yb9vu Год назад

      😂😂😂😂😂😂 ‏‪0:45‬‏ 😅

  • @wtang3123
    @wtang3123 6 лет назад +38

    How is he writing backwards? It's hard to stay focused because it's too cool

    • @devcentral
      @devcentral  6 лет назад +11

      Thanks for the note! You can see how we do these here: ruclips.net/video/U7E_L4wCPTc/видео.html

    • @grom3852
      @grom3852 6 лет назад +1

      Lol, ya there's some video showing how its all done, but don't watch it cause it's so awesome without! lol ;)

    • @chrishoward1983able
      @chrishoward1983able 5 лет назад

      i agree, i'm in awe....

    • @bekirkatranci
      @bekirkatranci 5 лет назад +4

      I was about to figure it myself then I saw the t-shirt chest label, fooled myself and said "nah, he must be really writing backwards". So, that's backwards, too? If so, nice touch!

    • @tareeko
      @tareeko 5 лет назад +4

      It's even cooler that they printed a flipped logo on his polo shirt.

  • @tempestboya2783
    @tempestboya2783 3 года назад +2

    Good content and clear explanation, liked and subscribed, keep them bringing

  • @fawadkhan8905
    @fawadkhan8905 5 лет назад +3

    thats great, but how can we know over the network before log activity, whether the user is going to to do un-authorize or authorize activity in the web application

    • @devcentral
      @devcentral  5 лет назад +3

      Hi Fawad, thanks for the question. When a user requests a web application, you don't immediately know if they are trying to do something good or bad. This is where the Web Application Firewall comes in and inspects each request and ensures it is a safe request (based on all the signatures of the WAF and the protection capabilities it has), and then only allows the request through if it passes the security checks of the WAF. If the WAF finds something unsafe in the request, then it blocks the request from accessing your web application. It does this for every single request, so even if a user gets logs in properly and then (once they are in) starts to do some bad stuff, the WAF will block as soon as the bad stuff starts happening. I hope this helps...thanks!

    • @fawadkhan8905
      @fawadkhan8905 5 лет назад +2

      F5 DevCentral thank you great insight

  • @chris_wall
    @chris_wall 2 года назад +1

    Thank you very much for this video.

    • @devcentral
      @devcentral  2 года назад

      ...and, thank you for the comment! Glad you enjoyed the video!

  • @NK-iw6rq
    @NK-iw6rq Год назад +2

    Great explanation !

    • @devcentral
      @devcentral  Год назад +1

      Glad you liked it! And, thanks for the comment!

  • @sisitharupasingha17
    @sisitharupasingha17 2 года назад +2

    Just want to know is this support for web site security , block sql injection and other attacks

    • @devcentral
      @devcentral  2 года назад +1

      Yes, a WAF (if properly configured) can mitigate those types of attacks.

    • @sisitharupasingha17
      @sisitharupasingha17 2 года назад

      @@devcentral can you suggest any service for hostgater cpannel

    • @DonyJeanmary
      @DonyJeanmary Месяц назад

      ❤😂😂🎉😢😮😅😊

  • @RM-jo7in
    @RM-jo7in Год назад +1

    Hi, i got two small questions: First how is a WAF setup? Is there a physical instance ahead of the web apps within my network?
    seconly how does the detection work, is it able to work with complex machine learning models or is the detection of for example XSS signature based?
    Other than that great video, thanks :)

    • @aubreyking3685
      @aubreyking3685 Год назад +1

      WAF can be set up in many different configurations. Most common, historically, is to have an appliance in front of applications. The WAF can be a proxy, itself, or scaled horizontally in front of the app being defended. With modern attacks, most customers are shifting to a multi-layered WAF approach, with Distributed Cloud WAAP taking out signature based attacks before a packet even reaches the data center. Inside the data center, AWAF profiles the applications on a per-uri basis, right down to which unicode characters are allowed! It understands what the expected request and response time are for every element on every uri in your app. Some customers also employ NGINX+ w/ Application Protection to proxy in small environments or even to profile East-West inside an application environment that exists underneath the traditional load balancer / WAF or cloud WAF that is northbound in flow.
      Great question! Thanks for watching!

  • @gauravsingh-ii9jq
    @gauravsingh-ii9jq 4 года назад +2

    Backward writing understood but did you design the tshirt with mirror images as well?

    • @TopTechTalent
      @TopTechTalent 3 года назад

      Hi. We had shirts made with the logos reversed. :-)

  • @cisoglobalinc
    @cisoglobalinc 5 лет назад +5

    Awesome explanation! Keep up the great work.

