Forum Discussion
Giridharan_2650
Nimbostratus
Apr 19, 2018AWS F5 Managed WAF rules not blocking the vulnerabilities
We have subscribed to the AWS Managed WAF rules in our AWS instance and attached with to a WEB ACL and ALB for testing . The default condition for the Rule Set is configured to block and we tried inj...
cweeklund_18634
Nimbostratus
Oct 12, 2010This is exactly what I was looking for! However, I must be missing something because it's not quite working for me. Forgive me, I'm very new to all of this.
I can see the virtual_status.class file is populated with what looks to be good data. I have an external file data group list called "virtual_status". I have an iRule called "virtual_status" that has the contents of your .txt file. But when I browse to my virtual server, I only get the code at the top of the page (F5 Load Balancer Status - 10.10.10.10
Tue Oct 12 16:41:05 CDT 2010) and no virtual servers or pool members.
Any thoughts as to what might be missing? I was able to get the Pool_Member_Status irule to work, but like you said, it didn't have exactly what I was looking for.
Thanks!
- Giridharan_2650May 20, 2018
Nimbostratus
Nir Zigler, Thanks for your response . Test cases in the following OWASP link were tried against the managed WAF rules and it was not getting blocked (https://www.owasp.org/index.php/Testing_for_SQL_Injection_(OTG-INPVAL-005)) . Do we have any reference to the attack patterns that the rule set covers
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects