Loadbalancer.org WAF Gateway with Metaswitch EAS DSS/SSS

Size: px
Start display at page:

Download "Loadbalancer.org WAF Gateway with Metaswitch EAS DSS/SSS"

Transcription

1 Loadbalancer.org WAF Gateway with Metaswitch EAS DSS/SSS Deployment Guide v1.0.2 Copyright Loadbalancer.org

2 Table of Contents 1. Overview...4 Introduction to the WAF Gateway with Metaswitch EAS DSS/SSS...4 Virtualized Deployments... 4 Hardware Deployments About this Guide Loadbalancer.org Appliances Supported Loadbalancer.org Software Versions Supported Metaswitch EAS DSS/SSS Versions Supported Sizing, Capacity, and Performance for a Virtual WAF Gateway Deployment Using Loadbalancer.org WAF Gateways with Metaswitch EAS DSS/SSS...6 Load Balancing & HA Requirements... 6 TLS/SSL Termination Deployment Concept...7 Virtual Service (VIP) Requirements Loadbalancer.org Appliance the Basics...8 Virtual Appliance Download & Deployment...8 Initial Network Configuration... 8 Accessing the Web User Interface (WebUI)...9 HA Clustered Pair Configuration Appliance Configuration for the WAF Gateway with Metaswitch EAS DSS/SSS...11 Overview Creating a WAF Gateway in Front of a Plain Text HTTP Service...11 Example: HTTP-80 Service Step 1: Creating the Layer 7 VIP Step 2: Creating the WAF Gateway Finalizing the Configuration Putting a WAF Gateway in Front of an Encrypted HTTPS Service...13 Example: HTTPS Service Step 1: Creating the Layer 7 VIP Step 2: Creating the WAF Gateway Step 3: Uploading the Certificate Step 4: Creating the TLS/SSL Termination...16 Finalizing the Configuration Custom WAF Rule Set Description...17 Whitelisted rules Rule 1: DOS Protection for login.html Rule 2: Detect Failed Login and Block Rule 3: DOS Protection POST to /login...18 Rule 4: Detect username abuse and block...18 Rule 5: Detect password abuse and block WAF OWASP Protection...19 OWASP Top 10 Application Security Risks: Testing & Verification...20

3 Metaswitch Specific Fail Over / High Availability Test...20 Using System Overview Technical Support Further Documentation Conclusion Appendix...22 WAF Configurations and Rule Sets General Rule Set NAT Deployment Rule Set Clustered Pair Configuration Adding a Slave Unit...31 Company Contact Information... 33

4 Overview 1. Overview INTRODUCTION TO THE WAF GATEWAY WITH METASWITCH EAS DSS/SSS Metaswitch and Loadbalancer.org have a long-standing partnership for the implementation of EAS SSS. Whether deployed as hardware or virtualized, the Loadbalancer.org solution ensures EAS SSS is highly available and highly secure. The Loadbalancer.org appliance includes a fully integrated industry standard web application Firewall (WAF) by default. An off-the-shelf WAF is not very useful unless it is specifically configured to protect against the application. Loadbalancer.org have developed five custom WAF rules specifically to protect a Metaswitch EAS DSS/SSS deployment, ensuring total protection against security vulnerabilities. This is described in detail in this document. VIRTUALIZED DEPLOYMENTS In a virtualized environment, the Virtual EAS SSS deployment type used determines how the load balancer must be configured. It is essential to know which type of deployment is in place or being planned before attempting to set up a load balancer. In this scenario, the Loadbalancer.org solution should be used to provide both load balancing and protection against security vulnerabilities. HARDWARE DEPLOYMENTS Hardware installs follow a different deployment architecture. In this scenario, a separate pair of dedicated Loadbalancer.org appliances should be installed to provide protection against security vulnerabilities. Contact Loadbalancer.org for assistance with deploying a hardware WAF gateway solution. 2. About this Guide This guide details the steps required to configure a Loadbalancer.org appliance with WAF gateways in a Metaswitch EAS DSS/SSS environment utilizing Loadbalancer.org appliances. It covers the configuration of the Loadbalancer.org appliances and also any Metaswitch EAS DSS/SSS configuration changes that are required to enable deploying WAF gateways in front of the Metaswitch services. This guide is applicable to both hardware and virtual Metaswitch deployments. For more information about initial appliance deployment, network configuration and using the Web User Interface (WebUI), please also refer to the relevant Administration Manual: v7 Administration Manual v8 Administration Manual 3. Loadbalancer.org Appliances Supported All our products can be used for a WAF gateway with Metaswitch EAS DSS/SSS deployment. The complete list of models is shown below: Discontinued Models Current Models * Enterprise R16 Enterprise VA R16 Enterprise R20 Enterprise MAX Page 4

5 Loadbalancer.org Appliances Supported Enterprise VA Enterprise R320 Enterprise 10G Enterprise Ultra Enterprise VA R20 Enterprise VA MAX Enterprise AWS ** Enterprise AZURE ** * For full specifications of these models please refer to: ** Some features may not be supported, please check with Loadbalancer.org support 4. Loadbalancer.org Software Versions Supported V8.3.4 and later 5. Metaswitch EAS DSS/SSS Versions Supported Metaswitch EAS DSS/SSS all versions 6. Sizing, Capacity, and Performance for a Virtual WAF Gateway Deployment The Loadbalancer.org appliances can be deployed as virtual appliances. For deployments up to 250,000 subscribers, your virtual host should be allocated a minimum of 8 vcpus, 16 GB of RAM, and 8 GB of disk storage. This specification will support the following bandwidth and connection thresholds: Internet EAS bandwidth: 100 Mbit/s Internet EAS packets/s: 70,000 pkts/s EAS Internet bandwidth: 700 Mbit/s EAS Internet packets/s: 55,000 pkts/s Concurrent connections: 380,000 connections For larger deployments, your Metaswitch support representative will give you details of the expected load on your load balancers based on your predicted usage profile. Page 5

6 Using Loadbalancer.org WAF Gateways with Metaswitch EAS DSS/SSS 7. Using Loadbalancer.org WAF Gateways with Metaswitch EAS DSS/SSS Note: It's highly recommended that you have a working Metaswitch EAS DSS/SSS environment first before implementing the load balancer. LOAD BALANCING & HA REQUIREMENTS In addition to the WAF gateway functionality described in this document, Loadbalancer.org appliances can also be used to provide load balancing and high availability to Metaswitch EAS DSS/SSS deployments. For inquiries regarding hardware load balancer solutions, please contact your Metaswitch representative. For inquiries regarding virtual load balancer solutions, Loadbalancer.org can provide assistance and advice. Please contact us at solutions@loadbalancer.org. TLS/SSL TERMINATION A WAF gateway can only have plain text HTTP traffic passed into it for scanning. If HTTPS-based services are in use and need a WAF gateway placed in front of them then it is necessary to set up TLS/SSL terminating services on the load balancer to decrypt the HTTPS traffic. Full instructions on how to set this up are given in section Putting a WAF Gateway in Front of an Encrypted HTTPS Service on page 13. In the context of a Metaswitch EAS deployment, it is advised to ensure that traffic which is decrypted for scanning by a WAF gateway is re-encrypted before it is sent onward toward the Metaswitch EAS servers. Instructions on how to configure this option are also given in section Putting a WAF Gateway in Front of an Encrypted HTTPS Service. Page 6

7 Deployment Concept 8. Deployment Concept VIPs = Virtual IP Addresses Note: The load balancer can be deployed as a single unit, although Loadbalancer.org recommends a clustered pair for resilience & high availability. Please refer to section 2 in the appendix on page 31 for more details on configuring a clustered pair. VIRTUAL SERVICE (VIP) REQUIREMENTS To provide WAF gateway protection to a Metaswitch EAS DSS/SSS deployment, one chain of virtual services is required for each Metaswitch EAS service that needs to have a WAF gateway put in front of it. As an example, a Metaswitch EAS deployment that has three services on ports 80, 10000, and would require three chains of VIPs to be configured. Each chain must contain a layer 7 VIP, a WAF gateway, and optionally a TLS/SSL termination service (only required for HTTPS based services). Page 7

