ADC

Use case - Binding Web App Firewall policy to a VPN virtual server

NetScaler provides a solution to protect multiple applications that are managed by the VPN virtual server. By binding application security policies to the VPN virtual server, you can protect all the applications behind it.

The following are the ways to deploy application security at a VPN virtual server:

  • Protect all the applications behind the VPN virtual server with a single Web App Firewall profile
  • Protect each application behind the VPN virtual server with a different Web App Firewall profile

Protect all the applications behind the VPN virtual server with a single Web App Firewall profile

To protect all your applications that are behind the VPN virtual server with a single Web App Firewall policy, you must create a Web App Firewall policy and bind it to a VPN virtual server.

Example:

A company hosts three critical applications - SAP, Workday, and Tally - on a VPN virtual server. As a network administrator, you decide to protect these applications against the OWASP Top 10 security risks.

To achieve this use case, perform the following operations:

  1. Create the Web App Firewall profile with appropriate checks for OSWAP Top 10 security risks.

    add appfw profile pr-basic -crossSiteScriptingAction block -SQLInjectionAction block

    For more information on configuring OSWAP Top 10 security risks, see Add security protection.

  2. Add the app firewall policy and associate that policy with the profile pr-basic.

    add appfw policy owasp_policy true pr-basic

  3. Bind the Web App Firewall policy to the VPN virtual server.

    bind appfw vpn vserver vserver10 -policy owasp_policy -priority 10

Protect each application behind VPN virtual server with a different Web App Firewall profile

To perform specific security checks based on the Web App Firewall architecture (server, OS, JavaScript library, and so on.), individual security checks might be required for each web application. In such scenarios, multiple Web App Firewall policies can be configured.

Example:

A company hosts three critical applications (SAP, Workday, and Tally) behind a VPN virtual server. As a network administrator, you decide to create a unique Web App Firewall policy for optimal protection for each application.

To achieve this use case, perform the following operations:

  1. Create multiple profiles based on the required application. Configure the profile with the necessary security checks based on the application’s need.

    add appfw profile pr-basic1 -crossSiteScriptingAction block -SQLInjectionAction block
    add appfw profile pr-basic 2-crossSiteScriptingAction block -SQLInjectionAction block
    add appfw profile pr-basic 3 -crossSiteScriptingAction block -SQLInjectionAction block
    <!--NeedCopy-->
    
  2. Add the app firewall policies that are applicable for each application and associate the policy with the profile.

   add appfw policy sap_policy true HTTP.REQ.URL.CONTAINS (“sap.com”) pr-basic1
   add appfw policy workday_policy true HTTP.REQ.URL.CONTAINS (“workday.com”) pr-basic2
   add appfw policy tally_policy true HTTP.REQ.URL.CONTAINS (“tally.com”) pr-basic3
  <!--NeedCopy-->
  1. Bind the created policy to VPN vserver1
. bind appfw vpn vserver vserver1 -policy sap_policy -priority 10 
. bind appfw vpn vserver vserver1 -policy workday_policy -priority 20
. bind appfw vpn vserver vserver1 -policy tally_policy -priority 30
<!--NeedCopy-->

For more information on the following topics:

Use case - Binding Web App Firewall policy to a VPN virtual server