https://thexssrat.medium.com/the-features-of-a-waf-how-to-hack-it-6da50239dd2f

A WAF can be purchased or downloaded as an open source firewall but it can equally come in hardware form. The way we configure our WAF often determines how well it keeps attackers out so today i would like to go over some of the features that a WAF can have to hopefully give you a better understanding of how you should configure yours or how you should attack the WAF you are currently facing. Configuring a WAF for stricter inspection might be wanted but we have to realise this increases the processing time of a request.

We can install our WAF in two ways and each has their own advantages and disadvantages:

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/d91189c2-90ac-4840-b228-e3669fffd201/117dSACQKdnAtjcQ3qlEthg.png

One-armed mode

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/09e8b06a-147e-44b9-bf9b-c34ccd4250b5/1mxI8oQV9TVtfUasLnT4M1g.png

Two armed mode

I looked in the sales documents of some popular WAFs to see what features they offer at the maximum level of protection (and pricing) to see the source documents please refer to the “Sources” chapter at the end of the document.