8 Loadbalancer.org Appliance the Basics 9. Loadbalancer.org Appliance the Basics VIRTUAL APPLIANCE DOWNLOAD & DEPLOYMENT A fully featured, fully supported 30 day trial is available if you are conducting a PoC (Proof of Concept) deployment. The VA is currently available for VMware, Virtual Box, Hyper-V, KVM and XEN and has been optimized for each Hypervisor. By default, the VA is allocated 1 CPU, 2GB of RAM and has an 8GB virtual disk. The Virtual Appliance can be downloaded here. Note: The same download is used for the licensed product, the only difference is that a license key file (supplied by our sales team when the product is purchased) must be applied using the appliance's WebUI. Note: Please refer to the Administration Manual and the ReadMe.txt text file included in the VA download for more detailed information on deploying the VA using various Hypervisors. INITIAL NETWORK CONFIGURATION The IP address, subnet mask, default gateway and DNS settings can be configured in several ways as detailed below: Method 1 - Using the Network Setup Wizard at the console After boot up, follow the instructions on the console to configure the IP address, subnet mask, default gateway and DNS settings. Method 2 - Using the WebUI Using a browser, connect to the WebUI on the default IP address/port: To set the IP address & subnet mask, use: Local Configuration > Network Interface Configuration To set the default gateway, use: Local Configuration > Routing To configure DNS settings, use: Local Configuration > Hostname & DNS Method 3 - Using Linux commands At the console, set the initial IP address using the following command: ip addr add <IP address>/<mask> dev eth0 At the console, set the initial default gateway using the following command: route add default gw <IP address> <interface> At the console, set the DNS server using the following command: echo nameserver <IP address> >> /etc/resolv.conf Note: If method 3 is used, you must also configure these settings using the WebUI, otherwise the settings will be lost after a reboot. Page 8

9 Loadbalancer.org Appliance the Basics ACCESSING THE WEB USER INTERFACE (WEBUI) The WebUI can be accessed via HTTP at the following URL: * Note the port number 9080 The WebUI can be accessed via HTTPS at the following URL: * Note the port number 9443 (replace with the IP address of your load balancer if it's been changed from the default) Login using the following credentials: Username: loadbalancer Password: loadbalancer Note: To change the password, use the WebUI menu option: Maintenance > Passwords. Once logged in, the WebUI will be displayed as shown on the following page: Page 9

10 Loadbalancer.org Appliance the Basics (shows v8.2.x) HA CLUSTERED PAIR CONFIGURATION Loadbalancer.org recommend that load balancer appliances are deployed in pairs for high availability. In this guide a single unit is deployed first, adding a secondary slave unit is covered in section 2 of the appendix on page 31. Page 10

11 Appliance Configuration for the WAF Gateway with Metaswitch EAS DSS/SSS 10. Appliance Configuration for the WAF Gateway with Metaswitch EAS DSS/SSS OVERVIEW For each service provided by the Metaswitch deployment that needs to be protected by putting a WAF gateway in front of it, up to three elements need to be created: TLS/SSL termination VIP (only required for services handling encrypted traffic, i.e. HTTPS) WAF gateway (always required) Layer 7 VIP (always required) CREATING A WAF GATEWAY IN FRONT OF A PLAIN TEXT HTTP SERVICE EXAMPLE: HTTP-80 SERVICE Consider an example plain text HTTP service, titled HTTP-80 in the pools.txt file on an EAS server. To protect this service with a WAF gateway, the following setup would be required: 1. WAF: scans the incoming plain text HTTP traffic and blocks malicious traffic 2. Layer 7 VIP: passes the scanned, safe traffic on toward the Metaswitch EAS deployment STEP 1: CREATING THE LAYER 7 VIP Configuring the Virtual Service (VIP) 1. Using the web user interface, navigate to Cluster Configuration > Layer 7 Virtual Services and click on Add a new Virtual Service 2. Define the Label for the virtual service as required, e.g. HTTP Set the Virtual Service IP Address field to the required IP address, e.g Note: The IP address that is set here will be the address that clients will need to connect to in order to access this service via the WAF gateway. In the example presented here, the IP address is used. This address is located in the untrusted external facing network in a Metaswitch EAS environment. If clients connect to a service using an FQDN, e.g. northwest-telco.com, then the DNS records will need to be updated to point to the new WAF protected IP address. Page 11

12 Appliance Configuration for the WAF Gateway with Metaswitch EAS DSS/SSS 4. Set the Ports field to the port that the service in question is listening on, e.g Set the Layer 7 Protocol to HTTP Mode 6. Click Update to create the virtual service Defining the Real Servers (RIPs) 1. Using the web user interface, navigate to Cluster Configuration > Layer 7 Real Servers and click on Add a new Real Server next to the newly created VIP 2. Define the Label for the real server as required, e.g. HTTP-80_Service 3. Set the Real Server IP Address field to the IP address that is used to access the service in question from the Metaswitch EAS deployment. In this example, the IP address used is Set the Real Server Port field to the port that the service in question is listening on, e.g Click Update STEP 2: CREATING THE WAF GATEWAY 1. Using the web user interface, navigate to Cluster Configuration > WAF Gateway and click on Add a new WAF gateway 2. From the Select Layer 7 Virtual Service drop-down list select the associated layer 7 service that was created in step 1, which in this example is HTTP Click Update to create the WAF gateway Page 12

13 Appliance Configuration for the WAF Gateway with Metaswitch EAS DSS/SSS 4. Navigate to Cluster Configuration > WAF Manual Configuration 5. Using the drop-down list, select the WAF gateway that was just created, e.g. WAF-HTTP-80. The existing default WAF configuration will appear in the text box 6. Paste your custom Metaswitch EAS WAF configuration into the text box Note: Two complete Metaswitch EAS WAF configurations, based on custom rule sets, are presented in Appendix 1: WAF Configurations and Rule Sets. Either of these configurations can be copy and pasted into the text box in their entirety. 7. Click Update to save the manual WAF configuration FINALIZING THE CONFIGURATION To apply the new settings, HAProxy and the WAF service must be restarted as follows: 1. Using the WebUI, navigate to: Maintenance > Restart Services and click Reload HAProxy 2. On the Restart Services page, click Reload WAF PUTTING A WAF GATEWAY IN FRONT OF AN ENCRYPTED HTTPS SERVICE EXAMPLE: HTTPS SERVICE Consider an example encrypted HTTPS service, titled HTTPS in the pools.txt file on an EAS server. To protect this service with a WAF gateway, the following setup would be required: 1. TLS/SSL Termination: decrypts the incoming HTTPS traffic so that the WAF can scan it in the next step. The appropriate certificate for the service is used to perform the decryption 2. WAF: scans the plain text HTTP traffic, and blocks malicious traffic 3. Layer 7 VIP: passes the scanned, safe traffic on toward the Metaswitch EAS deployment Page 13

14 Appliance Configuration for the WAF Gateway with Metaswitch EAS DSS/SSS STEP 1: CREATING THE LAYER 7 VIP Configuring the Virtual Service (VIP) 1. Using the web user interface, navigate to Cluster Configuration > Layer 7 Virtual Services and click on Add a new Virtual Service 2. Define the Label for the virtual service as required, e.g. HTTPS Set the Virtual Service IP Address field to the required IP address, e.g Note: The IP address that is set here will be the address that clients will need to connect to in order to access this service via the WAF gateway. In the example presented here, the IP address is used. This address is located in the untrusted external facing network in a Metaswitch EAS environment. If clients connect to a service using an FQDN, e.g. northwest-telco.com, then the DNS records will need to be updated to point to the new WAF protected IP address. 4. Set the Ports field to a port that is free and not in use in the Metaswitch EAS environment. It is not possible to use the port that the service in question is actually listening on, as that port will be used for the termination service in step 4. The port chosen in this example is Set the Layer 7 Protocol to HTTP Mode 6. Click Update to create the virtual service 7. Click Modfiy next to the newly created VIP 8. Put a check in the Enable Backend Encryption checkbox 9. Click Update Defining the Real Servers (RIPs) 1. Using the web user interface, navigate to Cluster Configuration > Layer 7 Real Servers and click on Add a new Real Server next to the newly created VIP 2. Define the Label for the real server as required, e.g. HTTPS-10000_Service 3. Set the Real Server IP Address field to the IP address that is used to access the service in question from the Metaswitch EAS deployment. In this example, the IP address used is Page 14

15 Appliance Configuration for the WAF Gateway with Metaswitch EAS DSS/SSS 4. Set the Real Server Port field to the port that the service in question is listening on, e.g Click Update STEP 2: CREATING THE WAF GATEWAY 1. Using the web user interface, navigate to Cluster Configuration > WAF Gateway and click on Add a new WAF gateway 2. From the Select Layer 7 Virtual Service drop-down list, select the associated layer 7 service that was created in step 1, which in this example is HTTPS Click Update to create the WAF gateway 4. Navigate to Cluster Configuration > WAF Manual Configuration 5. Using the drop-down list, select the WAF gateway that was just created, e.g. WAF-HTTPS The existing default WAF configuration will appear in the text box 6. Paste your custom Metaswitch EAS WAF configuration into the text box Note: Two complete Metaswitch EAS WAF configurations, based on custom rule sets, are presented in Appendix 1: WAF Configurations and Rule Sets. Either of these configurations can be copy and pasted into the text box in their entirety. 7. Click Update to save the manual WAF configuration STEP 3: UPLOADING THE CERTIFICATE If the appropriate certificate for the service in question has not already been uploaded to the load balancer then this must be done for TLS/SSL termination to work on the load balancer. The process for doing this is Page 15

