Azure Web Application Firewall (WAF) rate limiting (2024)

  • Article

Rate limiting for Web Application Firewall on Application Gateway allows you to detect and block abnormally high levels of traffic destined for your application. By using rate limiting on Application Gateway WAF_v2, you can mitigate many types of denial-of-service attacks, protect against clients that have accidentally been misconfigured to send large volumes of requests in a short time period, or control traffic rates to your site from specific geographies.

Rate limiting policies

Rate limiting is configured using custom WAF rules in a policy.

Note

Rate limit rules are only supported on Web Application Firewalls running the latest WAF engine. In order to ensure you are using the latest engine, select CRS 3.2 for the default rule set.

When you configure a rate limit rule, you must specify the threshold: the number of requests allowed within the specified time period. Rate limiting on Application Gateway WAF_v2 uses a sliding window algorithm to determine when traffic has breached the threshold and needs to be dropped. During the first window where the threshold for the rule is breached, any more traffic matching the rate limit rule is dropped. From the second window onwards, traffic up to the threshold within the window configured is allowed, producing a throttling effect.

You must also specify a match condition, which tells the WAF when to activate the rate limit. You can configure multiple rate limit rules that match different variables and paths within your policy.

Application Gateway WAF_v2 also introduces a GroupByUserSession, which must be configured. The GroupByUserSession specifies how requests are grouped and counted for a matching rate limit rule.

The following three GroupByVariables are currently available:

  • ClientAddr – This is the default setting and it means that each rate limit threshold and mitigation applies independently to every unique source IP address.
  • GeoLocation - Traffic is grouped by their geography based on a Geo-Match on the client IP address. So for a rate limit rule, traffic from the same geography is grouped together.
  • None - All traffic is grouped together and counted against the threshold of the Rate Limit rule. When the threshold is breached, the action triggers against all traffic matching the rule and doesn't maintain independent counters for each client IP address or geography. It's recommended to use None with specific match conditions such as a sign-in page or a list of suspicious User-Agents.

Rate limiting details

The configured rate limit thresholds are counted and tracked independently for each endpoint the Web Application Firewall policy is attached to. For example, a single WAF policy attached to five different listeners maintains independent counters and threshold enforcement for each of the listeners.

The rate limit thresholds aren't always enforced exactly as defined, so it shouldn't be used for fine-grain control of application traffic. Instead, it's recommended for mitigating anomalous rates of traffic and for maintaining application availability.

The sliding window algorithm blocks all matching traffic for the first window in which the threshold is exceeded, and then throttles traffic in future windows. Use caution when defining thresholds for configuring wide-matching rules with either GeoLocation or None as the GroupByVariables. Incorrectly configured thresholds could lead to frequent short outages for matching traffic.

Next step

Azure Web Application Firewall (WAF) rate limiting (2024)
Top Articles
is it possible to see the private key of a certificate ? ( i mean a computer's private key )
How to Video Chat With Tango on Your Android or iOS Device
WALB Locker Room Report Week 5 2024
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Login Page
Collision Masters Fairbanks
Eric Rohan Justin Obituary
Puretalkusa.com/Amac
10000 Divided By 5
Oxford House Peoria Il
Aspen.sprout Forum
Bowlero (BOWL) Earnings Date and Reports 2024
Craiglist Galveston
Used Sawmill For Sale - Craigslist Near Tennessee
Missed Connections Dayton Ohio
G Switch Unblocked Tyrone
Vegas7Games.com
Titanic Soap2Day
Used Safari Condo Alto R1723 For Sale
Jail View Sumter
Seeking Arrangements Boston
25 Best Things to Do in Palermo, Sicily (Italy)
Airtable Concatenate
Used Patio Furniture - Craigslist
Urban Dictionary Fov
Pensacola Tattoo Studio 2 Reviews
Cable Cove Whale Watching
Aes Salt Lake City Showdown
Weather October 15
Healthy Kaiserpermanente Org Sign On
Gus Floribama Shore Drugs
Nextdoor Myvidster
Puerto Rico Pictures and Facts
Ni Hao Kai Lan Rule 34
Weapons Storehouse Nyt Crossword
Academic important dates - University of Victoria
Cbs Fantasy Mlb
What Does Code 898 Mean On Irs Transcript
Busch Gardens Wait Times
Joey Gentile Lpsg
If You're Getting Your Nails Done, You Absolutely Need to Tip—Here's How Much
Ladyva Is She Married
Pickwick Electric Power Outage
25 Hotels TRULY CLOSEST to Woollett Aquatics Center, Irvine, CA
Haunted Mansion Showtimes Near Millstone 14
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Lorcin 380 10 Round Clip
Gainswave Review Forum
Salem witch trials - Hysteria, Accusations, Executions
Pauline Frommer's Paris 2007 (Pauline Frommer Guides) - SILO.PUB
Latest Posts
Article information

Author: Jonah Leffler

Last Updated:

Views: 5601

Rating: 4.4 / 5 (45 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Jonah Leffler

Birthday: 1997-10-27

Address: 8987 Kieth Ports, Luettgenland, CT 54657-9808

Phone: +2611128251586

Job: Mining Supervisor

Hobby: Worldbuilding, Electronics, Amateur radio, Skiing, Cycling, Jogging, Taxidermy

Introduction: My name is Jonah Leffler, I am a determined, faithful, outstanding, inexpensive, cheerful, determined, smiling person who loves writing and wants to share my knowledge and understanding with you.