  • @abdullahalnoman9204
    @abdullahalnoman9204 4 года назад +3

    Amazing explanation!Thanks.

  • @grom3852
    @grom3852 6 лет назад +2

    This is so amazing! What a great resource :)

    • @devcentral
      @devcentral  6 лет назад

      glad you enjoy the videos!

  • @wramarante
    @wramarante 2 года назад +1

    Hi John. Great video. What about the behavior of a WAF with HTTPS? Does it work properly without SSL inspection or does it need an open traffic? Tnks.

    • @devcentral
      @devcentral  2 года назад +1

      Generally it does need to terminate and decrypt the traffic to inspect the data. However, if an organization want to send encrypted traffic direct to the server, a WAF can pass that through if configured to do so. Does that answer your question?

    • @wramarante
      @wramarante 2 года назад +1

      @@devcentral yes, it does. The F5 WAF has built-in stuff to decrypt the traffic before evaluating the data or it requires a separate tool like F5 SSLO?

    • @devcentral
      @devcentral  2 года назад +1

      @@wramarante The WAF can decrypt. SSL Orchestrator can too depending on your infrastructure.

  • @shcordeiro1
    @shcordeiro1 3 года назад +1

    Really good explanation. Thanks a lot

  • @alicynwonderland6499
    @alicynwonderland6499 3 года назад +1

    When he's talking about layers 3 and 4, is he referencing the OSI model?

  • @_lost._.zeny_
    @_lost._.zeny_ 3 года назад +2

    man just started writing mirror alphabets.... he's in different league 🔥

    • @TopTechTalent
      @TopTechTalent 3 года назад +1

      this is how we do the Lightboard Lessons: ruclips.net/video/U7E_L4wCPTc/видео.html

    • @_lost._.zeny_
      @_lost._.zeny_ 3 года назад +1

      @@TopTechTalent damn!!

  • @HD_Heresy
    @HD_Heresy 2 года назад +2

    Love your videos guys! Would basic WAF theory like this still be relevant in 2022? I know a lot of knowledge in IT Security changes day by day!

    • @devcentral
      @devcentral  2 года назад +3

      We think so but WAFs are moving more toward WAAP - Web Application & API Protection. So, still protecting websites plus, API calls. Hope that helps!

    • @HD_Heresy
      @HD_Heresy 2 года назад +2

      Oh WAAP sounds interesting! Look forward to your lightboard lesson on that one day!

  • @vortical911
    @vortical911 4 года назад +2

    thank you !! you're a great teacher :)

    • @devcentral
      @devcentral  4 года назад

      Thanks Trevor...glad you enjoyed the video!

  • @automotivegoodness4676
    @automotivegoodness4676 6 лет назад +3

    This is good, but you compared a legacy firewall to a WAF, but what about a Next-gen firewall?
    Next-Gen firewall does Layer 7/Deep packet inspection, so why would I need a WAF if I had a Next-Gen for example? What does the WAF inspect that the Next-Gen doesn't, especially when both can inspect HTTPs? Thank you!

    • @victorparlindungan5659
      @victorparlindungan5659 5 лет назад

      signatures and constraint. Some NGFW have embeded WAF software, but the differences between that WAF and "the real WAF" is the real WAF can do SSL-offload, and it have much deeper settings on signature (i think that focus on 10 OWASP)

  • @monnombre6547
    @monnombre6547 3 года назад +1

    awesome explanation!!!

  • @lucisetumbrae
    @lucisetumbrae 3 года назад +1

    Super video.Thank you.

  • @castle4757
    @castle4757 6 месяцев назад

    Arent most of the firewalls today like Fortigate and Palo Alto claim to be Application level firewall? My question is why the need of WAF separately? do they cost less than standard vm version of layer 1-7 layer firewalls? i have seen in a enterprise network that Fortigate is deployed at Azure acting as a hub and they also have WAF in azure separately.

  • @habukproductions6966
    @habukproductions6966 Год назад +1

    Are you left handed??
    Do you write in lateral inverted style??
    Is your T-shirt having an inverted text ??

    • @devcentral
      @devcentral  Год назад +1

      We made a video to explain it all :) ruclips.net/video/U7E_L4wCPTc/видео.html

    • @habukproductions6966
      @habukproductions6966 Год назад

      Ahh!! The Tshirt has inverted text

  • @jaylee3941
    @jaylee3941 2 года назад

    Great Video, easy to understand. Question, if you only have Web Apps in the cloud, no infrastructure, would deploying a Firewall in front of the WAF be of any use or would this add complexity and new costs?