16 Appliance Configuration for the WAF Gateway with Metaswitch EAS DSS/SSS as follows: 1. Using the web user interface, navigate to Cluster Configuration > SSL Certificate and click on Add a new SSL Certificate 2. Press the Upload prepared PEM/PFX file radio button 3. Define the Label for the certificate as required. It may make sense to use the domain that the certificate is associated to, e.g. northwest-telco.com 4. Click on Browse and select the appropriate PEM or PFX style certificate 5. If uploading a PFX certificate, enter the certificate s password in the PFX File Password field 6. Click Upload certificate Further information on creating PEM files and converting between certificate formats is presented in our Administration Manual: STEP 4: CREATING THE TLS/SSL TERMINATION 1. Using the web user interface, navigate to Cluster Configuration > SSL Termination and click on Add a new Virtual Service 2. From the Associated Virtual Service drop-down list, select the associated WAF gateway that was created in step 2, which in this example is WAF-HTTPS Set the Virtual Service Port field to the port that the service in question is listening on, e.g From the SSL Certificate drop-down list, select the certificate for the service in question, which in this example is northwest-telco.com 5. Click Update to create the TLS/SSL termination service FINALIZING THE CONFIGURATION To apply the new settings, HAProxy, the WAF service, and stunnel must be restarted as follows: 1. Using the WebUI, navigate to: Maintenance > Restart Services and click Reload HAProxy 2. On the Restart Services page, click Reload WAF 3. On the Restart Services page, click Reload STunnel Page 16

17 Custom WAF Rule Set Description 11. Custom WAF Rule Set Description Five custom WAF rules have been developed to protect a Metaswitch EAS DSS/SSS deployment. These rules are presented and described individually in the sections below. Two complete WAF rule sets are presented in their entirety at the end of this document: A rule set for use where users have unique IP addresses: the General Rule Set on page 22 A rule set for use where a significant proportion of users share the same IP address: the NAT Deployment Rule Set on page 26 WHITELISTED RULES To enable a Metaswitch EAS DSS/SSS deployment to work correctly with WAF gateways, it is necessary to whitelist some rules from the standard WAF OWASP ModSecurity core rule set (further details about this can be found in the WAF OWASP Protection section on page 19). The whitelisted rules prevent genuine, safe Metaswitch EAS traffic from being blocked. The set of whitelisted rules can be found at the top of each Metaswitch specific rule set. RULE 1: DOS PROTECTION FOR LOGIN.HTML This rule is not recommended for use in deployments where a significant proportion of users share the same IP address, such as where NAT is taking place at a firewall or router. The IP DOS for login forms. It records all access to login.html pages. Regardless of whether access is via a GET or a POST request method, any access to this URL will increment a counter. Increment counter "ip.dos_counter" per page hit If counter = 200+ set "ip.dos_block" = "1" which restricts access Both counters reset after 60s SecRule SCRIPT_FILENAME "@rx ^.*login.html$" \ "phase:5,chain,t:none,nolog,pass,id: ,severity:'info',tag:'dos', \ setvar:ip.dos_counter=+1,expirevar:ip.dos_counter=60" SecRule IP:dos_counter "@gt 200" "t:none,setvar:ip.dos_block, \ expirevar:ip.dos_block=60,setvar:ip.dos_counter=0" RULE 2: DETECT FAILED LOGIN AND BLOCK This rule is not recommended for use in deployments where a significant proportion of users share the same IP address, such as where NAT is taking place at a firewall or router. This is an aggressive rule to block actual failed logins. It detects the presence of either error=authenticationfailed or error=retrylimitexceeded in the response headers and increments a counter. Increment counter "ip.authfail-retrylimit_counter" per detected failed login If counter = 20+ set "ip.authfail-retrylimit_block" = "1" which restricts access ip.authfail-retrylimit_counter decrements 1 every 300s ip.authfail-retrylimit_block counter reset after 600s SecRule RESPONSE_HEADERS:Location "@contains error=authenticationfailed" \ "phase:5,id: ,chain,t:none,nolog,pass, \ setvar:ip.authfail-retrylimit_counter=+1,deprecatevar:ip.authfail-retrylimit_counter=1/300" SecRule ip:authfail-retrylimit_counter "@gt 20" "t:none,setvar:ip.authfailretrylimit_block=1, \ Page 17

18 Custom WAF Rule Set Description expirevar:ip.authfail-retrylimit_block=600,setvar:ip.authfail-retrylimit_counter=0" SecRule RESPONSE_HEADERS:Location error=retrylimitexceeded" \ "phase:5,id: ,chain,t:none,nolog,pass, \ setvar:ip.authfail-retrylimit_counter=+1,deprecatevar:ip.authfail-retrylimit_counter=1/300" SecRule ip:authfail-retrylimit_counter "@gt 20" "t:none,setvar:ip.authfailretrylimit_block=1, \ expirevar:ip.authfail-retrylimit_block=600,setvar:ip.authfail-retrylimit_counter=0" RULE 3: DOS PROTECTION POST TO /LOGIN This rule is not recommended for use in deployments where a significant proportion of users share the same IP address, such as where NAT is taking place at a firewall or router. This increments a counter per POST request to /login. This only considers POST requests. It should be far more aggressive and can be set much lower than the generic DOS block. Increment counter "ip.postreq_counter" per POST attempt If counter = 200+ set "ip.postreq_block" = "1" which restricts access ip.postreq_counter decrements 1 every 180s ip.postreq_block counter reset after 600s SecRule REQUEST_METHOD "^POST$" "phase:2,chain,t:none,nolog,pass, \ setvar:ip.postreq_counter=+1,deprecatevar:ip.postreq_counter=1/180,id: " SecRule ip:postreq_counter "@gt 200" "t:none,setvar:ip.postreq_block=1, \ expirevar:ip.postreq_block=600,setvar:ip.postreq_counter=0" RULE 4: DETECT USERNAME ABUSE AND BLOCK This detects username based abuse. It detects when the same username is used in multiple POST requests and increments a counter. This rule is written so that it will only apply to IP addresses that have more than 2 login failures recorded against them from Rule 2: Detect Failed Login and Block. If counter authfail-retrylimit_counter > 2 (i.e. the IP address already has more than 2 failed logins against it) Increment counter "user.username_counter" per attempt using the same username If counter = 20+ set "user.username_block" = "1" which restricts access user.username_counter decrements 1 every 180s user.username_block counter reset after 600s SecRule REQUEST_METHOD "^POST$" "phase:2,chain,t:none,nolog,pass,id: " SecRule ip:authfail-retrylimit_counter "@gt 2" "t:none,chain,setvar:user.username_counter=+1, \ deprecatevar:user.username_counter=1/180" SecRule user:username_counter "@gt 20" "t:none,setvar:user.username_block=1, \ expirevar:user.username_block=600,setvar:user.username_counter=0" RULE 5: DETECT PASSWORD ABUSE AND BLOCK This detects password based abuse. It detects when the same password is used in multiple POST requests and increment a counter. This rule is written so that it will only apply to IP addresses that have more than 2 login failures recorded against them from Rule 2: Detect Failed Login and Block. If counter authfail-retrylimit_counter > 2 (i.e. the IP address already has more than 2 failed logins against it) Page 18

19 Custom WAF Rule Set Description Increment counter "global.password_counter" per attempt using the same password If counter = 20+ set "global.password_block" = "1" which restricts access global.password_counter decrements 1 every 180s global.password_block counter reset after 600s SecRule REQUEST_METHOD "^POST$" "phase:2,chain,t:none,nolog,pass,id: " SecRule ip:authfail-retrylimit_counter "@gt 2" "t:none,chain,setvar:global.password_counter=+1, \ deprecatevar:global.password_counter=1/180" SecRule global:password_counter "@gt 20" "t:none,setvar:global.password_block=1, \ expirevar:global.password_block=600,setvar:global.password_counter=0" 12. WAF OWASP Protection The WAF service included on Loadbalancer.org appliances is based on the ModSecurity open source project. The default vulnerability rule set is based on the OWASP Top 10 (Open Web Application Security Project Top 10). This defines ten areas of vulnerability that can affect web applications. These are summarized in the following section. OWASP TOP 10 APPLICATION SECURITY RISKS: 2017 Category A1 Injection A2 Broken Authentication A3 Sensitive Data Exposure A4 XML External Entities (XXE) A5 Broken Access Control A6 Security Misconfiguration Description Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities temporarily or permanently. Many web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and PII. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser. Many older or poorly configured XML processors evaluate external entity references within XML documents. External entities can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks. Restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can exploit these flaws to access unauthorized functionality and/ or data, such as access other users' accounts, view sensitive files, modify other users' data, change access rights, etc. Security misconfiguration is the most commonly seen issue. This is commonly a result of insecure default configurations, incomplete or ad hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose error messages containing sensitive information. Not only must all operating systems, frameworks, libraries, and Page 19

