SUPPORT

Contact Support

OPEN A TICKET

Generating F5 BIG-IP Application Security Manager WAF Rules From Netsparker Standard

BIG-IP ASM provides application security and protects your applications from network attacks including the OWASP Top 10 most critical web application security risks. The ASM has various built-in attack signatures, also allows user-defined signatures, used to block or allow network traffic.

If you can't immediately fix all vulnerabilities that Netsparker has detected, you can cover them up and defer fixing them until another time. You do this by exporting Netsparker's findings as rules for the BIG-IP Application Security Manager (ASM).

It is possible to either export the information about a single vulnerability as an ASM rule or export information about all the vulnerabilities identified during the scan.

After the rules are imported, the BIG-IP ASM will then block any requests made by malicious hackers.

F5 BIG-IP ASM WAF Fields

The table lists and describes the F5 BIG-IP ASM WAF fields in the Web Application Firewall tab.

Field

Description

Add

Click to add an integration.

Delete

Click to delete the integration and clear all fields.

Test Settings

Click to confirm that Netsparker Standard can connect to the configured system.

Action

This section contains general fields about the Send To Action.

Display Name

This is the name of the configuration that will be shown on menus.

Type of F5 BIG-IP ASM WAF Rules Netsparker Exports

WAF rules are generated according to ‘Generic Schema’. The result rules are XML formatted.

Types of Vulnerabilities Netsparker Exports as F5 BIG-IP ASM Rules

Not all vulnerabilities can be covered up by blocking access to a specific URL with a web application firewall, therefore not all vulnerabilities can be exported as F5 BIG-IP ASM rules. For example, security flaws related to HTTP Cookies, sensitive comments in source code, application source code disclosure, and other similar vulnerabilities will not be exported.

How to Configure F5 BIG-IP ASM WAF Rules in Netsparker Standard
  1. Open Netsparker Standard.
  2. From the Home tab on the ribbon, click Options. The Options dialog is displayed.
  3. Click Web Application Firewall.
  4. From the Add dropdown, select F5 BIG-IP ASM.

WAF Configuration Window Image

  1. Click the OK button. Then the F5 BIG-IP ASM WAF Rules button is shown in the Vulnerability tab.
How to Export F5 BIG-IP ASM WAF Rules from Netsparker Standard

WAF rules can be exported in two ways from Netsparker Standard:

  • All Vulnerabilities
  • Single Vulnerability

If you want to export the rule for All Vulnerabilities:

  1. Navigate to the Reporting ribbon tab menu and click F5 BIG-IP WAF Rules.

WAF Reporting Image

  1. In the File name field, enter a name and click Save. The Export Report dialog is displayed with the Path (generated from the location and filename from the previous step) already displayed.
  2. From the Policy dropdown, select an option.

Export WAF Rules Window Image

  1. The Open Generated Report checkbox is already selected (which opens the report on completion). Deselect this option if required.
  2. Click Save. The ModSecurity WAF Rules Report opens in your default text editor (this example shows Notepad++).

F5 WAF Rules Window Image

If you want to export the rule for a Single Vulnerability:

  1. Navigate to the Issues pane and select a single vulnerability (in this example, Cross-site Scripting).

Issues Pane Image

  1. From the Vulnerability tab, click BIG-IP ASM WAF Rules.

Vulnerability tab Image

  1. In the File name field, enter a name (here F5 BIG-IP ASM Boolean Based SQL Injection Rule is used), and click Save.

WAF Rules Export Saving Image

  1. The exported rule file can be opened in any text editor as shown.

Rules Export Image

Netsparker

Highly accurate, fast & easy-to-use Web Application Security Scanner

Get a demo