Introduction

A WAF can be purchased or downloaded as an open source firewall but it can equally come in hardware form. The way we configure our WAF often determines how well it keeps attackers out so today i would like to go over some of the features that a WAF can have to hopefully give you a better understanding of how you should configure yours or how you should attack the WAF you are currently facing. Configuring a WAF for stricter inspection might be wanted but we have to realise this increases the processing time of a request.

Installation modes

We can install our WAF in two ways and each has their own advantages and disadvantages:

One-armed mode

One-armed mode

Two armed mode

Two armed mode

Features

I looked in the sales documents of some popular WAFs to see what features they offer at the maximum level of protection (and pricing) to see the source documents please refer to the "Sources" chapter at the end of the document.