20 WAF OWASP Protection applications be securely configured, but they must be patched/upgraded in a timely fashion. A7 Cross-Site Scripting (XSS) A8 Insecure Deserialization A9 Using Components with Known Vulnerabilities A10 Insufficient Logging and Monitoring XSS flaws occur whenever an application includes untrusted data in a new web page without proper validation or escaping, or updates an existing web page with usersupplied data using a browser API that can create HTML or JavaScript. XSS allows attackers to execute scripts in the victim's browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites. Insecure deserialization often leads to remote code execution. Even if deserialization flaws do not result in remote code execution, they can be used to perform attacks, including replay attacks, injection attacks, and privilege escalation attacks. Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover. Applications and APIs using components with known vulnerabilities may undermine application defenses and enable various attacks and impacts. Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring. 13. Testing & Verification METASWITCH SPECIFIC FAIL OVER / HIGH AVAILABILITY TEST This test is disruptive to end users and should not be run on a live production system. If using a highly available pair of load balancers, the fail over functionality between them can be tested. 1. Log into the CommPortal web interface through the WAF gateway protected IP address 2. Trigger a fail over from your active load balancer to your passive load balancer. You could force this by powering off the active load balancer 3. Press Ctrl+F5 in browser to force refresh the CommPortal page 4. Once a successful fail over has taken place, the passive load balancer will become active and will start serving traffic. The browser should show the CommPortal again. Note that a new log in may need to be performed following a fail over USING SYSTEM OVERVIEW The System Overview can be viewed in the WebUI. It shows a graphical view of all VIPs & RIPs (i.e. the EAS servers and WAF gateways) and shows the state/health of each server as well as the state of the each cluster as a whole. The example below shows that all EAS servers and WAF gateways are healthy and available to accept connections. Page 20

21 Testing & Verification 14. Technical Support For more details about configuring the appliance and assistance with designing your deployment please don't hesitate to contact the support team using the following address: 15. Further Documentation The Administration Manual contains much more information about configuring and deploying the appliance. It's available here: Conclusion Loadbalancer.org appliances provide a very cost effective solution for putting a highly available WAF gateway solution in front of Metaswitch EAS DSS/SSS environments. Page 21

22 Appendix 17. Appendix 1 WAF CONFIGURATIONS AND RULE SETS GENERAL RULE SET Note: Copy and pasting this rule set from this document will likely result in the loss of formatting, such as tabs and line breaks. The rule set can be downloaded as a text file from the following link, which will preserve all formatting: Metaswitch Custom WAF Gateway Rule Set General Rule Set v1.1 (October 2018) Whitelisted rules These rules must be whitelisted to allow genuine Metaswitch connections to work <LocationMatch ^.*/login$> SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/login.html$> SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/main.html$> SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/home.html$> SecRuleRemoveById <LocationMatch ^.*/clientlog.gif$> SecRuleRemoveById Page 22

23 Appendix SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/analytics.gif$> SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/data$> SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/messages.html$> SecRuleRemoveById <LocationMatch ^.*/settings.html$> SecRuleRemoveById <LocationMatch ^.*/includes/scripts/loader.js$> SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/department/departments.html$> SecRuleRemoveById <LocationMatch ^/favicon.ico$> SecRuleRemoveById SecRuleRemoveById Page 23

24 Appendix -- Set the variables needed for checking Grab the variables that are needed for rule checking later on Rule IDs: 5,000,000-5,000,999 Check the source IP ADDRESS SecAction phase:1,nolog,pass,initcol:ip=%{remote_addr},id: Check the USERNAME being used SecAction phase:2,nolog,pass,initcol:user=%{args.directorynumber},id: Check the PASSWORD being used SecAction phase:2,nolog,pass,initcol:global=%{args.password},id: Blocking and logging rules These rules are responsible for implementing the blocks and writing to the log file Rule IDs: 5,001,000-5,001, Rule 1: DOS prottection for login.html (count page hits) SecRule ip:dos_block 0" \ "phase:2,block,status:401,log,id: , \ setvar:tx.anomaly_score=+%{tx.critical_anomaly_score}, \ setvar:tx.%{rule.id}-customrule, \ msg:'metaswitch RULE 1: USERNAME %{ARGS.DirectoryNumber} is blocked due to high connection rate.'" -- Rule 2: Detect failed login and block SecRule ip:authfail-retrylimit_block "@gt 0" \ "phase:2,block,status:401,log,id: , \ setvar:tx.anomaly_score=+%{tx.critical_anomaly_score}, \ setvar:tx.%{rule.id}-customrule, \ msg:'metaswitch RULE 2: USERNAME %{ARGS.DirectoryNumber} is BLOCKED for 10 minutes, more than 20 failed login attempts in 5 minutes.'" -- Rule 3: DOS proection POST requests to /login SecRule ip:postreq_block "@gt 0" \ "block,status:401,log,id: , \ setvar:tx.anomaly_score=+%{tx.critical_anomaly_score}, \ setvar:tx.%{rule.id}-customrule, \ msg:'metaswitch RULE 3: IP ADDRESS %{REMOTE_ADDR} BLOCKED for 10 minutes, more than 200 login attempts in 5 minutes.'" -- Rule 4: Detect username abuse and block SecRule user:username_block "@gt 0" \ Page 24

25 Appendix "phase:2,deny,status:401,log,id: , \ setvar:tx.anomaly_score=+%{tx.critical_anomaly_score}, \ setvar:tx.%{rule.id}-customrule, \ msg:'metaswitch RULE 4: USERNAME %{ARGS.DirectoryNumber} is BLOCKED for 10 minutes, more than 20 login attempts in 3 minutes.'" -- Rule 5: Detect password abuse and block SecRule global:password_block "@gt 0" \ "phase:2,deny,status:401,log,id: , \ setvar:tx.anomaly_score=+%{tx.critical_anomaly_score}, \ setvar:tx.%{rule.id}-customrule, \ msg:'metaswitch RULE 5: USERNAME %{ARGS.DirectoryNumber} is BLOCKED for 10 minutes, more than 20 login attempts in 3 minutes.'" -- Detection rules These rules are responsible for the actual scanning and detection Rule IDs: 5,002,000-5,002, Rule 1: DOS prottection for login.html (count page hits) SecRule SCRIPT_FILENAME "@rx ^.*login.html$" \ "phase:5,chain,t:none,nolog,pass,id: ,severity:'info',tag:'dos', \ setvar:ip.dos_counter=+1,expirevar:ip.dos_counter=60" SecRule IP:dos_counter "@gt 200" "t:none,setvar:ip.dos_block, \ expirevar:ip.dos_block=60,setvar:ip.dos_counter=0" The following rules apply to a specific location <LocationMatch ^.*/login$> -- Rule 2a: Detect failed login and block (error=authenticationfailed) SecRule RESPONSE_HEADERS:Location "@contains error=authenticationfailed" \ "phase:5,id: ,chain,t:none,nolog,pass, \ setvar:ip.authfail-retrylimit_counter=+1,deprecatevar:ip.authfail-retrylimit_counter=1/300" SecRule ip:authfail-retrylimit_counter "@gt 20" "t:none,setvar:ip.authfailretrylimit_block=1, \ expirevar:ip.authfail-retrylimit_block=600,setvar:ip.authfail-retrylimit_counter=0" -- Rule 2b: Detect failed login and block (error=retrylimitexceeded) SecRule RESPONSE_HEADERS:Location "@contains error=retrylimitexceeded" \ "phase:5,id: ,chain,t:none,nolog,pass, \ setvar:ip.authfail-retrylimit_counter=+1,deprecatevar:ip.authfail-retrylimit_counter=1/300" SecRule ip:authfail-retrylimit_counter "@gt 20" "t:none,setvar:ip.authfailretrylimit_block=1, \ expirevar:ip.authfail-retrylimit_block=600,setvar:ip.authfail-retrylimit_counter=0" -- Rule 3: DOS proection POST requests to /login (count POST requests) SecRule REQUEST_METHOD "^POST$" "phase:2,chain,t:none,nolog,pass, \ setvar:ip.postreq_counter=+1,deprecatevar:ip.postreq_counter=1/180,id: " Page 25

