Microsoft Azure Managed WAF IaaS Manual Installation
Manual installation of Managed WAF requires you to: :
- Deploy the Managed WAF appliance
- Activate the Managed WAF appliance
After you install Managed WAF, you will need to contact Alert Logic Onboarding for additional set up assistance.
After you activate the appliance, perform the following procedures to enable Managed WAF to protect your online assets.
- Identify websites to be protected.
- Test the website proxy.
- Route traffic through Managed WAF.
Deploy the Managed WAF appliance
- Log in to the Azure portal.
- Click Virtual Machines.
- Click + Add.
- In the search field, type Alert Logic Web Security Manager - BYOL, and then click the entry when it appears.
- Under Select a deployment model, select Resource Manager, if not already selected.
- Click Create.
- Enter the following:
- Name: A name for the virtual machine
- VM disk type: HDD
- User Name: Create a valid user name
- Authentication type: Password
- Password: Create a valid password
- Resource group: Either create a new one or use an existing one
- Click OK.
- Select one of the recommended sizes for the virtual machine.
- Click Select.
- Review the settings, scroll down to Monitoring, and then select Disable for both Boot diagnostics and Guest OS diagnostics.
- Click OK.
- Review the summary, and then click OK.
- Review the Offer details and then click Purchase.
The deployment process takes 15 to 20 minutes to complete. Deployment is successful when the screen refreshes and the deployed virtual machine appears.
Activate the Managed WAF appliance
- Copy the Public IP address of the Managed WAF virtual machine.
- Open a new browser window, and navigate to
https://[Public IP address]:4849
. - When the warning window appears, click Advanced, and then click Proceed to [Public IP address].
- On the Managed WAF Activation screen, copy and paste in your License key and the [Public IP address] for the virtual machine.
- Click Activate.
- On the Managed WAF license agreement page, click I agree to the above license terms.
- In the Alert Logic console, click CONFIGURATION, click WAF, and then click Appliances.
- In the list, scroll down to [Public IP address], and then click Manage Appliance for [Public IP address].
- Contact Alert Logic Onboarding to schedule a Service Orientation.
Identify websites for protection
After you deploy Managed WAF, you must identify the websites to protect. To identify website, you must perform the following steps:
- Access the Add Website page
- Modify the virtual web server section
- Modify the real web servers section
- Modify the Initial configuration section
Step 1: Access the Add Website page
To access the Add Website page:
- In the Alert Logic console, click CONFIGURATION, click WAF, and then click Appliances.
- Find the virtual appliance to which you want to add the website, and then click Manage Appliance.
- In the navigation pane, under Services, click Websites.
- On the Websites page, click Add Website.
Step 2: Modify the virtual web server section
Use the Add Website page to add the website(s) you want to protect. Managed WAF deploys in reverse proxy mode. In reverse proxy mode, Managed WAF terminates requests, and proxies the requests to the backend web server.
To modify the virtual web server section:
- On the Add Website page, from the Web Server Protocol list, select one of the following:
- HTTP: This option creates a website proxy that responds to HTTP requests.
- HTTPS: This option creates a website proxy that responds to HTTPS requests. Selection generates a temporary SSL certificate.
- Both: This option creates a website proxy that responds to HTTP and HTTPS requests. Selection generates a temporary SSL certificate.
- In Web server domain name, type the URL of the website you want to protect.
- In HTTP(S) listen port, type the port. The default ports are:
- HTTP: 80
- HTTPS: 443
- Select Default Host for listen IP.
Step 3: Modify the real web servers section
Use the Real web servers section to identify any backend web server you want Managed WAF to protect.
To modify the Real web servers section:
- From the Real server protocol list, select the connection protocol you want Managed WAF to use for a backend web server.
- If you want traffic to a backend web server(s) to be encrypted, select https or both.
- If traffic does not require encryption, select http.
- Select Validate real servers if you want Managed WAF to send an HTTP request to the backend web server to verify it responds to HTTP requests.
- In Real server IP or public domain name, type the private IP address or DNS name on which the web server is listening.
- In Port, type the port to which the web server is listening. The default ports are:
- HTTP: 80
- HTTPS: 443
- From the Role list, select one of the following:
- Active: Managed WAF forwards requests to the backend web server.
- Backup: Managed WAF forwards requests to the backend web server only if no other servers are active.
- Down: Managed WAF does not forward requests to the backend web server.
Step 4: Modify the Initial configuration section
To modify the initial configuration section:
- Under Initial configuration, select WAF Default, if not already selected..
- Click Save Configuration, and then click Apply changes.
Test your website proxy
You must test your website proxy to verify Managed WAF can connect to the backend web server.
Before you start this procedure, you must configure your website to be used as the default virtual host for the listen IP, and your website proxy must be in Detect mode.
To test your website proxy, complete the following steps:
- Edit the local hosts file.
- Test for initial connectivity.
- Test in Detect mode.
- Test in Protect mode.
Step 1: Edit the local hosts file
Edit the local hosts file to test traffic routed from the host provider through Managed WAF. This step simulates reconfiguring NAT rules or making a host provider DNS change on the local computer, and allows you to test Managed WAF prior to making a permanent NAT or DNS change.
To edit your local hosts file:
- Locate your hosts file. The host file can typically be found in the following locations:
- For Windows computers:
%SystemRoot%\system32\drivers\etc\hosts
- For Unix, Linux, or MacOS computers:
/etc/hosts
- For Windows computers:
- Copy your original hosts file, and save it to another location.
- Edit the hosts file and route the host provider (www.example.com) through the Managed WAF web application firewall (WAF) listen IP address (192.0.43.11).
- Save the hosts file.
Step 2: Test for initial connectivity
To test for initial connectivity:
- Open your web browser and navigate to
[Public IP address]
. - Press Enter.
Though the browser opens the default website for your real web server, the test will not affect production traffic.
Step 3: Test in Detect mode
To test in Detect mode:
- Open your web browser and navigate to
[Public IP address]/?x=a%00
. - Press Enter.
The browser opens the default website for your real web server, and the simulated DOS attack should be registered on the Deny log as a DOS attempt.
- On the Websites page, in the main menu, point to Log, and click Deny Log.
Step 4: Test in Protect mode
To test Protect mode:
- Open the Websites page.
- Select Protect in the Mode list for the website you want to test.
- Open your web browser and navigate to
[Public IP address]/?x=a%00
. - Press Enter.
The browser displays a 404 error message, and an attack registers in the Deny log as a DOS attempt.
Route traffic through Managed WAF
After you test your website proxy, reconfigure NAT rules or make a host provider DNS change to route traffic to Managed WAF permanently. DNS changes may take several days to propagate properly through the Internet domain servers.