    • @devcentral
      @devcentral  2 года назад +1

      Well, a WAF generally focuses on http(s) (80/443) traffic so there ight be instances where you'd want a Network Firewall (layer 3 - tcp/udp) to protect that traffic. Some WAFs have network security features and much depends on your infrastructure and where the WAF resides within the network. I know that's not a definitive answer but like with many infrastructure questions, it depends. :-)

  • @jitrammaharjan2025
    @jitrammaharjan2025 5 лет назад +1

    Great video !!!! Clear explain thank you

  • @treesus1835
    @treesus1835 4 года назад +5

    "ack el" that's the first time I have heard ACL pronounced like that :D

  • @saleetrip2476
    @saleetrip2476 4 года назад +6

    writing backwards?

    • @wilcosec
      @wilcosec 4 года назад

      camera is facing a mirror

  • @marcrtaylor
    @marcrtaylor 2 года назад +1

    Great video - but I have a question. Is he writing backwards? Or is the video just reversed? It's magic!

    • @devcentral
      @devcentral  2 года назад

      Thanks for the comment! One we get often. ;-) Here's how we produce these: ruclips.net/video/U7E_L4wCPTc/видео.html

    • @marcrtaylor
      @marcrtaylor 2 года назад +1

      @@devcentral thanks! I guessed right! Its really effective!

  • @nikunjbhartia2222
    @nikunjbhartia2222 4 года назад +1

    Isn't this supposed to be handled in the l7 reverse proxy ?

  • @rupinder2127
    @rupinder2127 5 лет назад +2

    Awesome explanation

  • @f5dan319
    @f5dan319 6 лет назад +1

    Do you have plans to produce a Lightboard for 'Advanced WAF' in the near future?

    • @devcentral
      @devcentral  6 лет назад +1

      yes we do! stay tuned...it's coming out in the next couple of weeks

    • @devcentral
      @devcentral  6 лет назад +2

      Here's the Advanced WAF Lightboard: ruclips.net/video/HBbDKBV4QW0/видео.html

  • @kayceekelvin
    @kayceekelvin 5 лет назад +1

    Great explanation, but the WAF features you mentioned can also be handled by an NGFW (upto layer 7) as opposed traditional network firewalls (layer3-4). I was hoping you throw a light on the real difference between an NGFW and a WAF.

    • @jaykodoth
      @jaykodoth 5 лет назад +3

      As I understand NGFW is a package comprising of WAF and IPS/IDS capabilities on a traditional firewall. It is a cost effective solution for SME. At the same time they are prone to single point of failure, having all those features in a single box. For large enterprises, they use separate devices to protect their infrastructure, insuring different layers fo security,

  • @tamirzuhair
    @tamirzuhair 6 лет назад +1

    How would you integrate a waf with a typical n/w firewall??
    What would be the typical packet flow in that case between the clients and the web app servers?

    • @devcentral
      @devcentral  6 лет назад

      Here's a good lightboard lesson on the "life of a packet" through the BIG-IP. it doesn't explicitly cover everything you asked, but it can provide additional perspective. and, the answer from Blood Sausage is a good one as well!!
      ruclips.net/video/qCLEw5xIZ7s/видео.html

    • @SajidKhan-dy2dk
      @SajidKhan-dy2dk 5 лет назад

      Tamir Zuhair

  • @ateendrakumar5276
    @ateendrakumar5276 3 года назад +1

    What are you using for writing like this?

    • @TopTechTalent
      @TopTechTalent 3 года назад

      You can see how we do this: ruclips.net/video/U7E_L4wCPTc/видео.html

  • @rohitmv6712
    @rohitmv6712 3 года назад

    I hope I will get judgement about this..tnk u very much..

  • @emanueladrianarias7957
    @emanueladrianarias7957 3 года назад

    El tema es que los firewalls tradicionales ya no se utilizan y fueron reemplazados por los NGFW que trabajan en la capa de aplicaciones... ¿como compararías un WAF vs NGFW?.. Saludos!

  • @rohitmv6712
    @rohitmv6712 3 года назад

    My certificate is been used by one company and made server so how could u help me regarding this

  • @StahlFirearmsNo2
    @StahlFirearmsNo2 5 лет назад

    Are there hardware WAF’s you can buy of is this something you have to download or program in?

    • @JasonRahm
      @JasonRahm 5 лет назад

      F5's WAF is available in many difference packages, you can reference here: www.f5.com/products/security/advanced-waf.

  • @yoshi5113
    @yoshi5113 2 года назад +1

    inverted writing technique?