26 Appendix SecRule ip:postreq_counter 200" "t:none,setvar:ip.postreq_block=1, \ expirevar:ip.postreq_block=600,setvar:ip.postreq_counter=0" -- Rule 4: Detect username abuse and block SecRule REQUEST_METHOD "^POST$" "phase:2,chain,t:none,nolog,pass,id: " SecRule ip:authfail-retrylimit_counter "@gt 2" "t:none,chain,setvar:user.username_counter=+1, \ deprecatevar:user.username_counter=1/180" SecRule user:username_counter "@gt 20" "t:none,setvar:user.username_block=1, \ expirevar:user.username_block=600,setvar:user.username_counter=0" -- Rule 5: Detect password abuse and block SecRule REQUEST_METHOD "^POST$" "phase:2,chain,t:none,nolog,pass,id: " SecRule ip:authfail-retrylimit_counter "@gt 2" "t:none,chain,setvar:global.password_counter=+1, \ deprecatevar:global.password_counter=1/180" SecRule global:password_counter "@gt 20" "t:none,setvar:global.password_block=1, \ expirevar:global.password_block=600,setvar:global.password_counter=0" Close the location tag NAT DEPLOYMENT RULE SET Note: Copy and pasting this rule set from this document will likely result in the loss of formatting, such as tabs and line breaks. The rule set can be downloaded as a text file from the following link, which will preserve all formatting: Metaswitch Custom WAF Gateway Rule Set NAT Deployment Rule Set v1.1 (October 2018) Whitelisted rules These rules must be whitelisted to allow genuine Metaswitch connections to work <LocationMatch ^.*/login$> SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById Page 26

27 Appendix <LocationMatch ^.*/login.html$> SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/main.html$> SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/home.html$> SecRuleRemoveById <LocationMatch ^.*/clientlog.gif$> SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/analytics.gif$> SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/data$> SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/messages.html$> Page 27

28 Appendix SecRuleRemoveById <LocationMatch ^.*/settings.html$> SecRuleRemoveById <LocationMatch ^.*/includes/scripts/loader.js$> SecRuleRemoveById SecRuleRemoveById <LocationMatch ^.*/department/departments.html$> SecRuleRemoveById <LocationMatch ^/favicon.ico$> SecRuleRemoveById SecRuleRemoveById Set the variables needed for checking Grab the variables that are needed for rule checking later on Rule IDs: 5,000,000-5,000,999 Check the source IP ADDRESS SecAction phase:1,nolog,pass,initcol:ip=%{remote_addr},id: Check the USERNAME being used SecAction phase:2,nolog,pass,initcol:user=%{args.directorynumber},id: Check the PASSWORD being used SecAction phase:2,nolog,pass,initcol:global=%{args.password},id: Blocking and logging rules These rules are responsible for implementing the blocks and writing to the log file Rule IDs: 5,001,000-5,001, Rule 4: Detect username abuse and block SecRule user:username_block 0" \ "phase:2,deny,status:401,log,id: , \ setvar:tx.anomaly_score=+%{tx.critical_anomaly_score}, \ setvar:tx.%{rule.id}-customrule, \ msg:'metaswitch RULE 4: USERNAME %{ARGS.DirectoryNumber} is BLOCKED for 10 minutes, more than 20 login attempts in 3 minutes.'" Page 28

29 Appendix -- Rule 5: Detect password abuse and block SecRule global:password_block 0" \ "phase:2,deny,status:401,log,id: , \ setvar:tx.anomaly_score=+%{tx.critical_anomaly_score}, \ setvar:tx.%{rule.id}-customrule, \ msg:'metaswitch RULE 5: USERNAME %{ARGS.DirectoryNumber} is BLOCKED for 10 minutes, more than 20 login attempts in 3 minutes.'" -- Detection rules These rules are responsible for the actual scanning and detection Rule IDs: 5,002,000-5,002,999 The following rules apply to a specific location <LocationMatch ^.*/login$> -- Rule 2a: Detect failed login and block (error=authenticationfailed) SecRule RESPONSE_HEADERS:Location "@contains error=authenticationfailed" \ "phase:5,id: ,chain,t:none,nolog,pass, \ setvar:ip.authfail-retrylimit_counter=+1,deprecatevar:ip.authfail-retrylimit_counter=1/300" SecRule ip:authfail-retrylimit_counter "@gt 20" "t:none,setvar:ip.authfailretrylimit_block=1, \ expirevar:ip.authfail-retrylimit_block=600,setvar:ip.authfail-retrylimit_counter=0" -- Rule 2b: Detect failed login and block (error=retrylimitexceeded) SecRule RESPONSE_HEADERS:Location "@contains error=retrylimitexceeded" \ "phase:5,id: ,chain,t:none,nolog,pass, \ setvar:ip.authfail-retrylimit_counter=+1,deprecatevar:ip.authfail-retrylimit_counter=1/300" SecRule ip:authfail-retrylimit_counter "@gt 20" "t:none,setvar:ip.authfailretrylimit_block=1, \ expirevar:ip.authfail-retrylimit_block=600,setvar:ip.authfail-retrylimit_counter=0" -- Rule 4: Detect username abuse and block SecRule REQUEST_METHOD "^POST$" "phase:2,chain,t:none,nolog,pass,id: " SecRule ip:authfail-retrylimit_counter "@gt 2" "t:none,chain,setvar:user.username_counter=+1, \ deprecatevar:user.username_counter=1/180" SecRule user:username_counter "@gt 20" "t:none,setvar:user.username_block=1, \ expirevar:user.username_block=600,setvar:user.username_counter=0" -- Rule 5: Detect password abuse and block SecRule REQUEST_METHOD "^POST$" "phase:2,chain,t:none,nolog,pass,id: " SecRule ip:authfail-retrylimit_counter "@gt 2" "t:none,chain,setvar:global.password_counter=+1, \ deprecatevar:global.password_counter=1/180" SecRule global:password_counter "@gt 20" "t:none,setvar:global.password_block=1, \ expirevar:global.password_block=600,setvar:global.password_counter=0" Page 29

30 Appendix Close the location tag Page 30

31 Appendix 2 CLUSTERED PAIR CONFIGURATION ADDING A SLAVE UNIT If you initially configured just the master unit and now need to add a slave - our recommended procedure, please refer to the relevant section below for more details: Note: A number of settings are not replicated as part of the master/slave pairing process and therefore must be manually configured on the slave appliance. These are listed below: Hostname & DNS settings Network settings including IP addresses, bonding configuration and VLANs Routing configuration including default gateways and static routes Date & time settings Physical Advanced Configuration settings including Internet Proxy IP address & port, Firewall table size, SMTP relay and Syslog server SNMP settings Graphing settings Firewall Script & Firewall Lockdown Script settings Software updates Version 7: Please refer to Chapter 8 Appliance Clustering for HA in the v7 Administration Manual. Version 8: To add a slave node i.e. create a highly available clustered pair: Deploy a second appliance that will be the slave and configure initial network settings Using the WebUI, navigate to: Cluster Configuration > High-Availability Configuration Page 31

32 Appendix Specify the IP address and the loadbalancer users password (the default is 'loadbalancer') for the slave (peer) appliance as shown above Click Add new node The pairing process now commences as shown below: Once complete, the following will be displayed: To finalize the configuration, restart heartbeat and any other services as prompted in the blue message box at the top of the screen Note: Clicking the Restart Heartbeat button on the master appliance will also automatically restart heartbeat on the slave appliance. Note: Please refer to chapter 9 Appliance Clustering for HA in the Administration Manual for more detailed information on configuring HA with 2 appliances. Page 32

33 Appendix 3 COMPANY CONTACT INFORMATION Website URL: North America (US) Loadbalancer.org, Inc Lancaster Pike, Suite 120 Wilmington DE USA Tel: Fax: (sales): (support): sales@loadbalancer.org support@loadbalancer.org North America (Canada) Loadbalancer.org Ltd Richards Street Vancouver, BC V6B 2Z4 Canada Tel: Fax: (sales): (support): sales@loadbalancer.org support@loadbalancer.org Europe (UK) Loadbalancer.org Ltd. Compass House North Harbour Business Park Portsmouth, PO6 4PS UK Tel: Fax: (sales): (support): +44 (0) (0) sales@loadbalancer.org support@loadbalancer.org Europe (Germany) Loadbalancer.org GmbH Tengstraße 27 D München Germany Tel: Fax: (sales): (support): +49 (0) (0) vertrieb@loadbalancer.org support@loadbalancer.org Page 33

Load Balancing RSA Authentication Manager. Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing RSA Authentication Manager. Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing RSA Authentication Manager Deployment Guide v1.2.2 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents 1. About this Guide...3 2. Loadbalancer.org Appliances Supported...3 3. Loadbalancer.org

More information

Load Balancing Microsoft OCS Deployment Guide v Copyright Loadbalancer.org

Load Balancing Microsoft OCS Deployment Guide v Copyright Loadbalancer.org Load Balancing Microsoft OCS 2007 Deployment Guide v1.5.2 Copyright Loadbalancer.org Table of Contents 1. About this Guide...3 2. Loadbalancer.org Appliances Supported...3 3. Loadbalancer.org Software

