Skip to main content

Web Application and API Protection (WAAP)

Intelligent security for web applications, APIs, and microservices.

Overview

WAAP provides always-on protection at the network edge. It inspects incoming requests and applies dynamic rules to detect and mitigate attacks including OWASP Top 10 vulnerabilities, bot abuse, and Layer-7 DDoS.


Prerequisites

  • Domain or endpoint to protect (e.g., app.example.com)
  • DNS control for traffic routing (CNAME or load balancer)
  • (Optional) SSL/TLS certificate for custom hostname

Step 1: Enable WAAP

  1. Go to Security > WAAP
  2. Click Create Protection Instance
  3. Enter domain to protect (e.g., app.example.com)
  4. Review and accept default policy or create custom
  5. Save and wait for Active status

Edge nodes apply rules globally within minutes.


Step 2: Assign Protection Policy

  1. Navigate to Policies under WAAP
  2. Choose pre-configured policy:
    • Strict Web App
    • API Only
    • Bot Mitigation
  3. Duplicate and customize if needed (e.g., app-example-policy)
  4. Associate policy with protection instance

Step 3: Configure Access Settings

IP Lists

List TypeDescription
Allow-listKnown good IPs (e.g., office IPs)
Deny-listBlocked IPs with optional expiry

Bot and DDoS Protection

SettingDescription
Bot ManagementDetect and challenge automated attacks
Layer-7 DDoSConfigure rate thresholds and triggers
Browser ValidationJavaScript challenges for suspicious traffic

API Protection

SettingDescription
Rate Limitinge.g., 500 requests/minute
Schema ValidationValidate ingress traffic
Path ExemptionsExclude health check endpoints

Step 4: Custom Rules

  1. Go to Rules in WAAP dashboard
  2. Click Create new rule
  3. Configure:
ComponentDescription
Namee.g., Allow-healthcheck
Match criteriaURL path, IP range, etc.
ActionAllow or Block
  1. Save and order rules (exceptions before general blocks)

Step 5: Response Pages

  • Define blocked/challenged user experience
  • Configure custom branding
  • Test by simulating blocked traffic

Step 6: Testing Checklist

TestExpected Result
Normal request200 OK, no challenge
High-volume from same IPRate limit or bot challenge
SQL injection payloadBlocked or challenged
API beyond rate limitThrottled
Allow-listed IPPasses without challenge

Monitoring

  • Review request volume, blocked requests, challenge rate
  • Tune thresholds monthly based on traffic patterns
  • Rotate certificates and secrets
  • Clean up stale IP list entries

Troubleshooting

ProblemCauseSolution
Legitimate users blockedRule too broadRefine match criteria or reorder
API delaysChallenges too aggressiveLower sensitivity
Protection inactiveConfig incompleteReview configuration
High false positivesPolicy too strictCustomize policy for domain