    • @devcentral
      @devcentral  2 года назад

      Behind the Scenes: ruclips.net/video/U7E_L4wCPTc/видео.html

  • @BilalKhan-rg2wg
    @BilalKhan-rg2wg 4 года назад +1

    Great...thanks a lot..😊😊

  • @faisalalbalushi9
    @faisalalbalushi9 4 года назад

    You comparing WAF VS very old firewall !
    You should compared with NG firewalls.

    • @devcentral
      @devcentral  4 года назад

      Thanks for the comment! It's true that firewalls have come a long way in recent days/years. This video is showing the difference between a WAF and some of the older network firewalls. It's important to have the security functionality discussed in the video, so if a newer firewall can get it done, that's great!

  • @desiaclementslewis8318
    @desiaclementslewis8318 3 года назад +1

    thank you

    • @devcentral
      @devcentral  3 года назад

      Glad you enjoyed the video!

  • @markusay
    @markusay 4 года назад +4

    I like his reversed logo shirt

    • @deathstroke2341
      @deathstroke2341 4 года назад

      he is writing with his right hand actually

  • @Hector01624
    @Hector01624 3 года назад

    Highness of your writing skills.....lefty smoothly write

  • @rohitmv6712
    @rohitmv6712 3 года назад

    Qgm group LLC,is made server using my ISO, finger print,headscan, so what security is given by the government, or security Buro

  • @adityaverma2492
    @adityaverma2492 2 года назад +1

    thanks

    • @devcentral
      @devcentral  2 года назад

      We appreciate the comment!

  • @okuhlephambiliokuhlephambi2287
    @okuhlephambiliokuhlephambi2287 4 года назад

    Well Explained

  • @AJCHANNEL
    @AJCHANNEL 5 лет назад +1

    Gud work

  • @Randomname6133
    @Randomname6133 2 года назад +1

    Dude is Davinci writing with left hand backwards

    • @devcentral
      @devcentral  2 года назад

      thanks for the comment and this is how we produce these: ruclips.net/video/U7E_L4wCPTc/видео.html

  • @wanderleysouzamcp
    @wanderleysouzamcp 5 лет назад

    não entendi nada

  • @yunshanzhu718
    @yunshanzhu718 3 года назад

    firewall takes care only layer3-4, that is in stone age.

  • @StoweBoyd-g5p
    @StoweBoyd-g5p 4 месяца назад

    733 Libbie Lane

  • @kalkalasch
    @kalkalasch 4 года назад

    Shirt blends it with background and arms appear independent of body. Makes hard to focus.

  • @druidelf3
    @druidelf3 6 лет назад +4

    you are SO cute.

    • @kalkalasch
      @kalkalasch 4 года назад

      i bet you'd like to flood some of his ports with http requests but i am sure he's employing an intrusion prevention system

  • @wu2993
    @wu2993 4 года назад

    i want this chinese vision

  • @BirrellJoan-q7u
    @BirrellJoan-q7u 4 месяца назад

    Kuphal Tunnel

  • @ghosttiger84
    @ghosttiger84 3 года назад

    This video is filled with filler, and technical jargon. I bet 90% of viewers still don't understand what a WAF does.

  • @LauraWilson-f6l
    @LauraWilson-f6l 4 месяца назад

    Gislason Harbors

  • @shiloranxxer
    @shiloranxxer 2 года назад

    FLE HOUSE HAS FOUND ITS NEW HOST.

  • @RaynaDearmond-k4z
    @RaynaDearmond-k4z 4 месяца назад

    Nina Orchard

  • @MarniUehara-g6d
    @MarniUehara-g6d 4 месяца назад

    Hammes Extension

  • @RusselMumm-o9n
    @RusselMumm-o9n 4 месяца назад

    Kuhic Knolls

  • @PaulHayes-o8h
    @PaulHayes-o8h 3 месяца назад

    Dickens Run

  • @TeodoroLippert-d6y
    @TeodoroLippert-d6y 3 месяца назад

    579 Telly View

  • @ariannaayrton3418
    @ariannaayrton3418 4 месяца назад

    4441 Turcotte Lock

  • @RuthDavis-u6p
    @RuthDavis-u6p 4 месяца назад

    Gaylord Ways

  • @DeQuinceyEartha
    @DeQuinceyEartha 4 месяца назад

    0939 Hayes Shores

  • @gshcbgdggshdhgs6677
    @gshcbgdggshdhgs6677 4 года назад

    Yang milih allah like 800 ya yang milih dajal abaikan saja

  • @vidyakrishnan1757
    @vidyakrishnan1757 4 года назад +2

    Great explanation ! Thank you ...

  • @anujprabhu223
    @anujprabhu223 4 года назад +2

    Very well explained... thank you!