More information

Load Balancing Fujifilm SYNAPSE. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Fujifilm SYNAPSE. Deployment Guide v Copyright Loadbalancer.org Load Balancing Fujifilm SYNAPSE Deployment Guide v0.1 Copyright Loadbalancer.org Table of Contents 2. 3. 4. 5. 6. About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org Software

More information

Load Balancing Censornet USS Gateway. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Censornet USS Gateway. Deployment Guide v Copyright Loadbalancer.org Load Balancing Censornet USS Gateway Deployment Guide v1.0.0 Copyright Loadbalancer.org Table of Contents 1. About this Guide...3 2. Loadbalancer.org Appliances Supported...3 3. Loadbalancer.org Software

More information

Load Balancing OKI DICOM-Embedded Printers. Deployment Guide v Copyright Loadbalancer.org

Load Balancing OKI DICOM-Embedded Printers. Deployment Guide v Copyright Loadbalancer.org Load Balancing OKI DICOM-Embedded Printers Deployment Guide v1.0.1 Copyright Loadbalancer.org Table of Contents 1. About this Guide...3 2. Loadbalancer.org Appliances Supported...3 3. Loadbalancer.org

More information

Load Balancing Bloxx Web Filter. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Bloxx Web Filter. Deployment Guide v Copyright Loadbalancer.org Load Balancing Bloxx Web Filter Deployment Guide v1.3.5 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software Versions

More information

Load Balancing Microsoft AD FS. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Microsoft AD FS. Deployment Guide v Copyright Loadbalancer.org Load Balancing Microsoft AD FS Deployment Guide v1.3.1 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software Versions

More information

Load Balancing Web Proxies / Filters / Gateways. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Web Proxies / Filters / Gateways. Deployment Guide v Copyright Loadbalancer.org Load Balancing Web Proxies / Filters / Gateways Deployment Guide v1.6.5 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Load Balancing VMware Horizon View. Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing VMware Horizon View. Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing VMware Horizon View Deployment Guide v3.3 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Load Balancing Microsoft Sharepoint 2010 / Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Microsoft Sharepoint 2010 / Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Microsoft Sharepoint 2010 / 2013 Deployment Guide v1.5.2 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4

More information

Load Balancing Microsoft AD FS. Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Microsoft AD FS. Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Microsoft AD FS Deployment Guide v1.2.3 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Load Balancing Nuance AutoStore. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Nuance AutoStore. Deployment Guide v Copyright Loadbalancer.org Load Balancing Nuance AutoStore Deployment Guide v1.0.1 Copyright Loadbalancer.org Table of Contents 1. About this Guide...3 2. Loadbalancer.org Appliances Supported...3 3. Loadbalancer.org Software Versions

More information

Load Balancing Microsoft 2012 DirectAccess. Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Microsoft 2012 DirectAccess. Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Microsoft 2012 DirectAccess Deployment Guide v1.1.2 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Copyright

Copyright 1 Security Test EXTRA Workshop : ANSWER THESE QUESTIONS 1. What do you consider to be the biggest security issues with mobile phones? 2. How seriously are consumers and companies taking these threats?

More information

Load Balancing Microsoft Terminal Services. Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Microsoft Terminal Services. Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Microsoft Terminal Services Deployment Guide v2 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Load Balancing Medical Imaging & Information System Protocols. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Medical Imaging & Information System Protocols. Deployment Guide v Copyright Loadbalancer.org Load Balancing Medical Imaging & Information System Protocols Deployment Guide v1.1.2 Copyright Loadbalancer.org Table of Contents 1. About this Guide...3 2. Loadbalancer.org Appliances Supported...3 3.

More information

Load Balancing Sage X3 ERP. Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Sage X3 ERP. Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Sage X3 ERP Deployment Guide v1.0.1 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents 1. About this Guide...3 2. Deployment...3 3. Initial Setup...3 Accessing the Loadbalancer.org

More information

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati OWASP TOP 10 2017 Release Andy Willingham June 12, 2018 OWASP Cincinnati Agenda A quick history lesson The Top 10(s) Web Mobile Privacy Protective Controls Why have a Top 10? Software runs the world (infrastructure,

More information

Microsoft Sharepoint 2010 Deployment Guide

Microsoft Sharepoint 2010 Deployment Guide Microsoft Sharepoint 2010 Deployment Guide v1.2.6 Copyright 2013 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 4 Appliances Supported... 4 Microsoft Sharepoint Software Versions Supported...4

More information

Load Balancing Microsoft IIS. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Microsoft IIS. Deployment Guide v Copyright Loadbalancer.org Load Balancing Microsoft IIS Deployment Guide v1.6.4 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software Versions

More information

Load Balancing Microsoft Remote Desktop Services. Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Microsoft Remote Desktop Services. Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Microsoft Remote Desktop Services Deployment Guide v2.2 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Load Balancing Web Servers with OWASP Top 10 WAF in Azure

Load Balancing Web Servers with OWASP Top 10 WAF in Azure Load Balancing Web Servers with OWASP Top 10 WAF in Azure Quick Reference Guide v1.0.3 ABOUT THIS GUIDE This document provides a quick reference guide on how to load balance Web Servers and configure a

More information

Load Balancing Nginx Web Servers with OWASP Top 10 WAF in Azure

Load Balancing Nginx Web Servers with OWASP Top 10 WAF in Azure Load Balancing Nginx Web Servers with OWASP Top 10 WAF in Azure Quick Reference Guide v1.0.2 ABOUT THIS GUIDE This document provides a quick reference guide on how to load balance Nginx Web Servers and

More information

Load Balancing Web Servers with OWASP Top 10 WAF in AWS

Load Balancing Web Servers with OWASP Top 10 WAF in AWS Load Balancing Web Servers with OWASP Top 10 WAF in AWS Quick Reference Guide V1.0.1 ABOUT THIS GUIDE This document provides a quick reference guide on how to load balance Web Servers and configure a WAF

More information

Load Balancing Nginx Web Servers with OWASP Top 10 WAF in AWS

Load Balancing Nginx Web Servers with OWASP Top 10 WAF in AWS Load Balancing Nginx Web Servers with OWASP Top 10 WAF in AWS Quick Reference Guide V1.0.2 ABOUT THIS GUIDE This document provides a quick reference guide on how to load balance Nginx Web Servers and configure

More information

Load Balancing Microsoft IIS. Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Microsoft IIS. Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Microsoft IIS Deployment Guide v5.2 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software

More information

OWASP Top 10. Copyright 2017 Ergon Informatik AG 2/13

OWASP Top 10. Copyright 2017 Ergon Informatik AG 2/13 Airlock and the OWASP TOP 10-2017 Version 2.1 11.24.2017 OWASP Top 10 A1 Injection... 3 A2 Broken Authentication... 5 A3 Sensitive Data Exposure... 6 A4 XML External Entities (XXE)... 7 A5 Broken Access

More information

Load Balancing Microsoft Remote Desktop Services. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Microsoft Remote Desktop Services. Deployment Guide v Copyright Loadbalancer.org Load Balancing Microsoft Remote Desktop Services Deployment Guide v2.0.2 Copyright Loadbalancer.org Table of Contents About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Enterprise Azure Quick Start Guide v8.3.0

Enterprise Azure Quick Start Guide v8.3.0 Enterprise Azure Quick Start Guide v8.3.0 Rev. 1.0.0 Copyright Loadbalancer.org Table of Contents 1. Introduction...3 2. About Enterprise Azure...3 Main Differences to the Non-Cloud Product...3 Why use

More information

Load Balancing Microsoft Lync 2010 / Deployment Guide v Copyright Loadbalancer.org

Load Balancing Microsoft Lync 2010 / Deployment Guide v Copyright Loadbalancer.org Load Balancing Microsoft Lync 2010 / 2013 Deployment Guide v1.7.2 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software

More information

OWASP Top 10 The Ten Most Critical Web Application Security Risks

OWASP Top 10 The Ten Most Critical Web Application Security Risks OWASP Top 10 The Ten Most Critical Web Application Security Risks The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain

More information

LB Cache Quick Start Guide v1.0

LB Cache Quick Start Guide v1.0 LB Cache Quick Start Guide v1.0 Rev. 1.1.0 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents Introduction...3 About LBCache...3 Amazon Terminology...3 Getting Started...3 Deployment Concepts...4

More information

C1: Define Security Requirements

C1: Define Security Requirements OWASP Top 10 Proactive Controls IEEE Top 10 Software Security Design Flaws OWASP Top 10 Vulnerabilities Mitigated OWASP Mobile Top 10 Vulnerabilities Mitigated C1: Define Security Requirements A security

More information

Load Balancing Microsoft Exchange Deployment Guide v Copyright Loadbalancer.org

Load Balancing Microsoft Exchange Deployment Guide v Copyright Loadbalancer.org Load Balancing Microsoft Exchange 2016 Deployment Guide v2 Copyright Loadbalancer.org Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software Versions

More information

Load Balancing Nuance Equitrac. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Nuance Equitrac. Deployment Guide v Copyright Loadbalancer.org Load Balancing Nuance Equitrac Deployment Guide v1.0.0 Copyright Loadbalancer.org Table of Contents 1. About this Guide...3 2. Loadbalancer.org Appliances Supported...3 3. Loadbalancer.org Software Versions

More information

OWASP TOP OWASP TOP

OWASP TOP OWASP TOP ANALYZING THE OWASP TOP 10 TOP APPLICATION SECURITY THREATS & HOW TO MITIGATE THEM Cars require seatbelts. Pill bottles need safety caps. Applications need web application firewalls, and for good reason.

More information

Introduction F rom a management perspective, application security is a difficult topic. Multiple parties within an organization are involved, as well

Introduction F rom a management perspective, application security is a difficult topic. Multiple parties within an organization are involved, as well Simplifying Application Security and Compliance with the OWASP Top 10 AN EXECUTIVE PERSPECTIVE Introduction F rom a management perspective, application security is a difficult topic. Multiple parties within

More information

Load Balancing Microsoft Exchange Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Microsoft Exchange Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Microsoft Exchange 2016 Deployment Guide v1.1.3 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Loadbalancer.org Virtual Appliance quick start guide v6.3

Loadbalancer.org Virtual Appliance quick start guide v6.3 Loadbalancer.org Virtual Appliance quick start guide v6.3 What are your objectives?...2 What is the difference between a one-arm and a two-arm configuration?...2 What are the different load balancing methods

More information

Aguascalientes Local Chapter. Kickoff

Aguascalientes Local Chapter. Kickoff Aguascalientes Local Chapter Kickoff juan.gama@owasp.org About Us Chapter Leader Juan Gama Application Security Engineer @ Aspect Security 9+ years in Appsec, Testing, Development Maintainer of OWASP Benchmark

More information

Load Balancing Microsoft Exchange Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Microsoft Exchange Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Microsoft Exchange 2013 Deployment Guide v1.4.3 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Load Balancing Xerox Print Servers. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Xerox Print Servers. Deployment Guide v Copyright Loadbalancer.org Load Balancing Xerox Print Servers Deployment Guide v1.0.0 Copyright Loadbalancer.org Table of Contents 1. About this Guide...3 2. Loadbalancer.org Appliances Supported...3 3. Loadbalancer.org Software

More information

Appliance Quick Start Guide v8.0

Appliance Quick Start Guide v8.0 Appliance Quick Start Guide v8.0 rev. 1.0.6 Copyright 2002 2015 Loadbalancer.org, Inc Table of Contents About this Guide... 5 About the Appliance... 5 Appliance Configuration Overview... 5 Appliance Security...

More information

Appliance Quick Start Guide. v7.5

Appliance Quick Start Guide. v7.5 Appliance Quick Start Guide v7.5 rev. 1.0.8 Copyright 2002 2014 Loadbalancer.org, Inc. Table of Contents Loadbalancer.org Terminology... 4 What is a Virtual IP Address?... 4 What is a Floating IP Address?...

More information

Load Balancing Microsoft Exchange Deployment Guide v Copyright Loadbalancer.org

Load Balancing Microsoft Exchange Deployment Guide v Copyright Loadbalancer.org Load Balancing Microsoft Exchange 2010 Deployment Guide v1.9.2 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software

More information

Load Balancing Microsoft Skype For Business. Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Microsoft Skype For Business. Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Microsoft Skype For Business Deployment Guide v0.5 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org

More information

Load Balancing Microsoft Exchange Deployment Guide v Copyright Loadbalancer.org, Inc

Load Balancing Microsoft Exchange Deployment Guide v Copyright Loadbalancer.org, Inc Load Balancing Microsoft Exchange 2010 Deployment Guide v1.9.2 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

Loadbalancer.org. Loadbalancer.org appliance quick setup guide. v6.4

Loadbalancer.org. Loadbalancer.org appliance quick setup guide. v6.4 Loadbalancer.org Loadbalancer.org appliance quick setup guide v6.4 1 Confidentiality Statement All information contained in this proposal is provided in confidence for the sole purpose of adjudication

More information

Load Balancing FreePBX / Asterisk in AWS

Load Balancing FreePBX / Asterisk in AWS Load Balancing FreePBX / Asterisk in AWS Quick Reference Guide V1.0.1 ABOUT THIS GUIDE This document provides a quick reference guide on how to load balance FreePBX / Asterisk servers using the Enterprise

More information

OPEN WEB APPLICATION SECURITY PROJECT OWASP TOP 10 VULNERABILITIES

OPEN WEB APPLICATION SECURITY PROJECT OWASP TOP 10 VULNERABILITIES OPEN WEB APPLICATION SECURITY PROJECT OWASP TOP 10 VULNERABILITIES What is the OWASP Top 10? A list of the top ten web application vulnerabilities Determined by OWASP and the security community at large

More information

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any OWASP Top 10 Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any tester can (and should) do security testing

More information

Solutions Business Manager Web Application Security Assessment

Solutions Business Manager Web Application Security Assessment White Paper Solutions Business Manager Solutions Business Manager 11.3.1 Web Application Security Assessment Table of Contents Micro Focus Takes Security Seriously... 1 Solutions Business Manager Security

More information

Appliance Quick Start Guide v8.1

Appliance Quick Start Guide v8.1 Appliance Quick Start Guide v8.1 rev. 1.0.1 Copyright 2002 2016 Loadbalancer.org, Inc Table of Contents About this Guide... 4 About the Appliance... 4 Appliance Configuration Overview... 4 Appliance Security...

More information

Web Application Security. Philippe Bogaerts

Web Application Security. Philippe Bogaerts Web Application Security Philippe Bogaerts OWASP TOP 10 3 Aim of the OWASP Top 10 educate developers, designers, architects and organizations about the consequences of the most common web application security

More information

SonicWall Web Application Firewall 2.0. AWS Deployment Guide

SonicWall Web Application Firewall 2.0. AWS Deployment Guide SonicWall Web Application Firewall 2.0 AWS Deployment Guide Contents 1 Overview..........................................................................3 Before You Begin....................................................................4

More information

Appliance Quick Start Guide v7.1

Appliance Quick Start Guide v7.1 Appliance Quick Start Guide v7.1 Copyright 2002-2011 Loadbalancer.org, Inc. 1 2 Table of Contents Loadbalancer.org terminology... 4 What is a Virtual IP address?... 4 What is a Floating IP address?...

More information

Appliance Administration Manual. v7.2

Appliance Administration Manual. v7.2 Appliance Administration Manual v7.2 This document covers all required administration information for Loadbalancer.org appliances Copyright 2002-2012 Loadbalancer.org, Inc. 1 Table of Contents Section

More information

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi NetScaler Analysis and Reporting Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi (v4.0) Document Date: October 2016 www.goliathtechnologies.com 1 Legal Notices Goliath for

More information

Appliance Quick Start Guide v6.11

Appliance Quick Start Guide v6.11 Appliance Quick Start Guide v6.11 Copyright 2002-2011 Loadbalancer.org, Inc. 1 2 Table of Contents Loadbalancer.org terminology... 4 What is a virtual IP address?... 4 What is a floating IP address?...

More information

Appliance Quick Start Guide v8.0

Appliance Quick Start Guide v8.0 Appliance Quick Start Guide v8.0 rev. 1.0.6 Copyright 2002 2015 Loadbalancer.org, Inc Table of Contents About this Guide... 4 About the Appliance... 4 Appliance Configuration Overview... 4 Appliance Security...

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

Appliance Administration Manual. v7.1

Appliance Administration Manual. v7.1 Appliance Administration Manual v7.1 This document covers all required administration information for Loadbalancer.org appliances Copyright 2002-2011 Loadbalancer.org, Inc. 1 Table of Contents Section

More information

TIBCO Cloud Integration Security Overview

TIBCO Cloud Integration Security Overview TIBCO Cloud Integration Security Overview TIBCO Cloud Integration is secure, best-in-class Integration Platform as a Service (ipaas) software offered in a multi-tenant SaaS environment with centralized

More information

SOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management

SOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management SOLUTION BRIEF CA API MANAGEMENT Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management 2 SOLUTION BRIEF ENABLE AND PROTECT YOUR WEB APPLICATIONS WITH CA API MANAGEMENT ca.com

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

Appliance Administration v6.6

Appliance Administration v6.6 Appliance Administration v6.6 This document covers all the required administration information for the Loadbalancer.org appliances. Copyright Loadbalancer.org Ltd 1 Table of Contents Appliance Administration

More information

Appliance Administration Manual. v6.17

Appliance Administration Manual. v6.17 Appliance Administration Manual v6.17 This document covers all required administration information for Loadbalancer.org appliances Copyright 2002-2012 Loadbalancer.org, Inc. 1 Table of Contents Section

More information

Appliance Administration Manual v8.3.1

Appliance Administration Manual v8.3.1 Appliance Administration Manual v8.3.1 Rev. 1.0.3 Copyright Loadbalancer.org Table of Contents Chapter 1 Introduction...11 About this Manual...12 About the Appliance...12 Latest Version... 12 Appliance

More information

Appliance Administration Manual v8.3.0

Appliance Administration Manual v8.3.0 Appliance Administration Manual v8.3.0 Rev. 1.0.2 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents Chapter 1 Introduction...11 About this Manual...12 About the Appliance...12 Latest Version...

More information

Web Application Vulnerabilities: OWASP Top 10 Revisited

Web Application Vulnerabilities: OWASP Top 10 Revisited Pattern Recognition and Applications Lab Web Application Vulnerabilities: OWASP Top 10 Revisited Igino Corona igino.corona AT diee.unica.it Computer Security April 5th, 2018 Department of Electrical and

More information

Pexip Infinity and Amazon Web Services Deployment Guide

Pexip Infinity and Amazon Web Services Deployment Guide Pexip Infinity and Amazon Web Services Deployment Guide Contents Introduction 1 Deployment guidelines 2 Configuring AWS security groups 4 Deploying a Management Node in AWS 6 Deploying a Conferencing Node

More information

Load Balancing Oracle Application Server

Load Balancing Oracle Application Server V1.2.1 About this Guide This guide provides a quick reference for setting up Oracle HTTP Server load balancing using Loadbalancer.org appliances. Oracle HTTP Server Oracle HTTP Server is at the heart of

More information

IPMI Configuration Guide

IPMI Configuration Guide IPMI Configuration Guide 1. Introduction of IPMI Server Manager... 2 2. IPMI Server Manager GUI Overview... 3 1 1. Introduction of IPMI Server Manager IPMI Server Manager allows remote access of computers

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities Ethical Hacking and Countermeasures: Web Chapter 3 Web Application Vulnerabilities Objectives After completing this chapter, you should be able to: Understand the architecture of Web applications Understand

More information

WatchGuard Dimension v2.1.1 Update 3 Release Notes

WatchGuard Dimension v2.1.1 Update 3 Release Notes WatchGuard Dimension v2.1.1 Update 3 Release Notes Build Number 567758 Release Date 8 August 2018 Release Notes Revision Date 8 August 2018 On 8 August 2018, WatchGuard released the Dimension v2.1.1 Update

More information

Appliance Quick Start Guide v7.1

Appliance Quick Start Guide v7.1 Appliance Quick Start Guide v7.1 Copyright 2002-2011 Loadbalancer.org, Inc. 1 Table of Contents Loadbalancer.org terminology...3 What is a Virtual IP address?...3 What is a Floating IP address?...3 What

More information

Barracuda Web Application Firewall Foundation - WAF01. Lab Guide

Barracuda Web Application Firewall Foundation - WAF01. Lab Guide Barracuda Web Application Firewall Foundation - WAF01 Lab Guide Official training material for Barracuda certified trainings and Autorized Training Centers. Edition 2018 Revision 1.0 campus.barracuda.com

More information

DEFENSIVE PROGRAMMING. Lecture for EDA 263 Magnus Almgren Department of Computer Science and Engineering Chalmers University of Technology

DEFENSIVE PROGRAMMING. Lecture for EDA 263 Magnus Almgren Department of Computer Science and Engineering Chalmers University of Technology DEFENSIVE PROGRAMMING Lecture for EDA 263 Magnus Almgren Department of Computer Science and Engineering Chalmers University of Technology Traditional Programming When writing a program, programmers typically

More information

W e b A p p l i c a t i o n S e c u r i t y : T h e D e v i l i s i n t h e D e t a i l s

W e b A p p l i c a t i o n S e c u r i t y : T h e D e v i l i s i n t h e D e t a i l s W e b A p p l i c a t i o n S e c u r i t y : T h e D e v i l i s i n t h e D e t a i l s Session I of III JD Nir, Security Analyst Why is this important? ISE Proprietary Agenda About ISE Web Applications

More information

Application Layer Security

Application Layer Security Application Layer Security General overview Ma. Angel Marquez Andrade Benefits of web Applications: No need to distribute separate client software Changes to the interface take effect immediately Client-side

More information

Applications Security

Applications Security Applications Security OWASP Top 10 PyCon Argentina 2018 Objectives Generate awareness and visibility on web-apps security Set a baseline of shared knowledge across the company Why are we here / Trigger

More information

Defend Your Web Applications Against the OWASP Top 10 Security Risks. Speaker Name, Job Title

Defend Your Web Applications Against the OWASP Top 10 Security Risks. Speaker Name, Job Title Defend Your Web Applications Against the OWASP Top 10 Security Risks Speaker Name, Job Title Application Security Is Business Continuity Maintain and grow revenue Identify industry threats Protect assets

More information

Featuring. and. Göteborg. Ulf Larson Thursday, October 24, 13

Featuring. and. Göteborg. Ulf Larson Thursday, October 24, 13 Featuring and Göteborg OWASP top ten 2013 Based on risk data from eight firms that specialize in application security, This data spans over 500,000 vulnerabilities across hundreds of organizations and

More information

CN!Express CX-6000 Single User Version PCI Compliance Status Version June 2005

CN!Express CX-6000 Single User Version PCI Compliance Status Version June 2005 85 Grove Street - Peterboro ugh, N H 0345 8 voice 603-924-6 079 fax 60 3-924- 8668 CN!Express CX-6000 Single User Version 3.38.4.4 PCI Compliance Status Version 1.0 28 June 2005 Overview Auric Systems

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Dell SonicWALL Secure Mobile Access 8.5. Web Application Firewall Feature Guide

Dell SonicWALL Secure Mobile Access 8.5. Web Application Firewall Feature Guide Dell SonicWALL Secure Mobile Access 8.5 Copyright 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the Dell logo,

More information

Cisco Expressway Cluster Creation and Maintenance

Cisco Expressway Cluster Creation and Maintenance Cisco Expressway Cluster Creation and Maintenance Deployment Guide Cisco Expressway X8.6 July 2015 Contents Introduction 4 Prerequisites 5 Upgrading an X8.n cluster to X8.6 6 Prerequisites 6 Upgrade Expressway

More information

Application Security through a Hacker s Eyes James Walden Northern Kentucky University

Application Security through a Hacker s Eyes James Walden Northern Kentucky University Application Security through a Hacker s Eyes James Walden Northern Kentucky University waldenj@nku.edu Why Do Hackers Target Web Apps? Attack Surface A system s attack surface consists of all of the ways

More information

ForeScout Extended Module for ArcSight

ForeScout Extended Module for ArcSight Version 2.8 Table of Contents About the ArcSight Integration... 4 Use Cases... 4 Send Endpoint Status, Compliance, or Property Changes from CounterACT to ArcSight... 5 SmartConnector Health and Compliance

More information

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition Chapter 3 Investigating Web Attacks Objectives After completing this chapter, you should be able to: Recognize the indications

More information

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance CounterACT 7.0 Quick Installation Guide for a Single Virtual CounterACT Appliance Table of Contents Welcome to CounterACT Version 7.0... 3 Overview... 4 1. Create a Deployment Plan... 5 Decide Where to

More information

VMware Enterprise Systems Connector Installation and Configuration. JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9.

VMware Enterprise Systems Connector Installation and Configuration. JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9. VMware Enterprise Systems Connector Installation and Configuration JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9.3 You can find the most up-to-date technical documentation

More information

VMware Tunnel Guide Deploying the VMware Tunnel for your AirWatch environment

VMware Tunnel Guide Deploying the VMware Tunnel for your AirWatch environment VMware Tunnel Guide Deploying the VMware Tunnel for your AirWatch environment AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

Configure the Cisco DNA Center Appliance

Configure the Cisco DNA Center Appliance Review Cisco DNA Center Configuration Wizard Parameters, page 1 Configure Cisco DNA Center Using the Wizard, page 5 Review Cisco DNA Center Configuration Wizard Parameters When Cisco DNA Center configuration

More information

CloudEdge Deployment Guide

CloudEdge Deployment Guide Hillstone Networks, Inc. CloudEdge Deployment Guide Version 5.5R3P1 Copyright 2016Hillstone Networks, Inc.. All rights reserved. Information in this document is subject to change without notice. The software

More information

Appliance Administration Manual. v6.7

Appliance Administration Manual. v6.7 Appliance Administration Manual v6.7 This document covers all required administration information for Loadbalancer.org appliances. Copyright 2010 Loadbalancer.org Ltd 1 Table of Contents Section A Introduction...6

More information